Items in division
- TU Darmstadt (106599)
- LOEWE (2510)
- LOEWE-Zentren (2371)
- CASED – Center for Advanced Security Research Darmstadt (1663)
- LOEWE-Zentren (2371)
- LOEWE (2510)
A
Arzt, Steven (2017)
Static Data Flow Analysis for Android Applications.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Conference or Workshop Item, Bibliographie
Ali, Azmzt ; Othmane, Lotfi Ben (2016)
Towards effective security assurance for incremental software development - the case of zen cart application,.
Conference or Workshop Item, Bibliographie
Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016)
POSTER: Toward a Secure and Scalable Attestation.
Conference or Workshop Item, Bibliographie
Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016)
Things, Trouble, Trust: On Building Trust in IoT Systems.
Conference or Workshop Item, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA: Scalable Embedded Device Attestation.
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015)
Conference or Workshop Item, Bibliographie
Al-Hadhrami, Nasser ; Aziz, Benjamin ; Sardesai, Shantanu ; Othmane, Lotfi Ben (2015)
Incremental Development of RBAC-controlled E-marking System Using the B Method.
Conference or Workshop Item, Bibliographie
Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015)
SEDA - Technical Report.
Report, Bibliographie
Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015)
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. Portland, USA (14.06.2015)
Conference or Workshop Item, Bibliographie
Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015)
HAFIX: Hardware-Assisted Flow Integrity Extension.
Conference or Workshop Item, Bibliographie
Arabadzhieva, Vladislava (2015)
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Alkeilani Alkadri, Nabil (2015)
Post-Quantum Commitment Schemes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Conference or Workshop Item, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Conference or Workshop Item, Bibliographie
Arias-Cabarcos, Patricia ; Trapero, Ruben ; Almenárez, Florina ; Díaz-Sánchez, Daniel ; Marín, Andrés (2015)
Blended Identity: Pervasive IdM for Continuous Authentication.
Conference or Workshop Item, Bibliographie
Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
eds.: Kutylowski, Miroslaw ; Vaidya, Jaideep (2014)
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014
doi: 10.1007/978-3-319-11203-9_5
Book Section, Bibliographie
Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014)
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8)
Article, Bibliographie
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
doi: 10.1145/2568225.2568243
Conference or Workshop Item, Bibliographie
Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014)
Constructing Call Graphs of Scala Programs.
Proceedings of the 28th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014)
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. Edinburgh
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014)
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Scottsdale
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
ICSE. Hyderabad
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014)
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Conference or Workshop Item, Bibliographie
Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013)
Mobile Platform Security.
doi: 10.2200/S00555ED1V01Y201312SPT009
Book, Bibliographie
Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
doi: 10.1145/2508859.2516738
Book Section, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013)
A Security Framework for Analysis and Design of Software Attestation.
Conference or Workshop Item, Bibliographie
Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013)
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Article, Bibliographie
Arzt, Steven ; Bodden, Eric (2013)
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
Report, Bibliographie
Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Conference or Workshop Item, Bibliographie
Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
Report, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article, Bibliographie
Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013)
How useful are existing monitoring languages for securing Android apps?
6. Arbeitstagung Programmiersprachen (ATPS 2013).
Conference or Workshop Item, Bibliographie
Ali, Karim ; Lhoták, Ondřej (2013)
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the 27th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie
Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012)
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
15th International Conference on Information Security. Passau, Germany (19-21 Sep 2012)
doi: 10.1007/978-3-642-33383-5_11
Conference or Workshop Item, Bibliographie
Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012)
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012).
Conference or Workshop Item, Bibliographie
Alkassar, Ammar ; Schulz, Steffen ; Stüble, Christian (2012)
Sicherheitskern(e) für Smartphones: Ansätze und Lösungen.
In: Datenschutz und Datensicherheit (DuD), 2012 (3)
doi: 10.1007/s11623-012-0060-3
Article, Bibliographie
Ali, Karim ; Lhoták, Ondřej (2012)
Application-Only Call Graph Construction.
Proceedings of the 26th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item, Bibliographie
Alomari, Esraa ; Manickam, Selvakumar ; Gupta, B. ; Karuppayah, Shankar ; Alfaris, Rafeef (2012)
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art.
In: International Journal of Computer Applications, 49 (7)
Article, Bibliographie
Ackermann, Tobias ; Miede, André ; Buxmann, Peter ; Steinmetz, Ralf (2011)
Taxonomy of Technological IT Outsourcing Risks: Support for Risk Identification and Quantification.
Helsinki, Finland
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, François-Xavier ; Wachsmann, Christian (2011)
A Formal Foundation for the Security Features of Physical Functions.
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Strufe, Thorsten (2011)
An Efficient Distributed Privacy-preserving Recommendation System.
Conference or Workshop Item, Bibliographie
Ahmed, Sarah (2011)
Einfluss der Häufigkeit und Verteilung von Minutien auf die Qualität von Algorithmen zur Erkennung von Fingerabdrücken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Scafuro, Alessandra ; Visconti, Ivan ; Wachsmann, Christian (2010)
Impossibility Results for RFID Privacy Notions.
Conference or Workshop Item, Bibliographie
Ackermann, Tobias ; Buxmann, Peter (2010)
Quantifying Risks in Service Networks: Using Probability Distributions for the Evaluation of Optimal Security Levels.
Conference or Workshop Item, Bibliographie
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max ; Ries, Sebastian ; Schnelle-Walka, Dirk (2010)
Shaping the Future Internet.
In: Ubiquitous Computing and Communication Journal, 5 (Special Issue)
Article, Bibliographie
Anikeev, Maxim ; Madlener, Felix ; Schlosser, Andreas ; Huss, Sorin ; Walther, Christoph (2010)
Viable Approach to Machine-Checked Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography.
Workshop on Program Semantics, Specification and Verification: Theory and Applications (PSSV 2010). Kazan, Russia (June 14-15, 2010)
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Ghosal, Dipak ; Katzenbeisser, Stefan ; Liu, Yali ; Sadeghi, Ahmad-Reza ; Schulz, Steffen (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian (2010)
On RFID Privacy with Mutual Authentication and Tag Corruption.
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2010)
Anonymous Authentication for RFID Systems.
Conference or Workshop Item, Bibliographie
Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
eds.: Acquisti, A. ; Sadeghi, Ahmad-Reza (2010)
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
Conference or Workshop Item, Bibliographie
Abdalla, Michel ; Chevalier, Celine ; Manulis, Mark ; Pointcheval, David (2010)
Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys.
3rd International Conference on Cryptology in Africa. Stellenbosch, South Africa (03.-06.05.2010)
doi: 10.1007/978-3-642-12678-9_21
Conference or Workshop Item, Bibliographie
Anderl, Reiner ; Henriques, Joselito Rodrigues (2010)
Sichere Produktdaten.
In: forschen: Sicherheit in einer digitalen Welt, (2)
Article, Bibliographie
Ayari, Brahim ; Khelil, Abdelmajid ; Saffar, Kamel ; Suri, Neeraj (2010)
Data-based Agreement for Inter-Vehicle Coordination.
Conference or Workshop Item, Bibliographie
Ayari, Brahim ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs.
Conference or Workshop Item, Bibliographie
Abt, Sebastian ; Busch, Christoph ; Nickel, Claudia (2010)
Applikation des DBSCAN Clustering-Verfahrens zur Generierung von Ground-Truth Fingerabdruck-Minutien.
Conference or Workshop Item, Bibliographie
Acker, Robin ; Massoth, Michael (2010)
Secure Ubiquitous House and Facility Control Solution.
Conference or Workshop Item, Bibliographie
Acker, Robin ; Brandt, Steffen ; Buchmann, Nicolas ; Fugmann, Thorsten ; Massoth, Michael (2010)
Ubiquitous Home Control based on SIP and Presence Service.
Conference or Workshop Item, Bibliographie
Anderl, Reiner ; Henriques, Joselito (2009)
Enterprise Rights Management: A new technology for safe collaboration in the Product Development.
International Congress of Mechanical Engineering. Gramado, Brazil
Conference or Workshop Item, Bibliographie
Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009)
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie
Ali, Karim ; Boutaba, Raouf (2009)
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie
Aitenbichler, Erwin ; Behring, Alexander ; Bradler, Dirk ; Hartmann, Melanie ; Martucci, Leonardo ; Ries, Sebastian ; Schnelle-Walka, Dirk ; Schreiber, Daniel ; Steimle, Jürgen ; Strufe, Thorsten ; Mühlhäuser, Max (2009)
Shaping the Future Internet.
3rd International CompanionAble Workshop IoPTS. Brussels, Belgium (02.12.2009)
Conference or Workshop Item, Bibliographie
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häussge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item, Bibliographie
Armknecht, Frederik ; Furukawa, Jun ; Kurosawa, Kaoru (2008)
A Universally Composable roup Key Exchange Protocol with Minimum Communication Effort.
Conference or Workshop Item, Bibliographie
Aciicmez, Onur ; Schindler, Werner
ed.: Malkin, T. (2008)
A Vulnerability in RSA Implementations due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Berlin
Conference or Workshop Item, Bibliographie
Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Article, Bibliographie
Aitenbichler, Erwin ; Ries, Sebastian ; Schröder-Bernhardi, Julian ; Turban, Georg ; Borgert, Stephan ; Bradler, Dirk ; Hartle, Michael ; Häußge, Gina (2008)
Smart Products: Integration Challenges.
Conference or Workshop Item, Bibliographie
Alkassar, Ammar ; Volkamer, Melanie (2007)
E-Voting and Identity -- First International Conference, VOTE-ID 2007.
Article, Bibliographie
Adler, Steven ; Brown, Nigel ; Gilbert, Art ; Palmer, Charles ; Schnyder, Michael ; Waidner, Michael (2006)
Using a Privacy Agreement Framework to Improve Handling of Personally Identifiable Information.
Norm, patent, standard, Bibliographie
Alkassar, Ammar ; Krimmer, Robert ; Volkamer, Melanie (2005)
Online-Wahlen für Gremien -- Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
In: Datenschutz und Datensicherheit, 8
Article, Bibliographie
Atluri, Vijayalakshmi ; Backes, Michael ; Basin, David ; Waidner, Michael (2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security
Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004.
Conference or Workshop Item, Bibliographie
Adler, Steven ; Bangerter, Endre ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Karjoth, Günter ; Kesdogan, Dogan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Presler-Marshall, Martin ; Schnyder, Michael ; Herreweghen, Els Van ; Waidner, Michael (2001)
Using a Rules Model to Improve Handling of Personally Identifiable
Information.
Norm, patent, standard, Bibliographie
Adler, Steven ; Bangerter, Endre ; Bohrer, Kathy ; Brown, Nigel ; Camenisch, Jan ; Gilbert, Arthur ; Kesdogan, Dogan ; Leonard, Matthew ; Liu, Xuan ; McCullough, Michael ; Nelson, Adam ; Palmer, Charles ; Powers, Calvin ; Schnyder, Michael ; Schonberg, Edith ; Schunter, Matthias (2001)
Using an Object Model to Improve Handling of Personally Identifiable
Information.
Norm, patent, standard, Bibliographie
B
Borges, Fábio ; Lara, Pedro ; Portugal, Renato (2017)
Parallel algorithms for modular multi-exponentiation.
In: Applied Mathematics and Computation, 292
doi: 10.1016/j.amc.2016.07.036
Article, Bibliographie
Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Regulating ARM TrustZone Devices in Restricted Spaces.
Conference or Workshop Item, Bibliographie
Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016)
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
doi: 10.5445/IR/1000081968
Report, Bibliographie
Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016)
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5)
doi: 10.1007/s11623-016-0600-3
Article, Bibliographie
Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016)
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7)
doi: 10.1007/s12243-016-0510-2
Article, Bibliographie
Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016)
Leakage-Resilient Layout Randomization for Mobile Devices.
Conference or Workshop Item, Bibliographie
Brendel, Jacqueline (2016)
Efficient Proactive Secret Sharing.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016)
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
Conference or Workshop Item, Bibliographie
Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Hide And Seek: Detecting Sensors in P2P Botnets.
Florence, Italy
doi: 10.1109/CNS.2015.7346908
Conference or Workshop Item, Bibliographie
Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
In: 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015): Proceedings
Book Section, Bibliographie
Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015)
TyTAN: Tiny Trust Anchor for Tiny Devices.
Conference or Workshop Item, Bibliographie
Braun, Kristoffer ; Rack, Philipp (2015)
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015)
XiOS: Extended Application Sandboxing on iOS.
Conference or Workshop Item, Bibliographie
Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015)
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015)
Augmented Learning with Errors: The Untapped Potential of the Error Term.
Isla Verde, Puerto Rico
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2015)
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive
Article, Bibliographie
Butin, Denis ; Métayer, Daniel Le (2015)
A Guide to End-to-End Privacy Accountability.
Florence, Italy
Conference or Workshop Item, Bibliographie
Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015)
Real-World Post-Quantum Digital Signatures.
Brussels, Belgium
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014)
CA Trust Management for the Web PKI.
In: Journal of Computer Security, 22 (6)
doi: 10.3233/JCS-140509
Article, Bibliographie
Braun, Johannes (2014)
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
San Francisco, USA
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014)
Nearest Planes in Practice.
Istanbul, Turkey
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
eds.: Krimmer, Robert ; Volkamer, Melanie (2014)
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Lochau
doi: 10.1109/EVOTE.2014.7001140
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Bansarkhani, Rachid El ; Hauke, Sascha
eds.: Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (2014)
Towards Security Solutions for Emergent Business Software.
St. Leon-Rot, Germany
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bonn
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Winter, Christian ; Yannikos, York ; Fink, Tobias ; Seefried, Michael
eds.: Peterson, Gilbert ; Shenoi, Sujeet (2014)
Using Approximate Matching to Reduce the Volume of Digital Data.
Vienna, Austria
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014)
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, 71 (3)
doi: 10.1007/s10623-012-9747-6
Article, Bibliographie
Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600922
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
eds.: Tryfonas, Theo ; Askoxylakis, Ioannis (2014)
Paper Audit Trails and Voters' Privacy Concerns.
Heraklion, Greece
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Volkamer, Melanie
eds.: Parycek, Peter ; Edelmann, Noella (2014)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Danube University Krems
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2014)
Expert Knowledge for Contextualized Warnings.
Report, Bibliographie
Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014)
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, 19 (2)
doi: 10.1016/j.jisa.2014.03.001
Article, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014)
Key2Share for Authentication Services.
Conference or Workshop Item, Bibliographie
Berchtold, Waldemar ; Schäfer, Marcel ; Rettig, Michael ; Steinebach, Martin
ed.: SPIE, IS&T (2014)
Robust Hashing for 3D Models.
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014)
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
San Diego
doi: 10.14722/usec.2014.23037
Conference or Workshop Item, Bibliographie
Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, (2)
doi: 10.9785/ovs-cr-2014-119
Article, Bibliographie
Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014)
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bremen
Conference or Workshop Item, Bibliographie
Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias ; Hollick, Matthias (2014)
Short Paper: Gathering Tamper Evidence in Wi-Fi Networks Based on Channel State Information.
doi: 10.1145/2627393.2627405
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Liu, Huajian ; Winter, Christian ; Baier, Harald ; Rybalchenko, Alexey ; Steinebach, Martin
eds.: Gladyshev, Pavel ; Marrington, Andrew ; Baggili, Ibrahim (2014)
Towards a Process Model for Hash Functions in Digital Forensics.
Moscow, Russia
doi: 10.1007/978-3-319-14289-0_12
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2014)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec., 12 (4)
Article, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014)
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327
Article, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Pointcheval, David ; Vergnaud, Damien (2014)
Towards Lattice Based Sequential Aggregate Signatures.
Marrakesh, Morocco
Conference or Workshop Item, Bibliographie
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014)
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes (2014)
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Neumann, Stephan (2014)
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
In: Datenschutz und Datensicherheit - DuD, 38 (2)
Article, Bibliographie
Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013)
Introduction to Public Key Infrastructures.
Book, Bibliographie
Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013)
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, 37
doi: 10.1007/s11623-013-0300-1
Article, Bibliographie
Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013)
Reducing human factors in software security architectures.
Future Security Conference 2013.
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Stivaktakis, Georgios ; Roussev, Vassil (2013)
Evaluating Detection Error Trade-offs for Bytewise Approximate Matching Algorithms.
In: 5th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie
Buchmann, Nicolas ; Peeters, Roel ; Baier, Harald ; Pashalidis, Andreas (2013)
Security considerations on extending PACE to a biometric-based connection establishment.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
eds.: Katsikas, Sokratis ; Agudo, Isaac (2013)
Revocation & Non-Repudiation: When the first destroys the latter.
RHUL, Egham, UK
doi: 10.1007/978-3-642-53997-8_3
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael
ed.: Hildebrandt, Mireille (2013)
Personal Information Dashboard: Putting the Individual Back in Control.
In: Digital Enlightenment Yearbook 2013
doi: 10.3233/978-1-61499-295-0-139
Book Section, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2013)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Koblenz
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Stivaktakis, Georgios ; Baier, Harald (2013)
FRASH: A framework to test algorithms of similarity hashing.
In: In Proceedings of the 13th Digital Forensics Research Conference (DFRWS’13), 13
Article, Bibliographie
Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar
eds.: Bouyukliev, Iliya ; Bulygin, Stanislav ; Martínez-Moro, Edgar (2013)
Foreword: computer algebra in coding theory and cryptography.
In: Applicable Algebra in Engineering, Communication and Computing
doi: 10.1007/s00200-013-0199-7
Book Section, Bibliographie
Bansarkhani, Rachid El ; Buchmann, Johannes
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Braden, Kjell (2013)
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013)
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2013)
Joint Point Interfaces for Safe and Flexible Decoupling of Aspects.
In: ACM Transactions on Software Engineering and Methodology, 23 (1)
Article, Bibliographie
Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
University of Regensburg, Germany
Conference or Workshop Item, Bibliographie
Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Vote Casting in Any Preferred Constituency: A New Voting Channel.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
eds.: Pernul, Günther ; Sandhu, Ravi (2013)
The Transitivity-of-Trust Problem in Android Application Interaction.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
ed.: Horbach, Matthias (2013)
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Koblenz
Conference or Workshop Item, Bibliographie
Beckerle, Matthias ; Martucci, Leonardo (2013)
Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
ed.: Huth, Michael (2013)
Contextualized Web warnings, and how they cause distrust.
TRUST 2013. London, UK (17. - 19. Juni 2013)
Conference or Workshop Item, Bibliographie
Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Client-controlled Cryptography-as-a-Service in the Cloud.
Conference or Workshop Item, Bibliographie
Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin (2013)
Leakage Detection and Tracing for Databases.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift – Statically Analyzing Software Product Lines in Minutes Instead of Years.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Demirel, Denise ; Graaf, Jeroen van de
ed.: Sadeghi, Ahmad-Reza (2013)
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013)
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Astebøl, Knut Petter ; Baier, Harald ; Busch, Christoph (2013)
mvHash-B - a new approach for similarity preserving hashing.
In: 7th International Conference on IT Security Incident Management & IT Forensics (IMF)
Article, Bibliographie
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes
ed.: Dawson, E. (2013)
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
Conference or Workshop Item, Bibliographie
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2013)
PSP: Private and Secure Payment with RFID.
In: Computer Communications, 36 (4)
Article, Bibliographie
Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013)
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
San Antonio, Texas, USA
doi: 10.1145/2435349.2435382
Conference or Workshop Item, Bibliographie
Berchtold, Waldemar ; Schäfer, Marcel ; Liu, Huajian ; Takahashi, Fabio Touceira ; Schmitz, Andre ; Zmudzinski, Sascha ; Steinebach, Martin ; Wieneke, Jonas (2013)
Video Game Watermarking.
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Petrov, Kaloyan (2013)
Reducing time cost in hashing operations.
In: Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics (IFIP WG11.9)
Article, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
ed.: Sprague, Ralph H. (2013)
On the Security of Encrypted Secret Sharing.
Grand Wailea, Maui, Hawaii
doi: 10.1109/HICSS.2013.426
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Walter, Michael ; Buchmann, Johannes (2013)
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3)
doi: 10.1007/s10623-013-9840-5
Article, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013)
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, 3 (1)
Article, Bibliographie
Busch, C. ; Brömme, A. ; Pflug, A. ; Zhou, X. ; Dose, M. ; Brauckmann, M. ; Weber, F. ; Opel, A. ; Neugebauer, P. ; Leowsky, K. (2013)
Multi-Biometrische Gesichtserkennung.
Bonn, Germany
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
eds.: Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (2013)
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
Simon Fraser University, Burnaby, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013)
Reset Indifferentiability and its Consequences.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Rynkowski, Gregor (2013)
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
Washington D.C., USA
doi: 10.1109/SocialCom.2013.90
Conference or Workshop Item, Bibliographie
Buchegger, Sonja ; Crowcroft, Jon ; Krishnamurthy, Balachander ; Strufe, Thorsten (2013)
Decentralized Systems for Privacy Preservation (Dagstuhl Seminar 13062).
In: Dagstuhl Reports, 3 (2)
doi: 10.4230/DagRep.3.2.22
Article, Bibliographie
Bansarkhani, Rachid El ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012)
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, 53
Article, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012)
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
Report, Bibliographie
Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012)
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie
Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
Report, Bibliographie
Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012)
Delta-oriented Monitor Specification.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012)
Challenges in defining a programming language for provably correct dynamic analyses.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C)
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-v2.
In: 4th International ICST Conference on Digital Forensics & Cyber Crime (ICDF2C), 4
Article, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
eds.: Ryan, Mark ; Smyth, Ben ; Wang, Guilin (2012)
iPIN and mTAN for secure eID applications.
Hangzhou, China
doi: 10.1007/978-3-642-29101-2_18
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
eds.: De Capitani di Vimercati, Sabrina ; Mitchell, Chris (2012)
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Volkamer, Melanie (2012)
Towards the Systematic Development of Contextualized Security Interventions.
Birmingham, UK
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Baier, Harald ; Beckingham, Jesse (2012)
Security and Implementation Analysis of the Similarity Digest sdhash.
In: 1st International Baltic Conference on Network Security & Forensics (NeSeFo)
Article, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
Properties of a Similarity Preserving Hash Function and their Realization in sdhash.
In: Information Security South Africa (ISSA)
Article, Bibliographie
Baier, Harald ; Brand, Achim (2012)
On the Investigation of Application Specific Data within Digital Forensics.
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Baier, Harald (2012)
A Fuzzy Hashing Approach based on Random Sequences and Hamming Distance.
In: 7th annual Conference on Digital Forensics, Security and Law (ADFSL)
Article, Bibliographie
Braun, Johannes ; Buchmann, Johannes
eds.: Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (2012)
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
Istanbul, Turkey
doi: 10.1109/NTMS.2012.6208676
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2012)
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks
doi: 10.1002/sec.547
Article, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
Report, Bibliographie
Bockisch, Christoph ; Sewe, Andreas ; Yin, Haihan ; Mezini, Mira ; Aksit, Mehmet (2012)
An In-Depth Look at ALIA4J.
In: The Journal of Object Technology, 11 (1)
doi: 10.5381/jot.2012.11.1.a7
Article, Bibliographie
Busold, Christoph (2012)
Hash-based Signatures on Smart Cards.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Bessani, Alysson ; Abbadi, Imad M. ; Bugiel, Sven ; Cesena, Emanuele ; Deng, Mina ; Gröne, Michael ; Marnau, Ninja ; Nürnberger, Stefan ; Pasin, Marcelo ; Schirmer, Norbert
eds.: Petcu, Dana ; Vazquez-Poletti, Jose Luis (2012)
TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures.
In: European research activities in cloud computing
Book Section, Bibliographie
Bulygin, Stanislav ; Walter, Michael (2012)
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
Report, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2012)
Towards Taming Privilege-Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie
Bodden, Eric (2012)
Identifying meaningless parameterized linear-temporal-logic formulas.
Report, Bibliographie
Bodden, Eric (2012)
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
Report, Bibliographie
Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Article, Bibliographie
Bockisch, Christoph ; Sewe, Andreas (2012)
The ALIA4J Approach to Efficient Language Implementation.
Demo at the 3rd Annual Conference on Systems, Programming, and Applications: Software for Humanity. Tucson, AZ, USA
doi: 10.1145/2384716.2384726
Conference or Workshop Item, Bibliographie
Bodden, Eric (2012)
MOPBox: A Library Approach to Runtime Verification.
RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30.
Conference or Workshop Item, Bibliographie
Baier, Harald ; Dichtelmüller, Christian (2012)
Datenreduktion mittels kryptographischer Hashfunktionen in der IT-Forensik: Nur ein Mythos?
Conference or Workshop Item, Bibliographie
Bansarkhani, Rachid El ; Meziani, Mohammed (2012)
An Efficient Lattice-based Secret Sharing Construction.
London, UK
Conference or Workshop Item, Bibliographie
Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012)
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
Conference or Workshop Item, Bibliographie
Busch, C. ; Brauckmann, M. ; Veldhuis, R. ; Deravi, F. ; Kevenaar, T. ; Nouak, A. ; Seibert, H. ; Weber, F. ; Suchier, J.-M. (2012)
Towards a more Secure Border Control with 3D Face Recognition.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bunke, Michaela ; Hofrichter, Oliver ; Berger, Bernhard (2012)
The Transitivity of Trust Problem in the Interaction of Android Applications.
doi: 10.1109/ARES.2013.39
Report, Bibliographie
Bartsch, Steffen (2012)
Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization.
Universität Bremen
Ph.D. Thesis, Bibliographie
Bartsch, Steffen ; Sasse, Angela (2012)
How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization.
London, UK
Conference or Workshop Item, Bibliographie
Berchtold, Waldemar ; Schäfer, Marcel ; Zmudzinski, Sascha ; Steinebach, Martin (2012)
Verfahren zur Auswertung von mit Transaktionswasserzeichen markiertem Datenmaterial zwecks Kundenrückverfolgung.
Norm, patent, standard, Bibliographie
Berchtold, Waldemar ; Schäfer, Marcel (2012)
Rebound on Symmetric Tardos Codes.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sasse, Angela
eds.: Ossowski, Sascha ; Lecca, Paola (2012)
Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support.
Trento, Italy
doi: 10.1145/2245276.2232015
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Thies, Andreas (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012)
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
Report, Bibliographie
Bulygin, Stanislav ; Buchmann, Johannes
eds.: Lin, Dongdai ; Tsudik, Gene ; Wang, Xiaoyun (2011)
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48.
Sanya, China
Conference or Workshop Item, Bibliographie
Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011)
Random Oracles in a Quantum World.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Hülsing, Andreas
ed.: Yang, Bo-Yin (2011)
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions.
doi: 10.1007/978-3-642-25405-5_8
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Baier, Harald (2011)
Performance Issues about Context-Triggered Piecewise Hashing.
Dublin
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
POSTER: The Quest for Security against Privilege Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Schulz, Steffen
eds.: Sadeghi, Ahmad-Reza ; Zhang, Xinwen (2011)
Scalable Trust Establishment with Software Reputation.
Chicago, Illinois, USA
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Sadeghi, Ahmad-Reza ; Shastry, Bhargava (2011)
Practical and Lightweight Domain Isolation on Android.
Conference or Workshop Item, Bibliographie
Bodden, Eric (2011)
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander ; Hühnlein, Detlef
eds.: Schartner, Peter ; Taeger, Jürgen (2011)
Mobile Authentisierung und Signatur.
Oldenburg
Conference or Workshop Item, Bibliographie
Braun, Johannes ; Wiesmaier, Alexander ; Klieme, Eric ; Strick, Linda ; Wunderlich, Wolfgang (2011)
Der elektronische Safe als vertrauenswürdiger Cloud Service.
Report, Bibliographie
Bartsch, Steffen (2011)
Exploring Twisted Paths: Analyzing Authorization Processes in Organizations.
Milan, Italy
doi: 10.1109/ICNSS.2011.6060003
Conference or Workshop Item, Bibliographie
Baier, Harald ; Brand, Achim ; Dichtelmüller, Christian ; Roos, Björn (2011)
Zur Komplexität der Mobilfunkforensik am Beispiel des iPhone.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2011)
Practitioners Perspectives on Security in Agile Development.
Vienna, Austria
doi: 10.1109/ARES.2011.82
Conference or Workshop Item, Bibliographie
Bodden, Eric (2011)
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
WODA '11: International Workshop on Dynamic Analysis.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus
eds.: Nitaj, Abderrahmane ; Pointcheval, David (2011)
On the security of the Winternitz one-time signature scheme.
Dakar, Senegal
doi: 10.1007/978-3-642-21969-6_23
Conference or Workshop Item, Bibliographie
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Mühlhäuser, Max
eds.: Aguilera, M. ; Yu, H. ; Vaidya, N. ; Srinivasan, V. ; Choudhury, R. (2011)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking (ICDCN 2011). Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item, Bibliographie
Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Article, Bibliographie
Bodden, Eric (2011)
Defining Access Control Policies as Tracematches.
Report, Bibliographie
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian
eds.: Beklen, A. ; Ejarque, J. ; Gentzsch, W. ; Kanstren, T. ; Koschel, A. ; Lee, Y. W. ; Li, L. ; Zemlicka, M. (2011)
Interactive Access Rule Learning for Access Control: Concepts and Design.
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Davi, Lucas ; Dmitrienko, Alexandra ; Fischer, Thomas ; Sadeghi, Ahmad-Reza (2011)
XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks.
Report, Bibliographie
Bodden, Eric (2011)
Closure Joinpoints: Block joinpoints without surprises.
AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development.
Conference or Workshop Item, Bibliographie
Busch, Christoph ; Korte, Ulrike ; Abt, Sebastian ; Böhm, Christian ; Färber, Ines ; Fries, Sergej ; Merkle, Johannes ; Nickel, Claudia ; Nouak, Alexander ; Opel, Alexander ; Oswald, Annahita ; Seidl, Thomas ; Wackersreuther, Bianca ; Wackersreuther, Peter ; Zhou, Xuebing (2011)
Biometric Template Protection.
In: Datenschutz und Datensicherheit (DuD)
Article, Bibliographie
Bartsch, Steffen (2011)
An Authorization Enforcement Usability Case Study.
Madrid, Spain
doi: 10.1007/978-3-642-19125-1_16
Conference or Workshop Item, Bibliographie
Berchtold, Waldemar ; Zmudzinski, Sascha ; Schäfer, Marcel ; Steinebach, Martin (2011)
Collusion-secure patchwork embedding for transaction watermarking.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011)
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
International Conference on Software Engineering. Waikiki, Honolulu, HI, USA (21-28 May 2011)
doi: 10.1145/1985793.1985827
Conference or Workshop Item, Bibliographie
Bockisch, Christoph ; Sewe, Andreas ; Mezini, Mira ; Akşit, Mehmet
eds.: Bishop, Judith ; Vallecillo, Antonio (2011)
An Overview of ALIA4J: An Execution Model for Advanced-Dispatching Languages.
In: Objects, Models, Components, Patterns
doi: 10.1007/978-3-642-21952-8_11
Book Section, Bibliographie
Bockisch, Christoph ; Sewe, Andreas ; Zandberg, Martin (2011)
ALIA4J's (just-in-time) compile-time MOP for advanced dispatching.
5th workshop on Virtual Machines and Intermediate Languages. Portland, OR, USA (24 Oct 2011)
doi: 10.1145/2095050.2095101
Conference or Workshop Item, Bibliographie
Baier, Harald ; Breitinger, Frank (2011)
Security Aspects of Piecewise Hashing in Computer Forensics.
Conference or Workshop Item, Bibliographie
Biedermann, Alexander ; Stoettinger, Marc ; Chen, Lijing ; Huss, Sorin (2011)
Secure Virtualization within a Multi-Processor Soft-core System-on-Chip Architecture.
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan (2011)
Physically Uncloneable Functions in the Universal Composition Framework.
Conference or Workshop Item, Bibliographie
Biedermann, Sebastian ; Katzenbeisser, Stefan (2011)
Detecting Computer Worms in the Cloud.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Hendren, Laurie (2011)
The Clara framework for hybrid typestate analysis.
In: International Journal on Software Tools for Technology Transfer (Springer)
Article, Bibliographie
Berjani, Betim ; Strufe, Thorsten (2011)
A Recommendation System for Spots in Location-Based Online Social Networks.
Conference or Workshop Item, Bibliographie
Baum-Waidner, Birgit ; Kenyon, Christopher ; Waidner, Michael (2011)
Data network and method for checking nodes of a data network.
Norm, patent, standard, Bibliographie
Beckerle, Matthias ; Martucci, Leonardo ; Mühlhäuser, Max ; Ries, Sebastian (2011)
Interactive Rule Learning for Access Control: Concepts and Design.
In: International Journal on Advances in Intelligent Systems
Book Section, Bibliographie
Bulygin, Stanislav ; Petzoldt, Albrecht ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks.
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Conference or Workshop Item, Bibliographie
Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010)
IDE 2.0: Collective Intelligence in Software Development.
FSE/SDP Workshop on the Future of Software Engineering.
doi: 10.1145/1882362.1882374?
Conference or Workshop Item, Bibliographie
Beckerle, Matthias ; Martucci, Leonardo ; Ries, Sebastian (2010)
Interactive Access Rule Learning: Generating Adapted Access Rule Sets.
Lisbon, Portugal
Conference or Workshop Item, Bibliographie
Bugiel, Sven ; Ekberg, Jan-Erik (2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Conference or Workshop Item, Bibliographie
Baecher, Paul ; Fischlin, Marc ; Gordon, Lior ; Langenberg, Robert ; Lützow, Michael ; Schröder, Dominique (2010)
CAPTCHAs: The Good, the Bad, and the Ugly.
Conference or Workshop Item, Bibliographie
Bradler, Dirk ; Krumov, Lachezar ; Kangasharju, Jussi ; Weihe, Karsten ; Mühlhäuser, Max (2010)
PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks.
12th International Conference on Distributed Computing and Networking. Bangalore, India (02.-05.01.2011)
doi: 10.1007/978-3-642-17679-1_7
Conference or Workshop Item, Bibliographie
Bartsch, Steffen (2010)
A calculus for the qualitative risk assessment of policy override authorization.
Taganrog, Rostov-on-Don, Russian Federation
doi: 10.1145/1854099.1854115
Conference or Workshop Item, Bibliographie
Berta, Mario ; Christandl, Matthias ; Colbeck, Roger ; Renes, Joseph ; Renner, Renato (2010)
The uncertainty principle in the presence of quantum memory.
In: Nature Physics
Article, Bibliographie
Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. (2010)
The PUF Promise.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Cabarcas, Daniel ; Ding, Jintai ; Mohamed, Mohamed Saied Emam
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F_2.
Stellenbosch, South Africa
Conference or Workshop Item, Bibliographie
Bedner, Mark (2010)
„Deep Packet Inspection“ – Technologie und rechtliche Initiativen.
In: Computer und Recht (CR)
Article, Bibliographie
Buchmann, Johannes ; Wiesmaier, Alexander (2010)
Eine kurze Geschichte der Schlüssel.
In: 360° -- Fachmagazin für das Management im öffentlichen Sektor, (17)
Article, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2010)
Unlinkability of Sanitizable Signatures.
Conference or Workshop Item, Bibliographie
Brucker, Achim ; Petritsch, Helmut ; Weber, Stefan (2010)
Attribute-based Encryption with Break-Glass.
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Brickenstein, Michael (2010)
Obtaining and solving systems of equations in key variables only for the small variants of AES.
In: Mathematics in Computer science Special Issue "Symbolic Computation and Cryptography", 2 (3)
doi: 10.1007/s11786-009-0020-y
Article, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Woungang, Isaac ; Misra, Sudip ; Misra, Subhas Chandra (2010)
Decoding and Finding the Minimum Distance with Gröbner Bases: History and New Insights.
In: Selected Topics in Information and Coding Theory
Book Section, Bibliographie
Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Mezini, Mira (2010)
Taming Reflection: Static Analysis in the Presence of Reflection and Custom Class Loaders.
Report, Bibliographie
Bartsch, Steffen (2010)
Supporting Authorization Policy Modification in Agile Development of {Web} Applications.
Krakow, Poland
doi: 10.1109/ARES.2010.19
Conference or Workshop Item, Bibliographie
Baier, Harald ; Busch, Christoph
ed.: Hochschule Darmstadt (3094) (2010)
CASED - EIN DARMSTÄDTER FORSCHUNGSZENTRUM ENTWICKELT IT-SICHERHEITSBAUSTEINE VON MORGEN.
In: Querschnitt - Beiträge aus Forschung und Entwicklung
Book Section, Bibliographie
Backs, Christian (2010)
Anbindung eines externen Authentifizierungsdienstes an ein Online-Wahlsystem.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Bijker, Remko ; Bockisch, Christoph ; Sewe, Andreas (2010)
Optimizing the evaluation of patterns in pointcuts.
Workshop on Virtual Machines and Intermediate Languages. Reno, Nevada, USA (17 Oct 2010)
Conference or Workshop Item, Bibliographie
Barreto, Paulo ; Cayrel, Pierre-Louis ; Misoczki, Rafael ; Niebuhr, Robert (2010)
Quasi-dyadic CFS signatures.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes (2010)
Einführung in die Kryptographie / Introduction to Cryptography.
Book, Bibliographie
Benlian, Alexander ; Hess, Thomas ; Buxmann, Peter (2010)
Chancen und Risiken des Einsatzes von SaaS – die Sicht der Anwender.
In: Wirtschaftsinformatik und Management, 2 (2)
Article, Bibliographie
Buchmann, Johannes ; Braun, Johannes ; Horsch, Moritz ; Hühnlein, Detlef ; Kiefer, Franziskus ; Strenzke, Falko ; Wiesmaier, Alexander (2010)
Towards a mobile eCard Client.
Darmstadt
Conference or Workshop Item, Bibliographie
Busch, Christoph ; Hartung, Daniel (2010)
Biometrische Nachrichten-Authentisierung.
Conference or Workshop Item, Bibliographie
Busch, Christoph ; Abt, Sebastian ; Nickel, Claudia ; Korte, Ulrike ; Zhou, Xuebing (2010)
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien.
Conference or Workshop Item, Bibliographie
Breitinger, Frank ; Nickel, Claudia (2010)
User Survey on Phone Security and Usage.
Conference or Workshop Item, Bibliographie
Braun, Michael ; Meyer, Ulrike ; Wetzel, Susanne (2010)
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Conference or Workshop Item, Bibliographie
Bedner, Mark ; Ackermann, Tobias (2010)
Schutzziele der IT-Sicherheit.
In: Datenschutz und Datensicherheit (DuD), 34 (5)
doi: 10.1007/s11623-010-0096-1
Article, Bibliographie
Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul (2009)
PUF-Based Authentication Protocols, Revisited.
Conference or Workshop Item, Bibliographie
Boldyreva, Alexandra ; Cash, David ; Fischlin, Marc ; Warinschi, Bogdan (2009)
Foundations of Non-Malleable Hash and One-Way Functions.
Conference or Workshop Item, Bibliographie
Bras-Amoros, Maria ; Bulygin, Stanislav (2009)
Towards a Better Understanding of the Semigroup Tree.
In: Semigroup Forum, 79 (3)
doi: 10.1007/s00233-009-9175-8
Article, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud (2009)
Bounded distance decoding of linear error-correcting codes with Gröbner bases.
In: Journal of Symbolic Computation, 44 (12)
doi: 10.1016/j.jsc.2007.12.003
Article, Bibliographie
Braun, Johannes (2009)
Nutzung des elektronischen Personalausweises im eCommerce.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Bissmeyer, Norbert ; Stuebing, Hagen ; Matthess, Manuel ; Stotz, Jan Peter ; Schütte, Julian ; Gerlach, Matthias ; Friederici, Florian (2009)
simTD Security Architecture:Deployment of a Security and Privacy Architecture in Field Operational Tests.
Conference or Workshop Item, Bibliographie
Bedner, Mark (2009)
Rechtmäßigkeit der "Deep Packet Inspection".
Other, Bibliographie
Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef
eds.: Brömme, Arslan ; Busch, Christoph ; Hühnlein, Detlef (2009)
BIOSIG 2009: Biometrics and Electronic Signatures – Research and Applications.
Conference or Workshop Item, Bibliographie
Baier, Harald ; Straub, Tobias (2009)
Vom elektronischen Reisepass zum Personalausweis: RFID und personenbezogene Daten -- Lessons Learned!?
Conference or Workshop Item, Bibliographie
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS resistant P2P topologies for live multimedia streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 20 (6)
Article, Bibliographie
Blass, Erik-Oliver ; Kurmus, Anil ; Molva, Refik ; Strufe, Thorsten (2009)
PSP : private and secure payment with RFID WPES 2009.
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Lehmann, Anja ; Schröder, Dominique (2009)
Sanitizable Signatures: How to Partially Delegate Control for Authenticated Data.
Conference or Workshop Item, Bibliographie
Busch, Christoph ; Reimer, Helmut (2009)
Biometrie in neuem Licht?
In: Datenschutz und Datensicherheit (DuD), (5)
Article, Bibliographie
Busch, Christoph (2009)
Biometrie und Identitätsdiebstahl.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Busch, Christoph (2009)
Forschung für die Grenzkontrollen der Zukunft.
In: Querschnitt – Beiträge aus Forschung und Entwicklung
Article, Bibliographie
Busch, Christoph (2009)
Biometrie – Beschleuniger oder Bremser von Identitätsdiebstahl.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Roßnagel, Alexander (2009)
Das Bundesverfassungsgericht und Telemedienwahlen.
In: K&R, 9
Article, Bibliographie
Baier, Harald ; Karatsiolis, Vangelis (2009)
Validity Models of Electronic Signatures and their Enforcement in Practice.
Conference or Workshop Item, Bibliographie
Baier, Harald ; Straub, Tobias (2009)
A Note on the Protection Level of Biometric Data in Electronic Passports.
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav (2009)
Computer algebra in coding theory and cryptanalysis: Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Book, Bibliographie
Bender, Jens ; Fischlin, Marc ; Kügler, Dennis (2009)
Security Analysis of the PACE Key-Agreement Protocol.
Conference or Workshop Item, Bibliographie
Buchmann, Johannes ; Karatsiolis, Vangelis (2009)
Notification Services for the Server-Based Certificate Validation Protocol.
In: Int'l J. of Communications, Network and System Sciences, 2 (5)
doi: 10.4236/ijcns.2009.25042
Article, Bibliographie
Bulygin, Stanislav (2009)
Polynomial system solving for decoding linear codes and algebraic cryptanalysis.
Technische Universität Kaiserslautern
Ph.D. Thesis, Bibliographie
Biere, Thomas ; Schindler, Werner
eds.: Horster, P. ; Schartner, P. (2009)
Langzeitarchive: Verlust der Sicherheitseignung der Hashfunktion.
Klagenfurt
Conference or Workshop Item, Bibliographie
Bradler, Dirk ; Mühlhäuser, Max ; Kangasharju, Jussi (2009)
Demonstration of first response communication sandbox.
6th IEEE Conference on Consumer Communications and Networking Conference. Las Vegas, USA (11.-13.01.2009)
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Sohr, Karsten ; Bormann, Carsten (2009)
Supporting Agile Development of Authorization Rules for SME Applications.
Orlando, FL, USA
doi: 10.1007/978-3-642-03354-4_35
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Chen, Feng ; Rosu, Grigore (2009)
Dependent advice: A general approach to optimizing history-based aspects.
Report, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud
eds.: Sala, M. ; Mora, T. ; Perret, L. ; Sakata, S. ; Traverso, C. (2009)
Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases.
In: Gröbner Bases, Coding, and Cryptography
Book Section, Bibliographie
Bilge, Leyla ; Strufe, Thorsten ; Balzarotti, Davide ; Kirda, Engin (2009)
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.
Conference or Workshop Item, Bibliographie
Brinkmeier, Michael ; Fischer, Mathias ; Grau, Sascha ; Schäfer, Günter ; Strufe, Thorsten (2009)
Methods for Improving Resilience in Communication Networks and P2P Overlays.
In: Praxis der Informationsverarbeitung und Kommunikation (PIK), 33 (1)
Article, Bibliographie
Brinkmeier, Michael ; Schäfer, Günter ; Strufe, Thorsten (2009)
Optimally DoS--resistant P2P Topologies for Live Multimedia Streaming.
In: IEEE Transactions on Parallel and Distributed Systems, 99
Article, Bibliographie
Buchmann, Johannes ; Lindner, Richard ; Rückert, Markus ; Schneider, Michael (2009)
Post-quantum cryptography: lattice signatures.
In: Special Issue of Computing (CECC 2008)
Article, Bibliographie
Bedner, Mark (2009)
Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), Juni 2009
Article, Bibliographie
Bokor, Peter ; Serafini, Marco ; Suri, Neeraj ; Veith, Helmut (2009)
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support.
Conference or Workshop Item, Bibliographie
Brzuska, Christina ; Fischlin, Marc ; Freudenreich, Tobias ; Lehmann, Anja ; Page, Marcus ; Schelbert, Jakob ; Schröder, Dominique ; Volk, Florian (2009)
Security of Sanitizable Signatures Revisited.
Conference or Workshop Item, Bibliographie
Breebaart, Jeroen ; Yang, Bian ; Buhan, Ileana ; Busch, Christoph (2009)
Biometric Template Protection – The need for open standards.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Bradler, Dirk ; Kangasharju, Jussi ; Mühlhäuser, Max (2008)
Optimally Efficient Prefix Search and Multicast in Structured P2P Networks.
Report, Bibliographie
Bergmann, Gabor ; Ökrös, András ; Ráth, Istvan ; Varro, Daniel ; Varró, Gergely (2008)
Incremental Pattern Matching in the VIATRA Model Transformation System.
Conference or Workshop Item, Bibliographie
Bradler, Dirk ; Panitzek, Kamill ; Schweizer, Immanuel ; Mühlhäuser, Max (2008)
First Response Communication Sandbox.
11th communications and networking simulation symposium (CNS '08). Ottawa, Canada (14.-17.04.2008)
doi: 10.1145/1400713.1400733
Conference or Workshop Item, Bibliographie
Brickenstein, Michael ; Bulygin, Stanislav
eds.: Faugere, J.-C. ; Wang, D. (2008)
Attacking AES via Solving Systems in the Key Variables Only.
Conference or Workshop Item, Bibliographie
Bartsch, Steffen ; Bormann, Carsten
ed.: Horster, Patrick (2008)
Berechtigungsmodellierung im Geschäftsprozessmanagement von KMU.
Conference or Workshop Item, Bibliographie
Bodden, Eric ; Hendren, Laurie ; Lam, Patrick ; Lhoták, Ondrej ; Naeem, Nomair (2008)
Collaborative Runtime Verification with Tracematches.
In: Oxford Journal of Logics and Computation, 2008
Article, Bibliographie
Bodden, Eric ; Havelund, Klaus (2008)
Racer: Effective Race Detection Using AspectJ.
In: International Symposium on Software Testing and Analysis (ISSTA 2008)
Article, Bibliographie
Buchmann, Johannes ; Dahmen, Erik ; Schneider, Michael
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Merkle Tree Traversal Revisited.
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav ; Pellikaan, Ruud (2007)
Decoding error-correcting codes with Groebner bases.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Basin, David ; Waidner, Michael (2007)
Preface.
In: Journal of Computer Security, 15 (6)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2007)
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems.
In: Information and Computation, 205 (12)
Article, Bibliographie
Bulygin, Stanislav (2006)
Generalized Hermitian Codes over GF(2^r).
In: IEEE Transactions on Information Theory, 52 (10)
doi: 10.1109/TIT.2006.881831
Article, Bibliographie
Bulygin, Stanislav (2006)
Some Problems from Coding Theory and Cryptography.
Technische Universität Kaiserslautern
Master Thesis, Bibliographie
Backes, Michael ; Karjoth, Günter ; Pitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Method for creating and verifying a privacy policy from a process model, and corresponding computing device and computer program element.
Norm, patent, standard, Bibliographie
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael (2006)
Verifiable Agreement: Limits of Non-Repudiation in Mobile Peer-to-Peer
Ad Hoc Networks.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Non-determinism in multi-party computation.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Formal Methods and Cryptography.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2006)
Soundness limits of Dolev-Yao models.
Report, Bibliographie
Bangerter, Endre Felix ; Camenisch, Jan ; Schunter, Matthias ; Waidner, Michael (2006)
Method, system and computer program product for privacy-protecting integrity attestation of computing platform.
Norm, patent, standard, Bibliographie
Backes, Michael ; Karioth, Guenter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Creating a Privacy Policy From a Process Model and Verifying the Compliance.
Norm, patent, standard, Bibliographie
Bussani, Anthony ; Griffin, John Linwood ; Jansen, Bernhard ; Julisch, Klaus ; Karjoth, Günter ; Maruyama, Hiroshi ; Nakamura, Megumi ; Perez, Ronald ; Schunter, Matthias ; Tanner, Axel ; Doorn, Leendert Van ; Herreweghen, Els Van ; Waidner, Michael ; Yosh, Sachiko (2005)
Trusted Virtual Domains: Secure Foundations for Business and IT Services.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
On the Cryptographic (Un-)Soundness of Dolev-Yao Style Hash Functions.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Justifying a Dolev-Yao Model under Active Attacks.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Symmetric Authentication Within a Simulatable Cryptographic Library.
In: International Journal of Information Security (IJIS), Springer-Verlag, 4 (3)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2005)
Reactively Secure Signature Schemes.
In: International Journal of Information Security (IJIS), 4 (4)
Article, Bibliographie
Bangerter, Endre ; Schunter, Matthias ; Waidner, Michael ; Camenisch, Jan (2005)
Privacy-protecting Integrity Attestation of a Computing Platform.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
Low-Level Ideal Signatures and General Integrity Idealization.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2004)
A General Composition Theorem for Secure Reactive Systems.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2004)
Polynomial Liveness.
In: Journal of Computer Security (JCS), 12 (3-4)
Article, Bibliographie
Betz, Linda ; Dayka, John ; Farrell, Walter ; Guski, Richard ; Karjoth, Günter ; Nelson, Mark ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2004)
Implementation and Use of a PII Data Access Control Facility Emlploying Personally Identifying Information Labels and Purpose Serving Function Sets.
Norm, patent, standard, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library.
Report, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
A Universally Composable Cryptographic Library with Nested Operations.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Reactively Secure Signature Schemes.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Symmetric Authentication Within a Simulatable Cryptographic Library.
Conference or Workshop Item, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Waidner, Michael (2003)
Security in Business Process Engineering.
Conference or Workshop Item, Bibliographie
Bulygin, Stanislav (2003)
On estimation of one cryptographic function using algebraic geometric codes technique.
In: Bulletin of the University of Kiev, Series: Physics&Mathematics, (2)
Article, Bibliographie
Backes, Michael ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
Polynomial Fairness and Liveness.
Conference or Workshop Item, Bibliographie
Buhler, Peter ; Eirich, Thomas ; Steiner, Michael ; Waidner, Michael (2000)
Secure Password-based Cipher Suite for TLS.
Conference or Workshop Item, Bibliographie
Baum-Waidner, Birgit ; Waidner, Michael (2000)
Round-optimal and Abuse-free Optimistic Multi-Party Contract Signing.
Conference or Workshop Item, Bibliographie
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000)
Design, Implementation and Deployment of the iKP Secure Electronic
Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4)
Article, Bibliographie
Baum-Waidner, Birgit ; Waidner, Michael (1998)
Optimistic Asynchronous Multi-Party Contract Signing.
Report, Bibliographie
Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995)
iKP -- a family of secure electronic payment protocols.
Conference or Workshop Item, Bibliographie
Boly, Jean-Paul ; Bosselaers, Antoon ; Cramer, Ronald ; Michelsen, Rolf ; Mjolsnes, Stig ; Muller, Frank ; Pedersen, Torben ; Pfitzmann, Birgit ; Rooij, Peter de ; Schoenmakers, Berry ; Schunter, Matthias ; Vallée, Luc ; Waidner, Michael (1994)
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Conference or Workshop Item, Bibliographie
Bleumer, Gerrit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
A remark on a signature scheme where forgery can be proved.
Conference or Workshop Item, Bibliographie
Baum-Waidner, Birgit ; Pfitzmann, Birgit ; Waidner, Michael (1991)
Unconditional Byzantine Agreement with Good Majority.
Conference or Workshop Item, Bibliographie
C
Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016)
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
Conference or Workshop Item, Bibliographie
Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016)
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
Conference or Workshop Item, Bibliographie
Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015)
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6)
Article, Bibliographie
Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015)
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Conference or Workshop Item, Bibliographie
Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015)
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
Conference or Workshop Item, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Return to Where? You Can't Exploit What You Can't Find.
Conference or Workshop Item, Bibliographie
Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015)
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
Report, Bibliographie
Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015)
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015)
Learn To Spot Phishing URLs with the Android NoPhish App.
Hamburg, Germany
doi: 10.1007/978-3-319-18500-2_8
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015)
NoPhish App Evaluation: Lab and Retention Study.
San Diego
Conference or Workshop Item, Bibliographie
Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015)
A Distributed Reputation System for Certification Authority Trust Management.
Helsinki, Finland
Conference or Workshop Item, Bibliographie
Charfi, Ahmed (2014)
SAT-solving in Algebraic cryptanalysis.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014)
Poster: Password Entering and Transmission Security.
ACM SIGSAC Conference on Computer and Communications Security. Scottsdale, Arizona (November 3-7, 2014)
doi: 10.1145/2660267.2662387
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Glasgow, UK
Conference or Workshop Item, Bibliographie
Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
eds.: Mauw, Sjouke ; Jensen, Christian Damsgaard (2014)
NoPhish: An Anti-Phishing Education App.
Wroclaw, Poland
Conference or Workshop Item, Bibliographie
Conrad, Bernd ; Shirazi, Fatemeh (2014)
A Survey on Tor and I2P.
Paris, France
Conference or Workshop Item, Bibliographie
Carmo, Rodrigo do ; Hollick, Matthias (2014)
Analyzing Active Probing for Practical Intrusion Detection in Wireless Multihop Networks.
11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services (WONS 2014). Obergurgl, Austria (2-4 April 2014)
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014)
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)
Book Section, Bibliographie
Conrad, Bernd (2014)
Analyzing the Effectiveness of DoS Attacks on Tor.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Classen, Jiska (2014)
Reputation Systems for Trust Management in the Web PKI.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014)
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP)
Article, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014)
A trusted versioning file system for passive mobile storage devices.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias (2013)
uSafe: A Privacy-aware and Participative Mobile Application for Citizen Safety in Urban Environments.
In: Pervasive and Mobile Computing (PMC), 9 (5)
Article, Bibliographie
Carmo, Rodrigo do ; Hollick, Matthias (2013)
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks.
In: Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
doi: 10.1145/2463183.2463187
Article, Bibliographie
Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013)
Provably Secure LWE-Encryption with Uniform Secret.
In: Cryptology ePrint Archive, 2013 (164)
Article, Bibliographie
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2013)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
In: Pervasive and Mobile Computing, 9 (3)
Article, Bibliographie
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela (2013)
Share with Strangers: Privacy Bubbles as User-centered Privacy Control for Mobile Content Sharing Applications.
In: Information Security Technical Report (ISTR), 17 (3)
Article, Bibliographie
Christin, Delphine ; Büchner, C. ; Leibecke, N. (2013)
What’s the Value of Your Privacy? Exploring Factors that Influence Privacy-sensitive Contributions to Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Hollick, Matthias
eds.: Gutwirth, Serge ; Leenes, Ronald ; Hert, Paul De ; Poullet, Yves (2013)
European Data Protection: Coming of Age.
Book Section, Bibliographie
Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013)
k-anonymous reputation.
Hangzhou, China
doi: 10.1145/2484313.2484361
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias (2013)
On the Efficiency of Privacy-preserving Path Hiding for Mobile Sensing Applications.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Reinhardt, Andreas ; Hollick, Matthias ; Trumpold, K. (2012)
Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications.
Conference or Workshop Item, Bibliographie
Carmo, R. do ; Werner, M. ; Hollick, Matthias (2012)
Signs of a Bad Neighborhood: A Lightweight Metric for Anomaly Detection in Mobile Ad Hoc Networks.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Büttner, C. ; Repp, Nicolas (2012)
CachedSensing: Exploring and Documenting the Environment as a Treasure Hunt.
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Véron, Pascal ; Hoffmann, Gerhard (2012)
An improved threshold ring signature scheme based on error correcting codes.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Sánchez López, P. ; Reinhardt, Andreas ; Hollick, Matthias ; Kauer, Michaela
eds.: Askoxylakis, Ioannis ; Pöhls, Henrich ; Posegga, Joachim (2012)
Information Security Theory and Practice -- Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems.
In: Proceedings of the 6th Workshop in Information Security Theory and Practice (WISTP)
Book Section, Bibliographie
Christin, Delphine ; Bentolila, A. ; Hollick, Matthias (2012)
Friend is Calling: Exploiting Mobile Phone Data to Help Users in Setting their Privacy Preferences.
Conference or Workshop Item, Bibliographie
Czajkowski, Katja ; Schneider, Markus ; Wolf, Ruben ; Yannikos, York (2012)
Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern.
Report, Bibliographie
Christin, Delphine ; Roßkopf, C. ; Hollick, Matthias ; Martucci, Leonardo ; Kanhere, Salil (2012)
IncogniSense: An Anonymity-preserving Reputation Framework for Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie
Cuong, N. ; Katzenbeisser, Stefan (2012)
Robust Resampling Detection in Digital Images.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2011)
A Survey on Privacy in Mobile Participatory Sensing Applications.
In: The Journal of Systems & Software, 84 (11)
doi: 10.1016/j.jss.2011.06.073
Article, Bibliographie
Christin, Delphine ; Guillemet, J. ; Reinhardt, Andreas ; Hollick, Matthias ; Kanhere, Salil (2011)
Privacy-preserving Collaborative Path Hiding for Participatory Sensing Applications.
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Hoffmann, Gerhard ; Meziani, Mohammed ; Niebuhr, Robert
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Recent Progress in Code-Based Cryptography.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el ; Günther, Felix ; Hoffmann, Gerhard ; Rothe, Holger (2011)
Efficient implementation of code-based identification/signature schemes.
In: WEWoRC 2011
Article, Bibliographie
Christin, Delphine ; Freudenreich, Tobias ; Hollick, Matthias (2011)
A Picture is Worth a Thousand Words: Privacy-aware and Intuitive Relationship Establishment in Online Social Networks.
Conference or Workshop Item, Bibliographie
Canova, Gamze (2011)
A Survey of Security Mechanisms to Verify the Integrity and Authenticity of Multimedia-based Data.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Hoffmann, Gerhard ; Schneider, Michael (2011)
GPU Implementation of the Keccak Hash Function Family.
Brno University, Czech Republic
Conference or Workshop Item, Bibliographie
Cuong, N. ; Katzenbeisser, Stefan (2011)
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
Conference or Workshop Item, Bibliographie
Cuong, N. ; Katzenbeisser, Stefan (2011)
Security of Copy-Move Forgery Detection Techniques.
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Hollick, Matthias (2011)
We Must Move - We Will Move: On Mobile Phones as Sensing Platforms.
Conference or Workshop Item, Bibliographie
Camenisch, Jan ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2011)
Reducing access to sensitive information.
Norm, patent, standard, Bibliographie
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
Improved Zero-knowledge Identification with Lattices.
Malacca, Malaysia (October 13 - 15, 2010)
Conference or Workshop Item, Bibliographie
Chen, Liqun ; Dietrich, Kurt ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Winter, Johannes (2010)
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Conference or Workshop Item, Bibliographie
Checkoway, Stephen ; Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Shacham, Hovav ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns.
Chicago, Illinois, USA
doi: 10.1145/1866307.1866370
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Reinhardt, Andreas ; Kanhere, Salil ; Hollick, Matthias (2010)
Fine-grained Access Control Enabling Privacy Support in Wireless Sensor Networks (Extended Abstract).
Conference or Workshop Item, Bibliographie
Christin, Delphine ; Hollick, Matthias ; Manulis, Mark (2010)
Security and Privacy Objectives for Sensing Applications in Wireless Community Networks (Invited Paper).
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Lindner, Richard ; Rückert, Markus ; Silva, Rosemberg (2010)
A Lattice-Based Threshold Ring Signature Scheme.
Puebla, Mexico (August 8-11, 2010)
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Véron, Pascal ; Yousfi Alaoui, Sidi Mohamed el (2010)
A zero-knowledge identification scheme based on the q-ary Syndrome Decoding problem.
SAC2010
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Meziani, Mohammed (2010)
Post-Quantum Cryptography: Code-based Signatures.
Conference or Workshop Item, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Winandy, Marcel (2010)
Trusted Virtual Domains: Color Your Network.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Christin, Delphine ; Mogre, Parag S. ; Hollick, Matthias (2010)
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives.
In: Future Internet, 2
doi: 10.3390/fi2020096
Article, Bibliographie
Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el (2010)
Dual Construction of Stern-based Signature Schemes.
Conference or Workshop Item, Bibliographie
Cayrel, Pierre-Louis ; Strenzke, Falko (2010)
Side channels attacks in code-based cryptography.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Manulis, Mark ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2010)
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network.
Conference or Workshop Item, Bibliographie
Catuogno, Luigi ; Dmitrienko, Alexandra ; Eriksson, Konrad ; Kuhlmann, Dirk ; Ramunno, Gianluca ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Schunter, Matthias ; Winandy, Marcel ; Zhan, Jing (2009)
Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Conference or Workshop Item, Bibliographie
Charnes, Christopher
eds.: Atallah, Mikhail ; Blanton, Marina (2009)
Algorithms and Theory of Computation Handbook.
Book Section, Bibliographie
Catuogno, Luigi ; Löhr, Hans ; Manulis, Mark ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Transparent Mobile Storage Protection in Trusted Virtual Domains.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging social links for trust and privacy in networks.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy preserving social networking through decentralization.
Conference or Workshop Item, Bibliographie
Charfi, Anis ; Dinkelaker, Tom ; Mezini, Mira (2009)
A Plugin-Architecture for Self-Adaptive WS Compositions.
Los Angeles, CA, USA
doi: 10.1109/ICWS.2009.125
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Leveraging Social Links for Trust and Privacy in Networks.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Privacy Preserving Social Networking Through Decentralization.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network.
Conference or Workshop Item, Bibliographie
Cutillo, Leucio-Antonio ; Molva, Refik ; Strufe, Thorsten (2009)
Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust.
In: IEEE Communications Magazine, 47 (12)
Article, Bibliographie
Camenisch, Jan ; Waidner, Michael (2004)
Minimizing information gathered by access decision engines in access control systems.
Norm, patent, standard, Bibliographie
Camenisch, Jan ; Herreweghen, Els Van ; Waidner, Michael (2003)
Anonymous Access to a Service.
Norm, patent, standard, Bibliographie
Camenisch, Jan ; Waidner, Michael (2001)
Zurückhaltung bei der Preisgabe von Daten Pseudonyme für
den elektronischen Geschäftsverkehr.
In: Neue Zürcher Zeitung (NZZ), 9
Article, Bibliographie
Carter, Bob ; Pfitzmann, Birgit ; Schunter, Matthias ; Stanford, Chris ; Waidner, Michael ; Weber, Arnd (1995)
Secure International Payment and Information Transfer - Towards a
Multi-Currency Electronic Wallet.
Report, Bibliographie
D
Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Conference or Workshop Item, Bibliographie
Deckwerth, Frederik (2017)
Static Verification Techniques for Attributed Graph Transformations.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016)
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Conference or Workshop Item, Bibliographie
Dix, Isabella (2016)
Implementation of a Reputation System for CA Trust Management.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016)
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76
doi: 10.1016/j.comcom.2015.11.004
Article, Bibliographie
Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016)
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
Las Vegas, USA
doi: 10.1109/CCNC.2016.7444871
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza (2015)
Building Secure Defenses Against Code-Reuse Attacks.
doi: 10.1007/978-3-319-25546-0
Book, Bibliographie
Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015)
Learning With Errors in the Exponent.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015)
A View on Privacy & Trust in IoT.
First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC). London, UK
doi: 10.1109/ICCW.2015.7247581
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Lancrenon, Jean (2015)
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
Report, Bibliographie
Dogan, Ferit (2015)
Design and Implementation of Plug-ins for JCrypTool.
Technische Universität Darmstadt
Diploma Thesis or Magisterarbeit, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015 - 11.02.2015)
doi: 10.14722/ndss.2015.23113
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; Ramos, Marcos da Silva ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015)
Market-driven Code Provisioning to Mobile Secure Hardware.
Conference or Workshop Item, Bibliographie
Daubert, Jörg ; Fischer, Mathias ; Böck, Leon ; Kikiras, Panayotis ; Mühlhäuser, Max (2014)
Twitterize: Anonymous Micro-Blogging.
International Workshop on Internet of Things, Systems, Management and Security (IOTSMS), ACS International Conference on Computer Systems and Applications (AICCSA).
doi: 10.1109/AICCSA.2014.7073285
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (November 07 - 07, 2014)
doi: 10.1145/2664168.2664181
Conference or Workshop Item, Bibliographie
Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014)
The Cubic Simple Matrix Encryption Scheme.
Waterloo, Canada
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
Istanbul, Turkey
doi: 10.1007/978-3-319-21356-9_11
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014)
High-speed signatures from standard lattices.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014)
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014 – 22.08.2014)
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18 (4)
Article, Bibliographie
Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014)
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014)
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Report, Bibliographie
Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014)
On the (In)Security of Mobile Two-Factor Authentication.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014)
POSTER: On Offline Payments with Bitcoin.
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Venturi, Daniele (2014)
A Second Look at Fischlin’s Transformation.
Marrakech, Morocco
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc (2014)
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
Honolulu HI USA
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
Conference or Workshop Item, Bibliographie
Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Conference or Workshop Item, Bibliographie
Demmler, Daniel (2013)
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Daubert, Jörg ; Fischer, Mathias ; Schiffner, Stefan ; Mühlhäuser, Max
eds.: Lopez, Javier ; Huang, Xinyi ; Sandhu, Ravi (2013)
Distributed and Anonymous Publish-Subscribe.
7th International Conference on Network and System Security. Madrid, Spain
doi: 10.1007/978-3-642-38631-2_57
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013)
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
Conference or Workshop Item, Bibliographie
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234)
Article, Bibliographie
Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Article, Bibliographie
Demirel, Denise ; Henning, Maria ; Graaf, Jeroen van de ; Ryan, Peter Y. A. ; Buchmann, Johannes
eds.: Heather, James ; Schneider, Steve ; Teague, Vanessa (2013)
Prêt à Voter Providing Everlasting Privacy.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in the Quantum World.
Bangalore, India
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013)
A Cryptographic Analysis of OPACITY.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012)
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria (2012)
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht
Article, Bibliographie
Demirel, Denise ; Graaf, Jeroen van de ; Araújo, Roberto (2012)
Improving Helios with Everlasting Privacy Towards the Public.
Bellevue, WA
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012)
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
Conference or Workshop Item, Bibliographie
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2012)
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
In: Wireless Networks, Springer US, 18
doi: 10.1007/s11276-012-0505-5
Article, Bibliographie
Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012)
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Kowalski, Christoph ; Winandy, Marcel (2011)
Trusted Virtual Domains on OKL4: Secure Information Sharing on Smartphones.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
POSTER: Control-Flow Integrity for Smartphones.
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Henning, Maria ; Ryan, Peter Y. A. ; Schneider, Steve ; Volkamer, Melanie (2011)
Feasibility Analysis of Pret a Voter for German Federal Elections.
Tallinn, Estonia
doi: 10.1007/978-3-642-32747-6_10
Conference or Workshop Item, Bibliographie
Demirel, Denise ; Frankland, Richard ; Volkamer, Melanie (2011)
Readiness of various eVoting systems for complex elections.
Report, Bibliographie
Demmler, Daniel (2011)
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Demirel, Denise ; Frankland, Richard ; Popovic, Darko ; Volkamer, Melanie
eds.: Parycek, Peter ; Kripp, Melanie J. ; Edelmann, Noella (2011)
Voting software to support election preparation, counting, and tallying.
Conference for E-Democracy and Open Government (CeDEM11). Krems, Austria (05.-06.05.2011)
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
A Security Architecture for Accessing Health Records on Mobile Phones.
Rome, Italy
Conference or Workshop Item, Bibliographie
Dubuis, Eric ; Spycher, Oliver ; Volkamer, Melanie (2011)
Vertrauensbildung bei Internetwahlen.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Egele, Manuel ; Fischer, Thomas ; Holz, Thorsten ; Hund, Ralf ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2011)
CFI Goes Mobile: Control-Flow Integrity for Smartphones.
In: International Workshop on Trustworthy Embedded Devices (TrustED)
Book Section, Bibliographie
Djatmiko, Mentari ; Boreli, Roksana ; Seneviratne, Aruna ; Ries, Sebastian (2011)
Trust-based Content Distribution for Mobile Ad Hoc Networks.
Conference or Workshop Item, Bibliographie
Dmitrienko, Alexandra ; Hadzic, Zecir ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Securing the Access to Electronic Health Records on Mobile Phones.
Conference or Workshop Item, Bibliographie
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Secure Computations on Real-Valued Signals.
Conference or Workshop Item, Bibliographie
Dagdelen, Özgür ; Fischlin, Marc (2010)
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Boca Raton, USA
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Privilege Escalation Attacks on Android.
Boca Raton, Florida, USA
Conference or Workshop Item, Bibliographie
Demirel, Denise (2010)
Effizientes Lösen linearer Gleichungssysteme über GF(2) mit GPUs.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Davi, Lucas ; Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Return-Oriented Programming without Returns on ARM.
Report, Bibliographie
Dagdelen, Özgür ; Schneider, Michael (2010)
Parallel Enumeration of Shortest Lattice Vectors.
Conference or Workshop Item, Bibliographie
Dent, Alexander ; Fischlin, Marc ; Manulis, Mark ; Schröder, Dominique ; Stam, Martijn (2010)
Confidential Signatures and Deterministic Signcryption.
Conference or Workshop Item, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks.
Report, Bibliographie
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010)
Towards Secure Bioinformatics Services.
Conference or Workshop Item, Bibliographie
Datta, Anwitaman ; Buchegger, Sonja ; Vu, Le-Hung ; Rzadca, Krzysztof ; Strufe, Thorsten
ed.: Furht, Borko (2010)
Handbook of Social Network Technologies and Applications.
Book Section, Bibliographie
Derawi, Mohammad ; Nickel, Claudia ; Bours, Patrick ; Busch, Christoph (2010)
Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition.
Conference or Workshop Item, Bibliographie
Dahmen, Erik ; Krauß, Christoph
eds.: Garay, Christoph A. ; Miyaji, Atsuko ; Otsuka, Akira (2009)
Short Hash-Based Signatures for Wireless Sensor Networks.
Kanazawa, Japan
Conference or Workshop Item, Bibliographie
Deußer, Clemens ; Reubold, Jan (2009)
Design und Implementierung kryptographischer Funktionen und Protokolle des elektronischen Personalausweises.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Davi, Lucas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Chicago, Illinois, USA
doi: 10.1145/1655108.1655117
Conference or Workshop Item, Bibliographie
Dobre, Dan ; Majuntke, Matthias ; Serafini, Marco ; Suri, Neeraj (2009)
Efficient Robust Storage Using Secret Tokens.
Conference or Workshop Item, Bibliographie
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
eds.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Conference or Workshop Item, Bibliographie
Detken, Kai-Oliver ; Gitz, Stephan ; Bartsch, Steffen ; Sethmann, Richard
ed.: Horster, Patrick (2008)
Trusted Network Connect -- {Sicherer Zugang ins Unternehmensnetz}.
Conference or Workshop Item, Bibliographie
E
Erbenich, Vanessa (2016)
On the Efficiency of Lattice-Based Encryption.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013)
Ethical Considerations When Employing Fake Identities for Research in OSN.
Article, Bibliographie
Egert, Rolf (2013)
Lattice-based Signatures.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Engels, Heinrich-Alexander (2012)
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Eichberg, Michael ; Sewe, Andreas (2011)
Encoding the Java Virtual Machine's Instruction Set.
Fifth Workshop on Bytecode Semantics, Verification, Analysis and Transformation (Bytecode 2010). Paphos, Cyprus (27 Mar 2010)
doi: 10.1016/j.entcs.2011.02.004
Conference or Workshop Item, Bibliographie
Eikemeier, Oliver ; Fischlin, Marc ; Goetzmann, Jens-Fabian ; Lehmann, Anja ; Schroeder, Peter ; Schröder, Dominique ; Wagner, Daniel (2010)
History-Free Aggregate Message Authentication Codes.
Conference or Workshop Item, Bibliographie
Endres, Christoph ; Wurz, Andreas ; Hoffmann, Marcus ; Behring, Alexander
eds.: French, Simon ; Tomaszewski, Brian ; Zobel, Christopher (2010)
A Task-based Messaging Approach To Facilitate Staff Work.
Conference or Workshop Item, Bibliographie
Ekberg, Jan-Erik ; Bugiel, Sven (2009)
Trust in a Small Package: Minimized MRTM Software Implementation for Mobile Secure Environments.
Conference or Workshop Item, Bibliographie
Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas (2009)
Privacy-Preserving Face Recognition.
Conference or Workshop Item, Bibliographie
Eu, Joy Boy Joy (2001)
Specification of Dependable Trusted Third Parties.
Report, Bibliographie
F
Fernando, Ruchith ; Ranchal, Rohit ; An, Byungchan ; Othmane, Lotfi Ben ; Bhargava, Bharat (2016)
Consumer oriented privacy preserving access control for electronic health records in the cloud.
Conference or Workshop Item, Bibliographie
Falzon, Kevin ; Bodden, Eric
eds.: Lopez, Javier ; Mitchell, Chris J. (2015)
Dynamically Provisioning Isolation in Hierarchical Architectures.
Information Security Conference. Trondheim
Conference or Workshop Item, Bibliographie
Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015)
End-2-End Privacy Architecture for IoT.
IEEE Conference on Communications and Network Security (CNS). Florence, Italy (28.-30. Sept. 2015)
doi: 10.1109/CNS.2015.7346895
Conference or Workshop Item, Bibliographie
Follner, Andreas ; Bodden, Eric (2015)
ROPocop - Dynamic Mitigation of Code-Reuse Attacks.
Report, Bibliographie
Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
eds.: Parycek, Peter ; Sachs, Michael ; Skoric, Marko (2014)
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
Hong Kong
Conference or Workshop Item, Bibliographie
Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
eds.: Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (2014)
Coercion-Resistant Internet Voting in Practice.
44. Jahrestagung der Gesellschaft für Informatik. Stuttgart, Germany (22.-26.09.2014)
Conference or Workshop Item, Bibliographie
Franke, Daniel (2014)
Risk Simulations for the Web PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014)
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014)
Robust Multi-Property Combiners for Hash Functions.
doi: 10.1007/s00145-013-9148-7
Conference or Workshop Item, Bibliographie
Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013)
Distributed Finite-State Runtime Monitoring with Aggregated Events.
4th International Conference on Runtime Verification (RV'13). Rennes, France (24.-27.09.)
doi: 10.1007/978-3-642-40787-1_6
Conference or Workshop Item, Bibliographie
Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013)
Highly Precise Taint Analysis for Android Applications.
Report, Bibliographie
Funke, Sebastian (2013)
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article, Bibliographie
Feng, Tan ; Wang, Qixin ; Bu, Lei ; Zheng, Rong ; Wang, Yufei ; Suri, Neeraj (2013)
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach.
Conference or Workshop Item, Bibliographie
Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013)
A Polynomial Time Version of LLL With Deep Insertions.
Bergen (Norway)
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Onete, Cristina (2013)
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance.
Conference or Workshop Item, Bibliographie
Falzon, Kevin ; Pace, Gordon J.
eds.: Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (2012)
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software. Essen, Germany (September 04, 2012)
Conference or Workshop Item, Bibliographie
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2012)
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
doi: 10.1109/WoWMoM.2012.6263689
Conference or Workshop Item, Bibliographie
Faber, Natalie (2012)
Entwicklung und Evaluierung eines grafischen Passwortsystems basierend auf Google Maps.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Fuhrmann, Tino (2012)
Ansatz zur Erkennung von HTTPS Stripping Attacken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Filtschew, Konstantin (2012)
Sicherheitsanalyse der Client-Server-Architektur für die Authetifizierung mit dem nPA und eine prototypische Entwicklung einer eID-kompatiblen Client-Server-basierten Software.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Frey, Hannes ; Hollick, Matthias ; Loch, Adrian (2011)
Curve-based Planar Graph Routing in Multihop Wireless Networks.
doi: 10.1109/MASS.2011.127
Conference or Workshop Item, Bibliographie
Frankland, Richard ; Demirel, Denise ; Budurushi, Jurlind ; Volkamer, Melanie (2011)
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Trento, Italy
doi: 10.1109/REVOTE.2011.6045914
Conference or Workshop Item, Bibliographie
Filyanov, Atanas ; McCune, Jonathan ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2011)
Uni-directional Trusted Path: Transaction Confirmation on Just One Device.
Hong Kong
Conference or Workshop Item, Bibliographie
Fischer-Hübner, Simone ; Grimm, Rüdiger ; Lo Iacono, Luigi ; Möller, Sebastian ; Müller, Günter ; Volkamer, Melanie (2011)
Gebrauchstaugliche Informationssicherheit.
In: Die Zeitschrift für Informationssicherheit - Usable Security and Privacy
Article, Bibliographie
Feller, Thomas ; Malipatlolla, Sunil ; Meister, David ; Huss, Sorin (2011)
TinyTPM: A Lightweight Module aimed to IP Protection and Trusted Embedded Platforms.
Conference or Workshop Item, Bibliographie
Franz, M. ; Katzenbeisser, Stefan (2011)
Processing Encrypted Floating Point Signals.
Conference or Workshop Item, Bibliographie
Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011)
Oblivious Outsourced Storage with Delegation.
Conference or Workshop Item, Bibliographie
Federrath, Hannes ; Hansen, Marit ; Waidner, Michael (2011)
Andreas Pfitzmann 1958 - 2010.
In: it - Information Technology, 53 (1)
Article, Bibliographie
Fischer-Hübner, Simone ; Hoofnagle, Chris ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet.
Conference or Workshop Item, Bibliographie
Fischer-Hübner, Simone ; Hoofnagle, Chris Jay ; Rannenberg, Kai ; Waidner, Michael ; Krontiris, Ioannis ; Marhöfer, Michael (2011)
Online Privacy: Towards Informational Self-Determination on the Internet
(Dagstuhl Perspectives Workshop 11061).
In: Dagstuhl Reports, 1 (2)
Article, Bibliographie
Fischlin, Marc ; Lehmann, Anja ; Ristenpart, Thomas ; Shrimpton, Thomas ; Stam, Martijn ; Tessaro, Stefano (2010)
Random Oracles With(out) Programmability.
Conference or Workshop Item, Bibliographie
Feller, Thomas ; Demirezen, Aziz (2010)
Hardware Trojans: Data Leakage Using General Purpose LEDs.
Report, Bibliographie
Fischlin, Marc ; Schröder, Dominique (2010)
On the Impossibility of Three-Move Blind Signature Schemes.
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Lehmann, Anja (2010)
Hash Function Combiners in SSL and TLS.
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Lehmann, Anja (2010)
Delayed-Key Message Authentication for Streams.
Conference or Workshop Item, Bibliographie
Fenzi, Michele ; Liu, Huajian ; Steinebach, Martin ; Caldelli, Roberto (2010)
Markov Random Fields Pre-warping to Prevent Collusion in Image Transaction Watermarking.
Conference or Workshop Item, Bibliographie
Finke, Thomas ; Gebhardt, Max ; Schindler, Werner
eds.: Clavier, C. ; Gaj, K. (2009)
A New Side-Channel Attack on RSA Prime Generation.
Berlin
Conference or Workshop Item, Bibliographie
Freiling, Felix ; Heinson, Dennis (2009)
Probleme des Verkehrsdatenbegriffs im Rahmen der Vorratsdatenspeicherung.
In: Datenschutz und Datensicherheit (DuD), 2009 (9)
Article, Bibliographie
Fischer, Thomas ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
A Pattern for Secure Graphical User Interface Systems.
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Schröder, Dominique (2009)
Security of Blind Signatures under Aborts.
Conference or Workshop Item, Bibliographie
Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia (2008)
Measuring Unlinkability Revisited.
Alexandria, Virginia, USA
doi: 10.1145/1456403.1456421
Conference or Workshop Item, Bibliographie
Flentge, Felix ; Weber, Stefan ; Behring, Alexander ; Ziegert, Thomas (2008)
Designing Context-Aware HCI for Collaborative Emergency Management.
Conference or Workshop Item, Bibliographie
Field, Simon ; Waidner, Michael (2000)
Electronic Commerce.
In: Computer Networks, 32 (6)
Article, Bibliographie
G
Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017)
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
Vancouver, Canada
doi: 10.1007/978-3-319-58460-7
Conference or Workshop Item, Bibliographie
Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017)
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
doi: 10.1007/978-3-658-16835-3_8
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016)
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1)
doi: 10.1016/j.jisa.2016.10.003
Article, Bibliographie
Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016)
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
doi: 10.1109/PST.2016.7906980
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016)
Memorable And Secure: How Do You Choose Your PIN?
Frankfurt
Conference or Workshop Item, Bibliographie
Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016)
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Frankfurt, Germany
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016)
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
Saarbrucken
doi: 10.1109/EuroSP.2016.35
Conference or Workshop Item, Bibliographie
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Milanov, Nikolay ; Koch, Christian ; Hausheer, David ; Mühlhäuser, Max (2015)
ID2T: A DIY Dataset Creation Toolkit for Intrusion Detection Systems.
IEEE Conference on Communications and Network Security (CNS 2015). Florence, Italy (28.-30. Sept.)
doi: 10.1109/CNS.2015.7346912
Conference or Workshop Item, Bibliographie
Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015)
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
Conference or Workshop Item, Bibliographie
Gazis, Vangelis ; Görtz, Manuel ; Huber, Marco ; Leonardi, Alessandro ; Mathioudakis, Kostas ; Wiesmaier, Alexander ; Zeiger, Florian ; Vasilomanolakis, Emmanouil (2015)
A Survey of Technologies for the Internet of Things.
Dubrovnik, Croatia
doi: 10.1109/IWCMC.2015.7289234
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015)
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
Dreseden
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015)
Nudging Bank Account Holders Towards More Secure PIN Management.
doi: 10.20533/jitst.2046.3723.2015.0049
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Müller, Jan (2015)
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Oswald, Florian (2015)
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
Conference or Workshop Item, Bibliographie
Gerber, Paul ; Volkamer, Melanie (2015)
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, 2015 (2)
doi: 10.1007/s11623-015-0375-y
Article, Bibliographie
Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015)
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, 45 (1)
doi: 10.1145/2738210.2738214
Article, Bibliographie
Ghiglieri, Marco (2015)
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
Las Vegas, NV
Conference or Workshop Item, Bibliographie
Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015)
Lattice Basis Reduction Attack against Physically Unclonable Functions.
Denver, Colorado, US
Conference or Workshop Item, Bibliographie
Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Fischer, Mathias ; Mühlhäuser, Max (2015)
Community-based Collaborative Intrusion Detection.
doi: 10.1007/978-3-319-28865-9_44
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015)
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
Mohammed V University, Rabat, Morocco
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco
eds.: Schiele, Otto ; Schön, Willi (2014)
HbbTV – aktueller Stand 2014.
Conference or Workshop Item, Bibliographie
Geihs, Matthias ; Cabarcas, Daniel
eds.: Aranha, Diego F. ; Menezes, Alfred (2014)
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
Florianópolis, Brazil
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco (2014)
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
Report, Bibliographie
Ghiglieri, Marco (2014)
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy. San Jose, California (18.5.2014)
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014)
Personal DLP for Facebook.
Budapest, Hungary
doi: 10.1109/PerComW.2014.6815279
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Conference or Workshop Item, Bibliographie
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014)
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
eds.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Conference or Workshop Item, Bibliographie
Gutmann, Andreas ; Matsuura, Kanta (2013)
The use of linguistics in cryptography and its application to improve the HB protocol.
Computer Security Symposium 2013. Kagawa, Japan (21-23 October, 2013)
Conference or Workshop Item, Bibliographie
Gleser, Michael (2013)
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Geihs, Matthias (2013)
Evaluation of homomorphic encryption for machine learning.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Conference or Workshop Item, Bibliographie
Grimm, Marco ; Anderl, Reiner (2013)
Intellectual Property Protection and Secure Knowledge Management in Collaborative Systems Engineering.
Conference or Workshop Item, Bibliographie
Guo, Sheng (2013)
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
Report, Bibliographie
Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013)
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
Conference or Workshop Item, Bibliographie
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Balancing energy efficiency and throughput fairness in IEEE 802.11 WLANs.
In: Pervasive and Mobile Computing, 8 (5)
Article, Bibliographie
Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
eds.: Prouff, Emmanuel ; Schaumont, Patrick (2012)
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
Leuven, Belgium
Conference or Workshop Item, Bibliographie
Garcia-Saavedra, Andres ; Serrano, Pablo ; Banchs, Albert ; Hollick, Matthias (2012)
Energy-efficient fair channel access for IEEE 802.11 WLANs.
Lucca, Italy
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Simo, Hervais ; Waidner, Michael (2012)
Technical Aspects of Online Privacy.
Report, Bibliographie
Göttert, Norman (2012)
Hardware and Software Implementation of an LWE-Based Encryption Scheme.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Cryptographic Treatment of Private User Profiles.
Conference or Workshop Item, Bibliographie
Günther, Felix ; Manulis, Mark ; Strufe, Thorsten (2011)
Key Management in Distributed Online Social Networks.
Conference or Workshop Item, Bibliographie
Gay, Richard ; Mantel, Heiko ; Sprick, Barbara (2010)
Service Automata for Secure Distributed Systems.
Other, Bibliographie
Gottron, C. ; Larbig, P. ; König, A. ; Hollick, Matthias ; Steinmetz, R. (2010)
The Rise and Fall of the AODV Protocol: A Testbed Study on Practical Routing Attacks.
Denver, Colorado, USA
Conference or Workshop Item, Bibliographie
Geibig, Joanna ; Bradler, Dirk (2010)
Self-Organized Aggregation in Irregular Wireless Networks.
In: IFIP Wireless Days conference (WD'10)
Article, Bibliographie
Galindo, David ; Libert, Benoit ; Fischlin, Marc ; Fuchsbauer, Georg ; Lehmann, Anja ; Manulis, Mark ; Schröder, Dominique (2010)
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Conference or Workshop Item, Bibliographie
Gharadaghy, Rojan (2010)
Funktion und Realisierung der Telematikinfrastruktur für die elektronische Gesundheitskarte unter besonderer Betrachtung der Public-Key-Infrastruktur.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Germanus, Daniel ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays.
Conference or Workshop Item, Bibliographie
Gharadaghy, Rojan ; Volkamer, Melanie (2010)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Hupf, Katharina ; Volkamer, Melanie
eds.: Krimmer, Robert ; Grimm, Rüdiger (2010)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Conference or Workshop Item, Bibliographie
Gottron, Christian ; König, André ; Hollick, Matthias ; Bergsträßer, Sonja ; Hildebrandt, Tomas ; Steinmetz, Ralf (2009)
Quality of Experience of Voice Communication in Large-Scale Mobile Ad Hoc Network.
Conference or Workshop Item, Bibliographie
Gajek, Sebastian ; Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2009)
TruWallet: Trustworthy and Migratable Wallet-Based Web Authentication.
Conference or Workshop Item, Bibliographie
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2009)
Auf dem Weg zum SHA-3 - Die Ausschreibung eines neuen Hashfunktionenstandards durch NIST und ihre Hintergründe.
Ingelheim
Conference or Workshop Item, Bibliographie
Ghiglieri, Marco ; Fürnkranz, Johannes (2009)
Learning To Recognize Missing E-mail Attachments.
Report, Bibliographie
Germanus, Daniel ; Johansson, Andreas ; Suri, Neeraj (2009)
Threat Modeling and Dynamic Profiling.
Book Section, Bibliographie
Gasmi, Yacine ; Hessmann, Christian ; Pittenauer, Martin ; Winandy, Marcel (2008)
Sicherheitsprobleme elektronischer Wahlauszählungssysteme in der Praxis.
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie
eds.: Hegering, Heinz-Gerd ; Lehmann, Axel ; Ohlbach, Hans Jürgen ; Scheideler, Christian (2008)
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
München
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie (2008)
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Conference or Workshop Item, Bibliographie
Gebhardt, Max ; Illies, Georg ; Schindler, Werner
eds.: Alkassar, A. ; Siekmann, J. (2008)
On an Approach to Compute (at Least) Almost Exact Probabilities for Differential Hash Collision Paths.
Bonn
Conference or Workshop Item, Bibliographie
Gebhardt, Max ; Illies, Georg ; Schindler, Werner (2008)
Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods.
In: Cryptology ePrint Archive, 2008 (022)
Article, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie
eds.: Ferro, Enrico ; Scholl, Jochen ; Wimmer, Maria (2008)
Trust Models for Remote Electronic Voting.
Koblenz
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie (2007)
Robustere Anforderungen für Online-Wahlen aufbauend auf dem Schutzprofil 'Zentrale Auforderungen für Online-Wahlen'.
Report, Bibliographie
Grimm, Rüdiger ; Volkamer, Melanie
ed.: Krimmer, Robert (2006)
Multiple Cast in Online Voting - Analyzing Chances.
Conference or Workshop Item, Bibliographie
Grimm, Rüdiger ; Krimmer, Robert ; Meißner, Nils ; Reinhard, Kai ; Volkamer, Melanie ; Weinand, Marcel
eds.: Krimmer, Robert ; LNI, GI (2006)
Security Requirements for Non-political Internet Voting.
In: Electronic Voting (EVOTE) 2006
Book Section, Bibliographie
H
Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016)
Password Requirements Markup Language.
Melbourne, Australia
Conference or Workshop Item, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Report, Bibliographie
Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016)
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
Conference or Workshop Item, Bibliographie
Heuser, Stephan (2016)
Towards Modular and Flexible Access Control on Smart Mobile Devices.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Halvani, Oren ; Winter, Christian ; Pflug, Anika (2016)
Authorship Verification for Different Languages, Genres and Topics.
In: Digital Investigation, 16 (supplement)
doi: 10.1016/j.diin.2016.01.006
Article, Bibliographie
Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015)
Capacity and Data Complexity in Multidimensional Linear Attack.
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015)
PALPAS - PAsswordLess PAssword Synchronization.
Université Paul Sabatier, Toulouse, France
Conference or Workshop Item, Bibliographie
Halvani, Oren ; Winter, Christian
eds.: Cappellato, Linda ; Ferro, Nicola ; Jones, Gareth ; Juan, Eric San (2015)
A Generic Authorship Verification Scheme Based on Equal Error Rates (Notebook for PAN at CLEF 2015).
Toulouse, France
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
eds.: Ko, Ryan ; Choo, Kim-Kwang Raymond (2015)
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues
doi: 10.1016/B978-0-12-801595-7.00021-5
Book Section, Bibliographie
Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015)
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
Vancouver, Canada
doi: 10.4108/icst.tridentcom.2015.259694
Conference or Workshop Item, Bibliographie
Huang, Shin-Ying ; Huang, Yennun ; Suri, Neeraj (2014)
Event pattern discovery on IDS traces of Cloud Services.
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014)
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, 7 (11)
doi: 10.1002/sec.748
Article, Bibliographie
Halvani, Oren ; Steinebach, Martin (2014)
Autorschaftsanalyse - die Illusion der Anonymität.
In: Wirtschaftsinformatik & Management, (2014)
Article, Bibliographie
Hiemenz, Benedikt (2014)
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Conference or Workshop Item, Bibliographie
Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
eds.: Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (2014)
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich
Book Section, Bibliographie
Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014)
ASM: A Programmable Interface for Extending Android Security.
Report, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
Report, Bibliographie
Halvani, Oren ; Steinebach, Martin
eds.: Cappellato, Linda ; Ferro, Nicola ; Halvey, Martin ; Kraaij, Wessel (2014)
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Sheffield, UK
Conference or Workshop Item, Bibliographie
Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014)
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR)
Article, Bibliographie
Halvani, Oren ; Steinebach, Martin ; Zimmermann, Ralf
eds.: Forner, Pamela ; Navigli, Roberto ; Tufis, Dan ; Ferro, Nicola (2013)
Authorship Verification via k-Nearest Neighbor Estimation.
Conference or Workshop Item, Bibliographie
Hauke, Sascha ; Biedermann, Sebastian ; Mühlhäuser, Max ; Heider, Dominik (2013)
On the Application of the Supervised Machine Learning to Trustworthiness Assessment.
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Melbourne, Australia (16.-18.07.2013)
doi: 10.1109/TrustCom.2013.5
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
Melbourne, Australia
doi: 10.1109/TrustCom.2013.58
Conference or Workshop Item, Bibliographie
Hamann, Tobias (2013)
The BKZ Simulation Algorithm.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Halvani, Oren ; Steinebach, Martin ; Wolf, Patrick ; Zimmermann, Ralf (2013)
Natural Language Watermarking for German Texts.
Montpellier, France
doi: 10.1145/2482513.2482522
Conference or Workshop Item, Bibliographie
Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (May 08 - 10, 2013)
doi: 10.1145/2484313.2484369
Conference or Workshop Item, Bibliographie
Hülsing, Andreas ; Braun, Johannes (2013)
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
Bonn
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013)
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
Conference or Workshop Item, Bibliographie
Hülsing, Andreas (2013)
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
Cairo, Egypt
Conference or Workshop Item, Bibliographie
Hülsing, Andreas ; Rausch, L. ; Buchmann, Johannes (2013)
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013
Book Section, Bibliographie
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013)
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13). Coimbra, Portugal (March 18-22, 2013)
doi: 10.1145/2480362.2480727
Conference or Workshop Item, Bibliographie
Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013)
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Conference or Workshop Item, Bibliographie
Hornschuch, Marian (2012)
Multivariate-based identification and signature schemes with additional properties.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012)
Decoupling Authentication from the Usage of Services.
Report, Bibliographie
Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012)
Secure Two-Party Computations in ANSI C.
doi: 10.1145/2382196.2382278
Conference or Workshop Item, Bibliographie
Heinrich, Markus (2012)
Security Analysis of HTML5 Features.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Halvani, Oren (2012)
Autorschaftsanalyse im Kontext der Attribution, Verifikation und intrinsischer Exploration.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
eds.: Knudsen, Lars ; Wu, Huapeng (2012)
Forward Secure Signatures on Smart Cards.
Windsor, Canada
doi: 10.1007/978-3-642-35999-6_5
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict -- Application to Trust Assessment for Cloud Marketplaces.
11th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012). Liverpool, UK (25.-27.06.)
doi: 10.1109/TrustCom.2012.165
Conference or Workshop Item, Bibliographie
Heuser, Annelie ; Zohner, Michael (2012)
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
Conference or Workshop Item, Bibliographie
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Nguyen, Hai Thanh ; Busch, Christoph (2012)
Comprehensive analysis of spectral minutiae for vein pattern recognition.
In: IET Biometrics, 1 (1)
doi: 10.1049/iet-bmt.2011.0013
Article, Bibliographie
Hartung, Daniel ; Pflug, Anika ; Busch, Christoph (2012)
Vein Pattern Recognition Using Chain Codes, Spacial Information and Skeleton Fusing.
Conference or Workshop Item, Bibliographie
Henriques, Joselito ; Lukas, Uwe Freiherr von ; Mesing, Benjamin (2012)
Schutz geistigen Eigentums mit Enterprise Rights Management.
In: Economic Engineering: Intelligente Methoden, Prozesse und Technologien, 2
Article, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Hauke, Sascha ; Mühlhäuser, Max (2012)
Fusion of Opinions under Uncertainty and Conflict — Trust Assessment for Cloud Marketplaces (Full version).
Report, Bibliographie
Hülsing, Andreas ; Petzoldt, Albrecht ; Schneider, Michael ; Yousfi Alaoui, Sidi Mohamed el
ed.: Waldmann, Ulrich (2012)
Post-Quantum Signaturverfahren Heute.
Conference or Workshop Item, Bibliographie
Herrewege, Anthony van ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
Conference or Workshop Item, Bibliographie
Halvani, Oren ; Steinebach, Martin
eds.: Schartner, Peter ; Taeger, Jürgen (2012)
Domänenübergreifende profilbasierte Autorschafts-Attribution.
In: DACH Security 2012: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven
Book Section, Bibliographie
Hühnlein, Detlef ; Petrautzki, Dirk ; Schmölz, Johannes ; Wich, Tobias ; Horsch, Moritz ; Wieland, Thomas ; Eichholz, Jan ; Wiesmaier, Alexander ; Braun, Johannes ; Feldmann, Florian ; Potzernheim, Simon ; Schwenk, Jörg ; Kahlo, Christian ; Kühne, Andreas ; Veit, Heiko (2012)
On the design and implementation of the Open eCard App.
Darmstadt
Conference or Workshop Item, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander ; Schaaf, Joachim ; Baumöller, Claas (2012)
Verteilte Dienstnutzung mit dem neuen Personalausweis.
Conference or Workshop Item, Bibliographie
Henriques, Joselito Rodrigues ; Völz, Diana ; Anderl, Reiner (2012)
Data Exchange Processes based on Trust and Rights Management.
Karlsruhe
Conference or Workshop Item, Bibliographie
Hintz, Nadina ; Benenson, Zinaida ; Strufe, Thorsten (2012)
Friendship in German Online Social Networks.
Conference or Workshop Item, Bibliographie
Halvani, Oren Avni (2012)
Autorenschaftsanalyse im Kontext der Attributation, Verifikation und intrinsischen Explorationen.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Henning, Maria ; Demirel, Denise ; Volkamer, Melanie (2012)
Öffentlichkeit vs. Verifizierbarkeit – Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Towards a Trust Management System for Cloud Computing.
10th International Conference on Trust, Security and Privacy in Computing and Communications. Changsha, China (16.-18.11.2011)
doi: 10.1109/TrustCom.2011.129
Conference or Workshop Item, Bibliographie
Hartung, Daniel ; Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2011)
Spectral Minutiae for Vein Pattern Recognition.
In: IEEE International Joint Conference on Biometrics (IJCB 2011)
Article, Bibliographie
Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2011)
Mobile eID application for the German identity card.
Report, Bibliographie
Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Ries, Sebastian ; Mühlhäuser, Max (2011)
CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version).
Report, Bibliographie
Hoffmann, Gerhard (2011)
Implementation of McEliece using quasi-dyadic Goppa codes.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Horsch, Moritz ; Stopczynski, Martin (2011)
The German eCard-Strategy.
Report, Bibliographie
Horsch, Moritz (2011)
Mobile Authentisierung mit dem neuen Personalausweis (MONA).
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hamacher, Kay ; Katzenbeisser, Stefan (2011)
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011)
Book Section, Bibliographie
Heuser, Annelie ; Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2011)
How a Symmetry Metric Assists Side-Channel Evaluation - A Novel Model Verification Method for Power Analysis.
Conference or Workshop Item, Bibliographie
Henriques, Joselito Rodrigues ; Anderl, Reiner ; Grimm, Marco (2010)
Analysis of Enterprise Rights Management solutions for CAD data according to the requirements of the automotive industry and a proposal to increase the ERM security level.
Vancouver, British Columbia, Canada
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Strufe, Thorsten ; Buchmann, Alejandro (2010)
Sichere Netze - Mit dem Nutzer im Zentrum (Invited Paper).
In: Forschen, (2)
Article, Bibliographie
Habib, Sheikh Mahbub ; Ries, Sebastian ; Mühlhäuser, Max (2010)
Cloud Computing Landscape and Research Challenges regarding Trust and Reputation.
Xi'an, China
doi: 10.1109/UIC-ATC.2010.48
Conference or Workshop Item, Bibliographie
Heinson, Dennis ; Schmidt, Bernd (2010)
IT-gestützte Compliance-Systeme und Datenschutzrecht.
In: Computer und Recht, 26 (8)
Article, Bibliographie
Halvani, Oren ; Steinebach, Martin (2010)
Digitale Wasserzeichen für textuelle Informationen.
In: Information Wissenschaft & Praxis, 61 (5)
Article, Bibliographie
Hermans, Jens ; Schneider, Michael ; Buchmann, Johannes ; Vercauteren, Frederik ; Preneel, Bart
eds.: Bernstein, Daniel ; Lange, Tanja (2010)
Parallel Shortest Lattice Vector Enumeration on Graphics Cards.
Stellenbpsch, South Africa
Conference or Workshop Item, Bibliographie
Heinson, Dennis ; Yannikos, York ; Franke, Frederik ; Winter, Christian ; Schneider, Markus (2010)
Rechtliche Fragen zur Praxis IT-forensischer Analysen in Organisationen.
In: Datenschutz und Datensicherheit, 34 (2)
doi: 10.1007/s11623-010-0039-x
Article, Bibliographie
Heumann, Thomas ; Türpe, Sven ; Keller, Jörg
ed.: Freiling, Felix (2010)
Quantifying the Attack Surface of a Web Application.
Bonn
Conference or Workshop Item, Bibliographie
Hartmann, Frank (2010)
Probability Distribution of Gram-Schmidt Coefficients after LLL-Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hirzel, Jan ; Hartung, Daniel ; Busch, Christoph (2010)
Fingerprint Recognition with Cellular Partitioning and Co-Sinusoidal Triplets.
Conference or Workshop Item, Bibliographie
Hühnlein, Detlef ; Korte, Ulrike ; Langer, Lucie ; Wiesmaier, Alexander (2009)
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data.
doi: 10.1109/NTMS.2009.5384830
Conference or Workshop Item, Bibliographie
Habib, Sheikh Mahbub ; Jacob, Cyril ; Olovsson, Tomas (2009)
An analysis of the robustness and stability of the network stack in symbian-based smartphones.
In: Journal of Networks, 4 (10)
doi: 10.4304/jnw.4.10.968-975
Article, Bibliographie
Horsch, Moritz (2009)
MobilePACE - Password Authenticated Connection Establishment implementation on mobile devices.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data Protection in Germany II: Recent decisions on online- searching of computers, automatic number plate recognition and data retention.
In: Computer Law & Security Review, 25 (2)
Article, Bibliographie
Hornung, Gerrit ; Schnabel, Christoph (2009)
Data protection in Germany I: The population census decision and the right to informational self-determination.
In: Computer Law & Security Report, 25 (1)
Article, Bibliographie
Hartle, Michael ; Fuchs, Andreas ; Ständer, Marcus ; Schumann, Daniel ; Mühlhäuser, Max (2009)
Data Format Description and its Applications in IT Security.
In: International Journal On Advances in Security, 2 (1)
Article, Bibliographie
Hartung, Daniel (2009)
Venenbilderkennung -Privatsphärenschutz unerlässlich.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Hahn, Timothy ; Palmer, Bernard ; Waidner, Michael ; Whitmore, James (2009)
Software protection using an installation product having an entitlement file.
Norm, patent, standard, Bibliographie
Hahn, Timothy ; Waidner, Michael ; Whitmore, Jim (2009)
Software Protection Using an Installaton Product Having an Entitlement File.
Norm, patent, standard, Bibliographie
Hornung, Gerrit ; Knopp, Michael ; Laue, Philip ; Wilke, Daniel (2008)
Grunddienste für die Rechtssicherheit elektronischer Kommunikation - Rechtlicher Bedarf für eine gewährleistete Sicherheit.
In: MMR
Article, Bibliographie
Hollick, Matthias ; Mogre, Parag S. ; Schott, C. ; Steinmetz, Ralf (2007)
Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16.
Conference or Workshop Item, Bibliographie
Helbach, Jörg ; Krimmer, Robert ; Meletiadou, Anastasia ; Meissner, Nils ; Volkamer, Melanie (2007)
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
In: Datenschutz und Datensicherheit, 31 (6)
Article, Bibliographie
Hutter, Dieter ; Volkamer, Melanie
eds.: Clark, John ; Paige, Richard ; Polack, Fiona ; Brooke, Phillip (2006)
Information Flow Control to Secure Dynamic Web Service Composition.
York, UK
Conference or Workshop Item, Bibliographie
Hutter, Dieter ; Klusch, Matthias ; Volkamer, Melanie
eds.: Stormer, Henrik ; Meier, Andreas ; Schumacher, Michael (2006)
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Freiburg (Schweiz)
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Mogre, Parag S. ; Krop, T. ; Huth, H.-P. ; Schmitt, J. ; Steinmetz, Ralf (2005)
M2DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Martinovic, Ivan ; Krop, T. ; Rimac, I. (2004)
A Survey on Dependable Routing in Sensor Networks, Ad hoc Networks, and Cellular Networks.
Conference or Workshop Item, Bibliographie
Hansen, Marit ; Berlich, Peter ; Camenisch, Jan ; Clauß, Sebastian ; Pfitzmann, Andreas ; Waidner, Michael (2004)
Privacy-enhancing identity management.
In: Information Security Technical Report, Elsevier, 9 (1)
Article, Bibliographie
Hollick, Matthias ; Schmitt, J. ; Seipl, C. ; Steinmetz, Ralf (2004)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Krop, T. ; Schmitt, J. (2003)
Modeling Mobility for Cellular Networks Based on Statistical Data Collection.
Report, Bibliographie
Hollick, Matthias ; Steinmetz, Ralf (2002)
Security for Ad-Hoc Service Information - Threat Analysis of the Service Location Protocol.
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Schmitt, J. (2002)
The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Report, Bibliographie
Hollick, Matthias ; Rosenow, W. ; Bormuth, T. ; Steinmetz, Ralf (2001)
Sicherheitsaspekte bei der Einsatzplanung von Microsoft Windows 2000.
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Steinmetz, Ralf (2001)
Security Goals for Service Discovery in Ad-hoc Environments.
Conference or Workshop Item, Bibliographie
Hollick, Matthias ; Meissner, Andreas ; Wolf, L. ; Steinmetz, Ralf (2001)
A Security Model for Multicast Group Integrity Management.
Third International Workshop on Networked Group Communication. London, UK (November 7–9, 2001)
Conference or Workshop Item, Bibliographie
Hauser, Ralf ; Steiner, Michael ; Waidner, Michael (1996)
Micro-payments based on iKP.
Conference or Workshop Item, Bibliographie
I
Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016)
DARPA: Device Attestation Resilient to Physical Attacks.
Conference or Workshop Item, Bibliographie
Inel, Miray (2014)
Entwurf und Implementierung von Plug-ins für JCrypTool.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Modular Reasoning with Join Point Interfaces.
Report, Bibliographie
Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie
Ivanova, Vanya (2010)
Lattice Basis Reduction in Infinity Norm.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Israr, Adeel ; Shoufan, Abdulhadi ; Huss, Sorin (2009)
An Efficient Reliability Evaluation Approach for System-Level Design of Embedded Systems.
Conference or Workshop Item, Bibliographie
J
Jörg, Daubert ; Fischer, Mathias ; Mühlhäuser, Max ; Grube, Tim (2015)
Internal Attacks in Anonymous Publish-Subscribe P2P Overlays.
International Conference on Networked Systems (NetSys).
Conference or Workshop Item, Bibliographie
Jamison, Emily ; Gurevych, Iryna
eds.: Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (2014)
Needle in a Haystack: Reducing the Costs of Annotating Rare-Class Instances in Imbalanced Datasets.
Phuket, Thailand
Conference or Workshop Item, Bibliographie
Jamison, Emily ; Gurevych, Iryna
eds.: Aroonmanakun, Wirote ; Boonkwan, Prachya ; Supnithi, Thepchai (2014)
Adjacency Pair Recognition in Wikipedia Discussions using Lexical Pairs.
Phuket, Thailand
Conference or Workshop Item, Bibliographie
Jeutter, Bennet (2013)
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Jiang, Xuxian ; Grace, Michael ; Sadeghi, Ahmad-Reza ; Zhou, Wu (2012)
Unsafe Exposure Analysis of Mobile In-App Advertisements.
Conference or Workshop Item, Bibliographie
Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010)
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
Article, Bibliographie
Jonker, Hugo ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
Compliance of RIES to the proposed e-voting protection profile.
Bochum, Germany
Conference or Workshop Item, Bibliographie
Jerichow, Anja ; Müller, Jan ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1998)
Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol.
In: IEEE Journal on Selected Areas in Communications, 16 (4)
Article, Bibliographie
Janson, Phil ; Waidner, Michael (1996)
Electronic Payment over Open Networks.
In: Datenschutz und Datensicherung DuD, 20 (6)
Article, Bibliographie
K
Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd (2017)
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
Singapore
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017)
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
doi: 10.1109/Trustcom/BigDataSE/ICESS.2017.285
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017)
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
doi: 10.1007/978-3-319-58460-7_46
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017)
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3)
doi: 10.1109/MSP.2017.70
Article, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017)
Enabling Vote Delegation in Boardroom Voting.
Conference or Workshop Item, Bibliographie
Kolb, Nina
eds.: Prinz, Wolfgang ; Borchers, Jan ; Jarke, Matthias (2016)
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Aachen
doi: 10.18420/muc2016-mci-0075
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016)
Introducing Proxy Voting to Helios.
Salzburg
doi: 10.1109/ARES.2016.38
Conference or Workshop Item, Bibliographie
Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016)
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
IEEE International Conference on Communications (ICC 2016). Kuala Lumpur, Malaysia (22.-27.05.2016)
doi: 10.1109/ICC.2016.7510885
Conference or Workshop Item, Bibliographie
Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016)
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Bonn, Germany
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016)
Coercion-resistant Proxy Voting.
Ghent, Belgium
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Volkamer, Melanie (2016)
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Barbados
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016)
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
San Diego, California
Conference or Workshop Item, Bibliographie
Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Conference or Workshop Item, Bibliographie
Kolb, Nina ; Diefenbach, Sarah ; Niklas, Susanne
eds.: Endmann, Anja ; Fischer, Holger ; Krökel, Malte (2015)
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der „Mental Model Diagramm“-Methode.
Stuttgart
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
eds.: Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (2015)
Extending Helios Towards Private Eligibility Verifiability.
Bern, Switzerland
Conference or Workshop Item, Bibliographie
Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015)
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15). Heraklion, Greece (24.08.2015-26.08.2015)
doi: 10.1007/978-3-319-22846-4_11
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Toulouse, France
doi: 10.1109/ARES.2015.75
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; Bergen, Philemon von (2015)
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, 2015 (558)
Article, Bibliographie
Karuppayah, Shankar ; Roos, Stefanie ; Rossow, Christian ; Fischer, Mathias ; Mühlhäuser, Max (2015)
ZeusMilker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Columbus, Ohio
Conference or Workshop Item, Bibliographie
Kulcsar, Geza ; Deckwerth, Frederik ; Lochau, Malte ; Varró, Gergely ; Schürr, Andy
eds.: Rensink, Arend ; Zambon, Eduardo (2015)
Improved Conflict Detection for Graph Transformation with Attributes.
Graphs as Models, GaM 2015.
Conference or Workshop Item, Bibliographie
Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014)
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Lochau
doi: 10.1109/EVOTE.2014.7001142
Conference or Workshop Item, Bibliographie
Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014)
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Conference or Workshop Item, Bibliographie
Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014)
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Heraklion, Greece
doi: 10.1007/978-3-319-07620-1_16
Conference or Workshop Item, Bibliographie
Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2014)
Automatic protocol selection in secure two-party computations.
12. International Conference on Applied Cryptography and Network Security (ACNS'14). Lausanne, Switzerland (10.06.2014-13.06.2014)
doi: 10.1007/978-3-319-07536-5_33
Conference or Workshop Item, Bibliographie
Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014)
TrustLite: A Security Architecture for Tiny Embedded Devices.
Amsterdam, Netherlands
doi: 10.1145/2592798.2592824
Conference or Workshop Item, Bibliographie
Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013)
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, 37 (8)
doi: 10.1007/s11623-013-0209-8
Article, Bibliographie
Klose, Robin ; Loch, Adrian ; Hollick, Matthias (2013)
Evaluating Dynamic OFDMA Subchannel Allocation for Wireless Mesh Networks on SDRs.
Conference or Workshop Item, Bibliographie
Kühne, Alexander ; Loch, Adrian ; Hollick, Matthias ; Klein, Anja (2013)
Node Selection for Corridor-based Routing in OFDMA Multihop Networks.
2013 Wireless Communications and Networking Conference (WCNC'13). Shanghai, China (07.-10.04.2013)
doi: 10.1109/WCNC.2013.6554877
Conference or Workshop Item, Bibliographie
Klose, Robin ; Loch, Adrian ; Hollick, Matthias (2013)
A Rapid Prototyping Framework for Practical OFDMA Systems using Software Defined Radios.
Conference or Workshop Item, Bibliographie
Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013 - 27.02.2013)
Conference or Workshop Item, Bibliographie
Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Article, Bibliographie
Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
eds.: Marinos, Louis ; Askoxylakis, Ioannis (2013)
A Comparison of American and German Folk Models of Home Computer Security.
First International Conference, HAS 2013, Held as Part of HCI International 2013. Las Vegas, USA (21.07.2013 - 26.07.2013)
Conference or Workshop Item, Bibliographie
Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013)
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
Conference or Workshop Item, Bibliographie
Kauer, M. ; Franz, B. ; Pfeiffer, T. ; Heine, M. ; Christin, Delphine (2013)
Improving Privacy Settings for Facebook by Using Interpersonal Distance as Criterion.
CHI Conference on Human Factors in Computing Systems. Paris, France (27.04.2013-02.05.2013)
doi: 10.1145/2468356.2468498
Conference or Workshop Item, Bibliographie
Katzenbeisser, Stefan ; Schaller, André (2012)
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit
Article, Bibliographie
Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012)
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, 35 (4)
Article, Bibliographie
Knauer, Julian ; Baier, Harald (2012)
Zur Sicherheit von ATA-Festplattenpasswörtern.
Conference or Workshop Item, Bibliographie
Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
ed.: Buchmann, Johannes (2012)
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE)
Book Section, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012)
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Conference or Workshop Item, Bibliographie
Kirchbuchner, Florian (2012)
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Kononenko, Kirill (2012)
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
Conference or Workshop Item, Bibliographie
Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012)
Practical Security in E-Mail Applications.
Las Vegas, USA
Conference or Workshop Item, Bibliographie
Kelm, David (2012)
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012)
Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings.
doi: 10.1007/978-3-642-30921-2
Book, Bibliographie
Kauer, Michaela ; Pfeiffer, Thomas ; Volkamer, Melanie ; Theuerling, Heike ; Bruder, Ralph
eds.: Suri, Neeraj ; Waidner, Michael (2012)
It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately.
Sicherheit 2012. Sicherheit, Schutz und Zuverlässigkeit . Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI). Darmstadt, Germany (7. - 9. März 2012)
Conference or Workshop Item, Bibliographie
Kauer, Michaela ; Kiesel, Florian ; Ueberschaer, Felix ; Volkamer, Melanie ; Bruder, Ralph
eds.: Jähnke, Jochen ; Mühlen, Nicolas von zur ; Rechert, Klaus ; Suchodoletz, Dirk von ; Max-Planck Institut für ausländisches und internationales Strafrecht (2012)
The Influence of trustworthiness of website layout on security perception of websites.
In: Current Issues in IT Security 2012 Schriftenreihe des Max-Planck-Instituts für ausländisches und internationales Strafrecht. Reihe I: Interdisziplinäre Forschungen aus Strafrecht und Kriminologie
Book Section, Bibliographie
Kalabis, Lukas ; Selzer, Annika (2012)
Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet.
In: Datenschutz und Datensicherheit, 36 (9)
doi: 10.1007/s11623-012-0224-1
Article, Bibliographie
Kocabaş, Ünal ; Schulz, Steffen (2011)
POSTER: Practical Embedded Remote Attestation Using Physically Unclonable Functions.
Conference or Workshop Item, Bibliographie
Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
Conference or Workshop Item, Bibliographie
Kneževic, M. ; Kobayashi, K. ; Ikegami, J. ; Matsuo, S. ; Satoh, A. ; Kocabas, U. ; Fan, J. ; Katashita, T. ; Sugawara, T. ; Sakiyama, K. ; Verbauwhede, I. ; Ohta, K. ; Homma, N. ; Aoki, T. (2011)
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
In: IEEE Transactions on VLSI journal
Article, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian (2011)
Recyclable PUFs: Logically Reconfigurable PUFs.
Conference or Workshop Item, Bibliographie
Katzenbeisser, Stefan ; Kocabaş, Ünal ; Leest, Vincent van der ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian (2011)
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3)
Article, Bibliographie
Karuppayah, Shankar ; Samad, Fahad (2011)
CAD+: Detecting Colluding Nodes in Gray Hole Attacks.
Conference or Workshop Item, Bibliographie
Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010)
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
Article, Bibliographie
Kasper, Michael ; Schindler, Werner ; Stoettinger, Marc (2010)
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implementations.
Conference or Workshop Item, Bibliographie
Kasper, Michael ; Schindler, Werner ; Stöttinger, Marc (2010)
A Stochastic Method for Security Evaluation of Cryptographic FPGA Implemenations.
Conference or Workshop Item, Bibliographie
Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten (2010)
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
doi: 10.1109/GLOCOM.2010.5683139
Conference or Workshop Item, Bibliographie
Krumov, Lachezar ; Schweizer, Immanuel ; Bradler, Dirk ; Strufe, Thorsten (2010)
Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks.
In: Proceedings of IEEE GlobeCom
Article, Bibliographie
Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz (2010)
Reducing Configurations to Monitor in a Software Product Line.
1st International Conference on Runtime Verification (RV).
Conference or Workshop Item, Bibliographie
Kinder, Johannes ; Veith, Helmut
eds.: Bloem, Roderick ; Sharygina, Natasha (2010)
Precise Static Analysis of Untrusted Driver Binaries.
Conference or Workshop Item, Bibliographie
Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
ed.: Li, Chang-Tsun (2010)
Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
Book Section, Bibliographie
Kiefer, Franziskus (2010)
Effiziente Implementierung des PACE - und EAC-Protokolls für mobile Geräte.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Kern, Oliver ; Ranade, Kedar S. ; Seyfarth, Ulrich (2010)
Complete sets of cyclic mutually unbiased bases in even prime-power dimensions.
In: Journal of Physics A: Mathematical and Theoretical, 43 (27)
doi: 10.1088/1751-8113/43/27/275305
Article, Bibliographie
Kostiainen, Kari ; Dmitrienko, Alexandra ; Ekberg, Jan-Erik ; Sadeghi, Ahmad-Reza ; Asokan, N. (2010)
Key Attestation from Trusted Execution Environments.
Berlin
Conference or Workshop Item, Bibliographie
Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010)
Cryptographic Application Scenarios.
Report, Bibliographie
Khelil, Abdelmajid ; Germanus, Daniel ; Suri, Neeraj (2010)
Protection of SCADA Communication Channels.
Book Section, Bibliographie
Krumov, Lachezar ; Andreeva, Adriana ; Strufe, Thorsten (2010)
Resilient Peer-to-Peer Live-Streaming using Motifs.
Conference or Workshop Item, Bibliographie
Kobayashi, K. ; Ikegami, J. ; Kneževic, M. ; Guo, X. ; Matsuo, S. ; Huang, S. ; Nazhandali, L. ; Kocabas, U. ; Fan, J. ; Satoh, A. ; Verbauwhede, I. ; Sakiyama, K. ; Ohta, K. (2010)
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Conference or Workshop Item, Bibliographie
Khelil, Abdelmajid ; Jeckel, Sebastian ; Germanus, Daniel ; Suri, Neeraj (2010)
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective.
Conference or Workshop Item, Bibliographie
Khalilbeigi, Mohammadreza ; Bradler, Dirk ; Schweizer, Immanuel ; Probst, Florian ; Steimle, Jürgen (2010)
Towards Computer Support of Paper Workflows in Emergency Management.
Seattle, Washington, USA
Conference or Workshop Item, Bibliographie
Kevenaar, Tom ; Korte, Ulrike ; Merkle, Johannes ; Niesing, Matthias ; Ihmor, Heinrich ; Busch, Christoph ; Zhou, Xuebing (2010)
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems.
Conference or Workshop Item, Bibliographie
Kemetmüller, Christoph ; Seeger, Mark ; Baier, Harald ; Busch, Christoph (2010)
Manipulating Mobile Devices with a private GSM Base Station - a Case Study.
Conference or Workshop Item, Bibliographie
König, André ; Seither, Daniel ; Hollick, Matthias ; Steinmetz, Ralf (2009)
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks.
Conference or Workshop Item, Bibliographie
Katzenbeisser, Stefan ; Kursawe, Klaus ; Stumpf, Frederic (2009)
Revocation of TPM Keys.
Conference or Workshop Item, Bibliographie
Kallel, Slim ; Charfi, Anis ; Mezini, Mira ; Klose, Karl ; Jmaiel, Mohamed (2009)
From Formal Access Control Policies to Runtime Enforcement Aspects.
Leuven, Belgium
doi: 10.1007/978-3-642-00199-4_2
Conference or Workshop Item, Bibliographie
Kinder, Johannes ; Veith, Helmut ; Zuleger, Florian (2009)
An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries.
doi: 10.1007/978-3-540-93900-9_19
Conference or Workshop Item, Bibliographie
König, A. ; Hollick, Matthias ; Steinmetz, R. (2009)
An Evaluation of Cooperative Decisions in Peer-to-Peer Systems - Mathematics vs. Testbed Studies (Abstract).
Conference or Workshop Item, Bibliographie
König, A. ; Hollick, Matthias ; Steinmetz, R. (2009)
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems.
Conference or Workshop Item, Bibliographie
Kern, Oliver (2009)
Randomized Dynamical Decoupling Strategies and Improved One-Way Key Rates for Quantum Cryptography.
Technische Universität Darmstadt
Ph.D. Thesis, Bibliographie
König, André ; Gottron, Christian ; Hollick, Matthias ; Steinmetz, Ralf (2008)
Harnessing Delay Tolerance to Increase Delivery Ratios in Mobile Ad Hoc Networks with Misbehaving Nodes.
Conference or Workshop Item, Bibliographie
Killmann, Wolfgang ; Schindler, Werner
eds.: Oswald, E. ; Rohatgi, P. (2008)
A Design for a Physical RNG with Robust Entropy Estimators.
Berlin
Conference or Workshop Item, Bibliographie
König, André ; Hollick, Matthias ; Steinmetz, Ralf (2008)
Security for Future Wireless and Decentralized Communication Networks - Harnessing Cooperation, Space, and Time.
Conference or Workshop Item, Bibliographie
Kinder, Johannes ; Veith, Helmut (2008)
Jakstab: A Static Analysis Platform for Binaries.
Conference or Workshop Item, Bibliographie
König, A. ; Hollick, Matthias ; Krop, T. ; Steinmetz, R. (2008)
GeoSec - Quarantine Zones for Mobile Ad hoc Networks.
In: Security and Communication Networks (SCN), 2
Article, Bibliographie
Krimmer, Robert ; Volkamer, Melanie (2008)
Challenges Posted by Distance Voting in General: Postal Voting, and in Particular eVoting.
Report, Bibliographie
Krimm, Rüdiger ; Volkamer, Melanie (2008)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Conference or Workshop Item, Bibliographie
Krimmer, Robert ; Volkamer, Melanie
eds.: Krishna, Jaya ; Agarwal, Naveen Kumar (2008)
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Conference or Workshop Item, Bibliographie
Kutscher, Dirk ; Ott, Jörg ; Bartsch, Steffen (2007)
Supporting network access and service location in dynamic environments.
In: Campus-Wide Information Systems, 24 (4)
doi: 10.1108/10650740710834626
Article, Bibliographie
Krop, T. ; Bredel, M. ; Hollick, Matthias ; Steinmetz, Ralf (2007)
JiST/MobNet: Combined Simulation, Emulation, and Real-world Testbed for Ad hoc Networks.
Conference or Workshop Item, Bibliographie
König, André ; Hollick, Matthias ; Ackermann, R. ; Steinmetz, R. (2007)
Geographically Secure Routing for Mobile Ad Hoc Networks: A Cross-Layer Based Approach.
Conference or Workshop Item, Bibliographie
Krimmer, Robert ; Triessnig, Stefan ; Volkamer, Melanie
eds.: Alkassar, Ammar ; Volkamer, Melanie (2007)
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Bochum, Germany
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Service-oriented Assurance -- Comprehensive Security by Explicit
Assurances.
Conference or Workshop Item, Bibliographie
König, A. ; Hollick, Matthias ; Schmitt, J. ; Steinmetz, R. (2006)
Sicherheit und Verfügbarkeit in mobilen Ad hoc Netzen - Ein geographischer, schichtenübergreifender Ansatz (Abstract).
Conference or Workshop Item, Bibliographie
Krop, T. ; Widmer, J. ; Hollick, Matthias ; Prehofer, C. ; Steinmetz, Ralf (2006)
Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm (Extended Abstract and Post).
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2005)
Service-oriented Assurance -- Comprehensive Security by Explicit
Assurances.
Report, Bibliographie
Krop, T. ; Kappes, M. ; Hollick, Matthias (2005)
Establishing P2P-Overlays for Ad Hoc Networks Using Provider Subscription.
Conference or Workshop Item, Bibliographie
Krop, T. ; Hollick, Matthias ; Krist, F. ; Mogre, Parag S. ; Steinmetz, R. (2005)
Modeling Static and Dynamic Behavior of Routes in Mobile Ad hoc Networks (Extended Abstract and Poster).
Conference or Workshop Item, Bibliographie
Krimmer, Robert ; Volkamer, Melanie (2005)
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Kopenhagen
Conference or Workshop Item, Bibliographie
Krimmer, Robert ; Volkamer, Melanie
eds.: Schweighöfer, Erich ; Liebwald, Doris ; Augeneder, Silvia ; Menzel, Thomas (2005)
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2004)
Privacy-enabled Management of Customer Data.
In: Bulletin of the Technical Committee on Data Engineering, IEEE Computer
Society, 27 (1)
Article, Bibliographie
Karjoth, Günter ; Waidner, Michael (2004)
Ist Anonymität praktisch realisierbar?
In: digma Zeitschrift für Datenrecht und Informationssicherheit, 4 (1)
Article, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Herreweghen, Els Van ; Waidner, Michael (2003)
Amending P3P for Clearer Privacy Promises.
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002)
Privacy-enabled Services for Enterprises.
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002)
The Platform for Enterprise Privacy Practices -- Privacy-enabled
Management of Customer Data.
Conference or Workshop Item, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2002)
Privacy-enabled Services for Enterprises.
Report, Bibliographie
Karjoth, Günter ; Schunter, Matthias ; Waidner, Michael (2001)
Unternehmensweites Datenschutzmanagement.
Conference or Workshop Item, Bibliographie
Keller, Ludwig ; Kottmann, Dietmar ; Waidner, Michael (1994)
Mechanismen für fehlertolerante, verteilte Anwendungen - Seminar
SS 1993 & WS 1993/94.
Report, Bibliographie
L
Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016)
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Conference or Workshop Item, Bibliographie
Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015)
Automated Software Diversity.
doi: 10.2200/S00686ED1V01Y201512SPT014
Book, Bibliographie
Lilien, Leszek ; Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat ; Salih, Raed ; DeCarlo, Andrew (2015)
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Conference or Workshop Item, Bibliographie
Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015)
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
Conference or Workshop Item, Bibliographie
Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015)
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015)
Article, Bibliographie
Letzkus, Fabian (2015)
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Loch, Adrian ; Quesada, Pablo ; Hollick, Matthias ; Kühne, Alexander ; Klein, Anja (2014)
Building Cross-Layer Corridors in Wireless Multihop Networks.
11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS). Philadelphia, USA (28.-30.10.2014)
doi: 10.1109/MASS.2014.19
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Hollick, Matthias ; Kühne, Alexander ; Klein, Anja (2014)
Practical OFDMA for Corridor-based Routing in Wireless Multihop Networks.
39th IEEE Conference on Local Computer Networks (LCN 2014). Edmonton, Canada (08.-11.09.2014)
doi: 10.1109/LCN.2014.6925750
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Nitsche, Thomas ; Kuehne, Alexander ; Hollick, Matthias ; Widmer, Joerg ; Klein, Anja (2014)
Practical Interference Alignment in the Frequency
Domain for OFDM-based Wireless Access Networks.
15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. Sydney, Australia (19.06.2014)
doi: 10.1109/WoWMoM.2014.6918922
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Hong, Wei-Chih ; Hollick, Matthias (2014)
Dynamic Curve Adaptation for Geographic Routing in Wireless Multihop Networks.
doi: 10.1109/LCN.2014.6925754
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Schulz, Matthias ; Hollick, Matthias (2014)
WARP Drive - Accelerating Wireless Multi-hop Cross-layer Experimentation on SDRs.
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Hollick, Matthias ; Kühne, A. ; Klein, A. (2014)
Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks.
doi: 10.1109/WoWMoM.2014.6919011
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Meier, David ; Hollick, Matthias (2014)
How did you get here? PHY-Layer Path Signatures.
Conference or Workshop Item, Bibliographie
Liu, Huajian ; Berchtold, Waldemar ; Schäfer, Marcel ; Steinebach, Martin
ed.: SPIE, IS&T (2014)
Watermarking Textures in Video Games.
Conference or Workshop Item, Bibliographie
Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick (2014)
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
Report, Bibliographie
Loch, Adrian ; Klose, Robin ; Hollick, Matthias ; Kuehne, Alexander ; Klein, Anja (2013)
Practical OFDMA in Wireless Networks with Multiple Transmitter-Receiver Pairs.
14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013). Madrid, Spain (04.-07.06.2013)
doi: 10.1109/WoWMoM.2013.6583368
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Hollick, Matthias ; Nitsche, Thomas ; Widmer, Joerg ; Kühne, Alexander ; Klein, Anja (2013)
CSI Feedback in OFDMA Wireless Networks with Multiple Transmitter-Receiver Pairs.
14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2013). Darmstadt, Germany (16.-19.06.2013)
doi: 10.1109/SPAWC.2013.6612106
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Hollick, Matthias (2013)
Face the Enemy: Attack Detection for Planar Graph Routing.
Conference or Workshop Item, Bibliographie
Loch, Adrian ; Frey, Hannes ; Hollick, Matthias (2013)
Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks.
In: Pervasive and Mobile Computing
doi: 10.1016/j.pmcj.2013.03.004
Article, Bibliographie
Liu, H. ; Li, Y. ; Steinebach, M. (2013)
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
Conference or Workshop Item, Bibliographie
Luna, Jesus ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj ; Rak, Massimiliano ; Liccardo, Loredana (2013)
Negotiating and Brokering Cloud Resources based on Security Level Agreements.
Conference or Workshop Item, Bibliographie
Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin (2012)
Privacy Risks in Named Data Networking: What is the Cost of Performance?
In: ACM SIGCOMM Computer Communication Review (CCR), 42 (5)
doi: 10.1145/2378956.2378966
Article, Bibliographie
Lauinger, Tobias ; Laoutaris, Nikolaos ; Rodriguez, Pablo ; Strufe, Thorsten ; Biersack, Ernst ; Kirda, Engin (2012)
Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures.
Report, Bibliographie
Liu, Huajian ; Steinebach, Martin (2012)
Improved Fourier domain template and patchwork embedding using spatial masking.
Conference or Workshop Item, Bibliographie
Luna, Jesus ; Ghani, Hamza ; Vateva-Gurova, Tsvetoslava ; Suri, Neeraj (2012)
Quantitative Assessment of Cloud Security Level Agreements: A Case Study.
Conference or Workshop Item, Bibliographie
Luna, Jesus ; Suri, Neeraj ; Krontiris, Ioannis (2012)
Privacy-by-Design Based on Quantitative Threat Modeling.
Conference or Workshop Item, Bibliographie
Luna, Jesus ; Langenberg, Robert ; Suri, Neeraj (2012)
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees.
Conference or Workshop Item, Bibliographie
Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie (2011)
The Soot framework for Java program analysis: a retrospective.
Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
Conference or Workshop Item, Bibliographie
Likavec, Lena (2011)
Application of Lattice Basis Reduction.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Li, Shujun ; Sadeghi, Ahmad-Reza ; Heisrath, Soeren ; Schmitz, Roland ; Ahmad, Junaid Jameel (2011)
hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers.
St. Lucia
Conference or Workshop Item, Bibliographie
Lux, Alexander ; Starostin, Artem (2011)
A Tool for Static Detection of Timing Channels in Java.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander ; Buchmann, Johannes (2011)
Secure Long-term Record Keeping in the Public Sector.
In: EGovernement Review, (7)
Article, Bibliographie
Lindner, Richard ; Peikert, Chris (2011)
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Conference or Workshop Item, Bibliographie
Lux, Alexander ; Starostin, Artem (2010)
Side Channel Finder (Version 1.0).
Other, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Securing the E-Health Cloud.
Conference or Workshop Item, Bibliographie
Löhr, Hans ; Pöppelmann, Thomas ; Rave, Johannes ; Steegmanns, Martin ; Winandy, Marcel (2010)
Trusted Virtual Domains on OpenSolaris: Usable Secure Desktop Environments.
Conference or Workshop Item, Bibliographie
Lux, Alexander ; Mantel, Heiko ; Perner, Matthias ; Starostin, Artem (2010)
Side Channel Finder (Version 1.0).
Report, Bibliographie
Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2010)
INNOVATIVE PERSONALAUSWEIS‐ANWENDUNGEN Mehrwert des elektronischen Personalausweises jenseits von Portal‐ und Formularanwendungen: Technische Machbarkeit und langfristige Sicherheit.
Report, Bibliographie
Langer, Lucie ; Volkamer, Melanie ; Schmidt, Axel ; Buchmann, Johannes (2010)
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
5th International Conference on Availability, Reliability and Security. Krakow, Poland (15.-18.02.2010)
Conference or Workshop Item, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Patterns for Secure Boot and Secure Storage in Computer Systems.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Jonker, Hugo ; Pieters, Wolter (2010)
Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Barcelona, Spain
Conference or Workshop Item, Bibliographie
Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota, Colombia
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Volkamer, Melanie ; Weber, Stefan ; Schmidt, Axel ; Buchmann, Johannes
eds.: Davies, Jim ; Janowski, Tomasz (2009)
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Bogota
Conference or Workshop Item, Bibliographie
Lodrova, Dana ; Busch, Christoph ; Tabassi, Elham ; Krodel, Wolfgang ; Drahansky, Martin (2009)
Semantic Conformance Testing Methodology for Finger Minutiae Data.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander (2009)
Der Lifetime eSafe -- ein sicheres elektronisches Schließfach.
Geneva, Switzerland
Conference or Workshop Item, Bibliographie
Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan (2009)
Hide and Seek in Time - Robust Covert Timing Channels.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Buchmann, Johannes ; Volkamer, Melanie ; Stolfik, Alexander (2009)
Towards a Framework on the Security Requirements for Electronic Voting Protocols.
Atlanta, GA, USA
doi: 10.1109/RE-VOTE.2009.9
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Fischer, Stefan ; Maehle, Erik ; Reischuk, Rüdiger (2009)
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernement Review, 4
Article, Bibliographie
Langer, Lucie ; Wiesmaier, Alexander (2009)
Langfristige Sicherheit am Beispiel eines virtuellen Tresors.
Report, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Vishik, Claire ; Winandy, Marcel (2009)
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Conference or Workshop Item, Bibliographie
Löhr, Hans ; Sadeghi, Ahmad-Reza ; Stüble, Christian ; Weber, Marion ; Winandy, Marcel (2009)
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Conference or Workshop Item, Bibliographie
Liu, Huajian ; Steinebach, Martin ; Schneider, Marcel (2009)
Efficient watermark embedding for web images.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Wiesmaier, Alexander (2009)
From Student Smartcard Applications to the German Electronic Identity Card.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlverfahren.
Conference or Workshop Item, Bibliographie
Langer, Lucie ; Opitz-Talidou, Zoi (2009)
Elektronische Aufbewahrung von Wahldokumenten bei Onlinewahlen: Beweggründe, rechtliche Anforderungen und technische Umsetzung.
In: DuD, 9
Article, Bibliographie
Langer, Lucie (2009)
Long-term verifiability of remote electronic elections.
In: Practical studies in e-Governement
Book Section, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie (2009)
Verifizierbarkeit elektronischer Wahlen.
In: eGovernment Review, 4
Article, Bibliographie
Langer, Lucie ; Schmidt, Axel ; Volkamer, Melanie ; Buchmann, Johannes
eds.: Prosser, Alexander ; Parycek, Peter (2009)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Conference or Workshop Item, Bibliographie
Lacoste, Gérard ; Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2000)
SEMPER - Secure Electronic Marketplace for Europe.
Book, Bibliographie
Lacoste, Gérard ; Waidner, Michael (2000)
SEMPER---Security Framework for Electronic Commerce.
In: IOS Press
Article, Bibliographie
Lukat, Jörg ; Pfitzmann, Andreas ; Waidner, Michael (1991)
Effizientere fail-stop Schlüsselerzeugung für das DC-Netz.
In: Datenschutz und Datensicherung DuD, 15 (2)
Article, Bibliographie
M
Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017)
A Systematic Study of Cache Side Channels across AES Implementations.
Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS).
Conference or Workshop Item, Bibliographie
Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Vienna, Austria
doi: 10.1145/2976749.2989045
Conference or Workshop Item, Bibliographie
Mohan, Vaishnavi ; Othmane, Lotfi Ben (2016)
SecDevOps: Is It a Marketing Buzzword?
Conference or Workshop Item, Bibliographie
McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016)
State Management for Hash-Based Signatures.
Gaithersburg, USA
Conference or Workshop Item, Bibliographie
Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016)
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Frankfurt
Conference or Workshop Item, Bibliographie
Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016)
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Conference or Workshop Item, Bibliographie
Mayer, Christoph (2016)
Implementing a Toolkit for Ring-LWE Cryptography.
Technische Universität Darmstadt
Master Thesis, Bibliographie
McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016)
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5)
doi: 10.1109/JPROC.2015.2512235
Article, Bibliographie
Mayer, Peter ; Volkamer, Melanie (2015)
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Los Angeles, CA, USA
doi: 10.1145/2818000.2818043
Conference or Workshop Item, Bibliographie
Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015)
Zertifizierte Apps.
Bad-Godesberg in Bonn Gau-Algesheim
Conference or Workshop Item, Bibliographie
Mannes, Elisa ; Maziero, Carlos A. ; Lassance, Luiz Carlos ; Borges, Fábio (2015)
Optimized Access Control Enforcement Over Encrypted Content in Information-centric Networks.
Larnaca, Cyprus
Conference or Workshop Item, Bibliographie
Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
eds.: Prakash, Atul ; Shyamasundar, Rudrapatna (2014)
Authentication Schemes - Comparison and Effective Password Spaces.
International Conference on Information Systems Security (ICISS). Hyderabad, India (16-20.12.2014)
doi: 10.1007/978-3-319-13841-1_12
Conference or Workshop Item, Bibliographie
Müller, Jan (2014)
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014)
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
Conference or Workshop Item, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014)
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Kyoto, Japan
doi: 10.1145/2590296.2590337
Conference or Workshop Item, Bibliographie
Mannes, Elisa ; Maziero, Carlos ; Lassance, Luiz Carlos ; Borges, Fábio (2014)
Controle de acesso baseado em reencriptação por proxy em Redes Centradas em Informação.
Belo Horizonte - Brazil
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014)
Mutant Differential Fault Analysis of Trivium MDFA.
Conference or Workshop Item, Bibliographie
Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013)
ConXsense – Context Sensing for Adaptive Usable Access Control.
Report, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2013)
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, 21
doi: 10.1108/09685221311314419
Article, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013)
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering
Article, Bibliographie
Mittelbach, Arno (2013)
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012)
Improved Algebraic Side-Channel Attack on AES.
doi: 10.1109/HST.2012.6224335
Conference or Workshop Item, Bibliographie
Moecke, Cristian Thiago ; Volkamer, Melanie (2012)
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security
doi: 10.1108/09685221311314419
Article, Bibliographie
Meziani, Mohammed ; Hoffmann, Gerhard ; Cayrel, Pierre-Louis (2012)
Improving the Performance of the SYND Stream Cipher.
Al Akhawayn University, Ifran, Morocco
Conference or Workshop Item, Bibliographie
Meziani, Mohammed ; Bansarkhani, Rachid El (2012)
An Efficient and Secure Coding-based Authenticated Encryption.
Pisa, Italy
Conference or Workshop Item, Bibliographie
Mittelbach, Arno (2012)
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output.
Conference or Workshop Item, Bibliographie
Martucci, Leonardo ; Zuccato, Albin ; Smeets, Ben ; Habib, Sheikh Mahbub ; Johansson, Thomas ; Shahmehri, Nahid (2012)
Privacy, Security and Trust in Cloud Computing-- The Perspective of the Telecommunication Industry.
Fukuoka
doi: 10.1109/UIC-ATC.2012.166
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Towards Algebraic Cryptanalysis of HFE Challenge 2.
Brno University, Czech Republic
doi: 10.1007/978-3-642-23141-4_12
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
Brno, Czech Republic
doi: 10.1007/978-3-642-23141-4_7
Conference or Workshop Item, Bibliographie
Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max (2011)
Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services.
In: Journal of Information Processing, 19
doi: 10.2197/ipsjjip.19.317
Article, Bibliographie
Martucci, Leonardo ; Fischer-Hübner, Simone
ed.: Poblet, Marta (2011)
Privacy for Reporters of Human Rights Abuses [to appear].
In: Mobile Technologies for Conflict Management. New Avenues for Online Dispute Resolution
Book Section, Bibliographie
McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011)
Interactive decryption of DECT phone calls.
Hamburg
Conference or Workshop Item, Bibliographie
Meziani, M. ; Yousfi Alaoui, Sidi Mohamed el ; Cayrel, Pierre-Louis (2011)
Hash Functions Based on Coding Theory.
Conference or Workshop Item, Bibliographie
Mönkehues, Stephan (2011)
SWIFFT-Modifikationen, Korrektur von Operm5.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Buchmann, Johannes (2011)
Improved Differential Fault Analysis of Trivium.
Darmstadt
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2011)
A Novel Network Platform for Secure and Efficient Malware Collection based on Reconfigurable Hardware Logic.
Conference or Workshop Item, Bibliographie
Mitschke, Ralf ; Sewe, Andreas ; Mezini, Mira (2011)
Magic for the Masses: Safer High-level Low-level Programming through Customizable Static Analyses.
First workshop on Modularity in Systems Software. Porto de Galinhas, Brazil (22 Mar 2011)
doi: 10.1145/1960518.1960522
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2011)
NetStage/DPR: A Self-Adaptable FPGA Platform for Application-Level Network Security.
Conference or Workshop Item, Bibliographie
Milde, Benjamin ; Schneider, Michael (2011)
A Parallel Implementation of GaussSieve for the Shortest Vector Problem in Lattices.
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2011)
A Scalable Multi-FPGA Platform for Complex Networking Applications.
Conference or Workshop Item, Bibliographie
Malipatlolla, Sunil ; Huss, Sorin (2011)
A Novel Method for Secure Intellectual Property Deployment in Embedded Systems.
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Stoettinger, Marc ; Shoufan, Abdulhadi ; Strenzke, Falko (2011)
A Simple Power Analysis Attack on a McEliece Cryptoprocessor.
In: Journal of Cryptographic Engineering
Article, Bibliographie
Müller, S. ; Katzenbeisser, Stefan (2011)
Hiding the Policy in Cryptographic Access Control.
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Seffrin, André ; Huss, Sorin (2011)
State Space Optimization within the DEVS Model of Computation for Timing Efficiency.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes (2011)
The Complexity Analysis of the MutantXL Family.
In: IACR Cryptology ePrint Archive
Article, Bibliographie
Mantel, Heiko ; Sands, David ; Sudbrock, Henning (2011)
Assumptions and Guarantees for Compositional Noninterference.
Conference or Workshop Item, Bibliographie
Milman, Ivan ; Wolfson, Charles ; Schunter, Matthias ; Hinton, Heather ; Waidner, Michael (2011)
Method and System for Policy Driven Data Distribution.
Norm, patent, standard, Bibliographie
Meziani, Mohammed ; Cayrel, Pierre-Louis ; Yousfi Alaoui, Sidi Mohamed el
eds.: Kim, Tai-Hoon ; Adeli, Hojjat ; Robles, Rosslin John ; Balitanas, Maricel (2011)
2SC: An Efficient Code-Based Stream Cipher.
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2010)
An FPGA-based Scalable Platform for High-Speed Malware Collection in Large IP Networks.
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Koch, Andreas (2010)
A Dynamically Reconfigured Network Platform for High-Speed Malware Collection.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Cabarcas, Daniel ; Ding, Jintai ; Buchmann, Johannes ; Bulygin, Stanislav
eds.: Lee, Donghoon ; Hong, Seokhie (2010)
MXL3: An efficient algorithm for computing Gröbner bases of zero-dimensional ideals.
Seoul, Korea
doi: 10.1007/978-3-642-14423-3_7
Conference or Workshop Item, Bibliographie
Mohamed, Wael Said Abd Elmageed ; Bulygin, Stanislav ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian
eds.: Heng, S.-H. ; Wright, R. N. ; Goi, B.-M. (2010)
Practical Algebraic Cryptanalysis for Dragon-based Cryptosystems.
Kuala Lumpur, Malaysia
doi: 10.1007/978-3-642-17619-7_11
Conference or Workshop Item, Bibliographie
Müller, Jürgen ; Massoth, Michael (2010)
Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony.
In: International Journal on Advances in Telecommunications, 3 (3&4)
Article, Bibliographie
Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Kohler, Jonathan ; Carlos, Marcelo Carlomagno (2010)
Uma ICP baseada em certificados digitais autoassinados.
Conference or Workshop Item, Bibliographie
Madlener, Felix ; Weingart, Julia ; Huss, Sorin (2010)
Verification of Dynamically Reconfigurable Embedded Systems by Model Transformation Rules.
Conference or Workshop Item, Bibliographie
Mink, Martin ; Greifeneder, Rainer
eds.: Rannenberg, Kai ; Varadharajan, Vijay ; Weber, Christian (2010)
Evaluation of the Offensive Approach in Information Security Education.
Conference or Workshop Item, Bibliographie
Malipatlolla, Sunil ; Huss, Sorin (2010)
A Novel Technique for FPGA IP Protection.
Conference or Workshop Item, Bibliographie
Mühlbach, Sascha ; Brunner, Martin ; Roblee, Christopher ; Koch, Andreas (2010)
MalCoBox: Designing a 10 Gb/s Malware Collection Honeypot using Reconfigurable Technology.
Conference or Workshop Item, Bibliographie
Mohamed, Wael Said Abd Elmageed ; Ding, Jintai ; Kleinjung, Thorsten ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
PWXL: A Parallel Wiedemann-XL Algorithm for Solving Polynomial Equations over GF(2).
Conference or Workshop Item, Bibliographie
Meziani, Mohammed ; Cayrel, Pierre-Louis (2010)
Multi-Signature Scheme based on Coding Theory.
Conference or Workshop Item, Bibliographie
Müller, Sascha ; Katzenbeisser, Stefan (2010)
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010)
Book Section, Bibliographie
Miede, André ; Ackermann, Tobias ; Repp, Nicolas ; Abawi, Daniel ; Steinmetz, Ralf ; Buxmann, Peter
eds.: Schumann, Matthias ; Kolbe, Lutz ; Breitner, Michael ; Frerichs, Arne (2010)
Attacks on the Internet of Services – The Security Impact of Cross-organizational Service-based Collaboration.
Göttingen, Germany
Conference or Workshop Item, Bibliographie
Massoth, Michael ; Acker, Robin ; Moore, Ronald (2010)
Häuser fernsteuern und Prozesse optimieren durch mobile Lösungen.
In: Querschnitt
Article, Bibliographie
Müller, Jürgen ; Massoth, Michael (2010)
Defense Against Direct Spam Over Internet Telephony by Caller Pre-Validation.
doi: 10.1109/AICT.2010.40
Conference or Workshop Item, Bibliographie
Mantel, Heiko ; Sudbrock, Henning (2010)
Flexible Scheduler-independent Security.
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; D'Heureuse, N. ; Hollick, Matthias ; Steinmetz, R. (2010)
CORE: Centrally Optimized Routing Extensions for Efficient Bandwidth Management and Network Coding in the IEEE 802.16 MeSH Mode.
In: Wireless Communications and Mobile Computing
Article, Bibliographie
Mogre, Parag S. ; Graffi, K. ; Hollick, Matthias ; Steinmetz, R. (2010)
A Security Framework for Wireless Mesh Networks.
In: Wireless Communications and Mobile Computing
Article, Bibliographie
Mahmudimanesh, Mohammadreza ; Khelil, Abdelmajid ; Suri, Neeraj (2010)
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks.
Conference or Workshop Item, Bibliographie
Martucci, Leonardo ; Ries, Sebastian ; Mühlhäuser, Max (2010)
Identifiers, Privacy and Trust in the Internet of Services.
4th IFIP International Conference on Trust Management (IFIPTM 2010). Morioka, Japan (16.-18.06.2010)
Conference or Workshop Item, Bibliographie
Müller, Jürgen ; Massoth, Michael (2010)
Abwehr von Direct Spam over Internet Telephony mittels Anrufer Pre-Validierung.
Conference or Workshop Item, Bibliographie
Madlener, Felix ; Stoettinger, Marc ; Huss, Sorin (2009)
Novel Hardening Techniques against Differential Power Analysis for Multiplication in GF(2^n).
doi: 10.1109/FPT.2009.5377676
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Madlener, Felix ; Huss, Sorin (2009)
A System Level Design Flow for Embedded Systems based on Model of Computation Mappings.
Conference or Workshop Item, Bibliographie
Mohamed, Mohamed Saied Emam ; Ding, Jintai ; Buchmann, Johannes ; Werner, Fabian (2009)
Algebraic Attack on the MQQ Public Key Cryptosystem.
Kanazawa, Japan
doi: 10.1007/978-3-642-10433-6_26
Conference or Workshop Item, Bibliographie
Madlener, Felix ; Huss, Sorin ; Biedermann, Alexander (2009)
RecDEVS: A Comprehensive Model of Computation for Dynamically Reconfigurable Hardware Systems.
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Seffrin, André ; Huss, Sorin (2009)
DEVS2VHDL: Automatic Transformation of XML-specified DEVS Model of Computation into Synthesizable VHDL Code.
Conference or Workshop Item, Bibliographie
Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009)
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
doi: 10.1109/ICWMC.2009.20
Conference or Workshop Item, Bibliographie
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009)
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4)
doi: 10.4134/BKMS.2009.46.4.803
Article, Bibliographie
Madlener, Felix ; Molter, Gregor ; Huss, Sorin (2009)
SC-DEVS: An efficient SystemC Extension for the DEVS Model of Computation.
https://www.date-conference.com/proceedings-archive/PAPERS/2009/DATE09/PDFFILES/11.6_4.PDF.
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Schwingenschlögl, C. ; Ziller, A. ; Steinmetz, R.
eds.: Katz, Marcos ; Fitzek, Frank (2009)
WiMAX Mesh Architectures and Network Coding.
In: WiMAX Evolution: Emerging Technologies and Applications
Book Section, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Steinmetz, R. ; Dadia, V. ; Sengupta, S. (2009)
Distributed Bandwidth Reservation Strategies to Support Efficient Bandwidth Utilization and QoS on a Per-Link Basis in IEEE 802.16 Mesh Networks.
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Dimitrov, S. ; Steinmetz, R. (2009)
Incorporating Spatial Reuse into Algorithms for Bandwidth Management and Scheduling in IEEE 802.16j Relay Networks.
Conference or Workshop Item, Bibliographie
Myhr, Geir Ove ; Renes, Joseph ; Doherty, Andrew ; Lütkenhaus, Norbert (2009)
Symmetric extension in two-way quantum key distribution.
In: Phys. Rev. A 79, 042329
Article, Bibliographie
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008)
Distributed Attribute-Based Encryption.
11th International Conference on lnformation Security and Cryptology (ICISC 2008). Seoul, South Korea (03.-05.12.2008)
doi: 10.1007/978-3-642-00730-9_2
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Kropff, M. ; Steinmetz, R. ; Schwingenschlögl, C. (2008)
A Note on Practical Deployment editions for Network Coding in the IEEE 802.16 MeSH Mode.
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; Graffi, K. ; Hollick, Matthias ; Steinmetz, R. (2007)
AntSec, WatchAnt and AntRep:Innovative Security Mechanisms for Wireless Mesh Networks.
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; Hollick, Matthias ; Steinmetz, R. (2007)
QoS in Wireless Mesh Networks: Challenges, Pitfalls and Roadmap to its Realization (Keynote Paper).
Conference or Workshop Item, Bibliographie
Mogre, Parag S. ; D'Heureuse, N. ; Hollick, Matthias ; Steinmetz, R. (2007)
A Case for Joint Routing and Scheduling and Network Coding in TDMA-based Wireless Mesh Networks: A Cross-layer Approach (Extended Abstract and Poster).
Conference or Workshop Item, Bibliographie
Masip-Bruin, X. ; Yannuzzi, M. ; Domingo-Pascual, J. ; Fonte, A. ; Curado, M. ; Monteiro, E. ; Kuipers, F. ; Mieghem, P. van ; Avallone, S. ; Ventre, G. ; Aranda-Gutierrez, P. ; Hollick, Matthias ; Steinmetz, R. ; Iannone, L. ; Salamatian, K. (2006)
QoS Routing Open Agenda.
In: Computer Communications, 29
Article, Bibliographie
Mogre, Parag S. ; Hollick, Matthias (2006)
The IEEE 802.16-2004 MESH Mode Explained.
Report, Bibliographie
Meissner, Andreas ; Wolf, Lars ; Hollick, Matthias ; Steinmetz, Ralf (2001)
Security Issues in Group Integrity Management for Multimedia Multicasting.
Conference or Workshop Item, Bibliographie
N
Nikolopoulos, Georgios M. ; Fischlin, Marc (2020)
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources.
In: Cryptography, 4 (4)
doi: 10.3390/cryptography4040031
Article, Bibliographie
Nautsch, Andreas (2019)
Speaker Recognition in Unconstrained Environments.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017)
Election-Dependent Security Evaluation of Internet Voting Schemes.
Rome, Italy
doi: 10.1007/978-3-319-58469-0_25
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016)
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications
doi: 10.1007/s12243-016-0520-0
Article, Bibliographie
Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016)
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Austin, Texas, USA
Conference or Workshop Item, Bibliographie
Nadi, Sarah ; Krüger, Stefan (2016)
Variability Modeling of Cryptographic Components (Clafer Experience Report).
Tenth International Workshop on Variability Modelling of Software-intensive Systems. Salvador, Brazil (27. - 29.1.2016)
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015)
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, 2015 (11)
doi: 10.1007/s11623-015-0512-7
Article, Bibliographie
Nguyen Quang Do, Lisa ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015)
Toward a Just-in-Time Static Analysis.
Article, Bibliographie
Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014)
Pretty Understandable Democracy 2.0.
Lochau
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
eds.: Kö, Andrea ; Francesconi, Enrico (2014)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
München
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014)
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Fribourg, Switzerland
Conference or Workshop Item, Bibliographie
Noisternig, M. ; Hollick, Matthias (2014)
Efficient Solutions for the Authenticated Fragmentation Problem in Delay- and Disruption-Tolerant Networks.
Montreal, Canada
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Book Section, Bibliographie
Neumann, Stephan ; Volkamer, Melanie
eds.: Zissis, Dimitrios ; Lekkas, Dimitrios (2014)
A Holistic Framework for the Evaluation of Internet Voting Systems.
Book Section, Bibliographie
Nautsch, Andreas ; Rathgeb, Christian ; Busch, Christoph ; Reininger, Herbert ; Kasper, Klaus (2014)
Towards Duration Invariance of i-Vector-based Adaptive Score Normalization.
Conference or Workshop Item, Bibliographie
Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013)
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
New Orleans, Loouisiana, USA
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
ed.: Horbach, Matthias (2013)
Towards A Practical JCJ / Civitas Implementation.
Koblenz
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
eds.: Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (2013)
Modeling the German Legal Latitude Principles.
Koblenz, Germany
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013)
Towards A Practical JCJ / Civitas Implementation.
In: Cryptology ePrint Archive, 2013 (464)
Article, Bibliographie
Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013)
Towards a Practical Mobile Application for Election Authorities (Demo).
Conference or Workshop Item, Bibliographie
Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013)
Poster: On the Usability of Secure GUIs.
Menlo Park, California
Conference or Workshop Item, Bibliographie
Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013)
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California
Conference or Workshop Item, Bibliographie
Nitsche, Thomas ; Widmer, Jörg ; Loch, Adrian ; Hollick, Matthias (2013)
EVM and RSSI Link Quality Measurements in Frequency Selective Fading Channels.
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013)
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Salzburg, Austria
Conference or Workshop Item, Bibliographie
Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
Limoges, France
Conference or Workshop Item, Bibliographie
Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013)
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
Regensburg, Germany
Conference or Workshop Item, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Prague, Czech Republic
doi: 10.1109/ARES.2012.75
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Meziani, Mohammed ; Bulygin, Stanislav ; Buchmann, Johannes (2012)
Selecting Parameters for Secure McEliece-based Cryptosystems.
In: International Journal of Information Security, 11 (3)
Article, Bibliographie
Neumann, Stephan ; Volkamer, Melanie (2012)
Formal Treatment of Distributed Trust in Electronic Voting.
Stuttgart. Germany
Conference or Workshop Item, Bibliographie
Nogueira, Hendri ; Custódio, Ricardo Felipe ; Moecke, Cristian Thiago ; Wangham, Michelle (2011)
Using Notary Based Public Key Infrastructure in Shibboleth Federation.
Conference or Workshop Item, Bibliographie
Nazar, Assem ; Seeger, Mark ; Baier, Harald (2011)
Rooting Android - Extending the ADB by an Auto-Connecting WiFi-Accessible Service.
Tallinn, Estonia
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis (2011)
Broadcast Attacks against Code-Based Schemes.
Weimar, Germany
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Busch, Christoph ; Rangarajan, Sathyanarayanan ; Möbius, Manuel (2011)
Using Hidden Markov Models for Accelerometer-Based Biometric Gait Recognition.
Conference or Workshop Item, Bibliographie
Nürnberger, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha (2011)
Re-synchronizing audio watermarking after nonlinear time stretching.
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Buchmann, Johannes (2011)
Improving the effciency of Generalized Birthday Attacks against certain structured cryptosystems.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Derawi, Mohammad ; Bours, Patrick ; Busch, Christoph (2011)
Scenario Test for Accelerometer-Based Biometric Gait Recognition.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Busch, Christoph (2011)
Classifying Accelerometer Data via Hidden Markov Models to Authenticate People by the Way they Walk.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Brandt, Holger ; Busch, Christoph (2011)
Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Brandt, Holger ; Busch, Christoph (2011)
Benchmarking the Performance of SVMs and HMMs for Accelerometer-Based Biometric Gait Recognition.
Conference or Workshop Item, Bibliographie
Nürnberger, Stefan ; Feller, Thomas ; Huss, Sorin (2010)
RAY - A Secure Microkernel Architecture.
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
On lower bounds for Information Set Decoding over F_q.
Conference or Workshop Item, Bibliographie
Niebuhr, Robert ; Cayrel, Pierre-Louis ; Bulygin, Stanislav ; Buchmann, Johannes (2010)
Attacking code/lattice-based cryptosystems using Partial Knowledge.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Zhou, Xuebing ; Busch, Christoph (2010)
Template Protection for Biometric Gait Data.
Conference or Workshop Item, Bibliographie
Nickel, Claudia ; Zhou, Xuebing ; Busch, Christoph (2009)
Template Protection via Piecewise Hashing.
Conference or Workshop Item, Bibliographie
Nickel, Claudia (2009)
Authentisierung an mobilen Geräten mittels Gangerkennung.
In: Datenschutz und Datensicherheit (DuD), 5
Article, Bibliographie
Novotny, J. ; Alber, G. ; Jex, I. (2009)
Random unitary dynamics of quantum networks.
In: Journal of Physics A: Mathematical and Theoretical, 42 (28)
doi: 10.1088/1751-8113/42/28/282003
Article, Bibliographie
O
Othmane, Lotfi Ben ; Chehrazi, Golriz ; Bodden, Eric ; Tsalovski, Petar ; Brucker, Achim (2015)
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors.
Report, Bibliographie
Othmane, Lotfi Ben ; Chehrazi, Golriz ; Bodden, Eric ; Tsalovski, Petar ; Brucker, Achim ; Miseldine, Philip (2015)
Factors Impacting the Effort Required to Fix Security Vulnerabilities.
Conference or Workshop Item, Bibliographie
Othmane, Lotfi Ben ; Ranchal, Rohit ; Fernando, Ruchith ; Bhargava, Bharat ; Bodden, Eric (2015)
Incorporating Attacker Capabilities in Risk Estimation and Mitigation.
In: Computers & Security, 51
doi: 10.1016/j.cose.2015.03.001
Article, Bibliographie
Ossenbühl, Sven ; Steinberger, Jessica ; Baier, Harald (2015)
Towards automated incident handling: How to select an appropriate response against a network-based attack?
Magdeburg (Germany)
Conference or Workshop Item, Bibliographie
Othmane, Lotfi Ben ; Cerqueus, Thomas ; Thiery, Adrien ; Salehie, Mazeiar ; Noel, Nicolas ; Labaere, Anthony ; Domingues, Remi ; Cordier, Arnaud ; Ventresque, Anthony ; Pasquale, Liliana ; Perry, Philip ; Nuseibeh, Bashar (2015)
Response to Emergency Situations in a Traffic Management System.
Conference or Workshop Item, Bibliographie
Othmane, Lotfi Ben ; Weffers, Harold ; Mohamad, Mohd Murtadha ; Wolf, Marko
eds.: Benhaddou, Driss ; Al-Fuqaha, Ala (2015)
Wireless Sensor and Mobile Ad-Hoc Networks.
Book Section, Bibliographie
Oueslati, Hela ; Rahman, Mohammad Masudur ; Othmane, Lotfi Ben (2015)
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach.
Toulouse, France
Conference or Workshop Item, Bibliographie
Othmane, Lotfi Ben ; Angin, Pelin ; Weffers, Harold ; Bhargava, Bharat (2014)
Extending the Agile Development Approach to Develop Acceptably Secure Software.
In: IEEE Transactions on Dependable and Secure Computing, 11 (6)
Article, Bibliographie
Oswald, Florian (2014)
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014)
Voter, What Message Will Motivate You to Verify Your Vote?
San Diego
doi: 10.14722/usec.2014.23038
Conference or Workshop Item, Bibliographie
Othmane, Lotfi Ben ; Angin, Pelin ; Bhargava, Bharat (2014)
Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Fribourg, Switzerland
Conference or Workshop Item, Bibliographie
Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013)
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security
Book Section, Bibliographie
Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013)
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
eds.: Schneider, Steve ; Heather, James ; Teague, Vanessa (2013)
Mental Models of Verifiability in Voting.
University of Surrey, Guildford, UK
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Volkamer, Melanie
eds.: Saeed, Saqib ; Reddick, Christopher (2013)
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
doi: 10.4018/978-1-4666-3640-8.ch011
Book Section, Bibliographie
Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
ed.: University, Plymouth (2013)
Developing and Testing a Visual Hash Scheme.
Conference or Workshop Item, Bibliographie
Oswald, Florian (2012)
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt
Master Thesis, Bibliographie
Olembo, Maina ; Volkamer, Melanie (2012)
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
Report, Bibliographie
Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
eds.: Kripp, Melanie J. ; Volkamer, Melanie ; Grimm, Rüdiger (2012)
Partial Verifiability in POLYAS for the GI Elections.
Castle Hofen, Bregenz, Austria
Conference or Workshop Item, Bibliographie
Olsen, Martin Aastrup ; Xu, Haiyun ; Busch, Christoph (2012)
Gabor Filters as Candidate Quality Measure for NFIQ 2.0.
In: The 5th IAPR International Conference on Biometrics
Article, Bibliographie
Olsen, Martin Aastrup ; Hartung, Daniel ; Busch, Christoph ; Larsen, Rasmus (2011)
Convolution Approach for Feature Detection in Topological Skeletons Obtained from Vascular Patterns.
Conference or Workshop Item, Bibliographie
Olembo, Maina ; Volkamer, Melanie (2011)
Authentication Techniques, Client-Side Voting Software, and Secure Platform Mechanisms.
Report, Bibliographie
Olembo, Maina ; Schmidt, Patrick ; Volkamer, Melanie (2011)
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Vienna, Austria
Conference or Workshop Item, Bibliographie
Onete, Cristian E. ; Onete, Maria Cristina C. (2010)
Enumerating all the spanning trees in an un-oriented graph - A novel approach.
2010 XIth International Workshop on Symbolic and Numerical Methods, Modeling and Applications to Circuit Design (SM2ACD). Tunis-Gammarth. Tunisia (4-6 Oct. 2010)
doi: 10.1109/SM2ACD.2010.5672365
Conference or Workshop Item, Bibliographie
Oberender, Jens ; Volkamer, Melanie ; Meer, Hermann de (2007)
Denial-of-Service Flooding Detection in Anonymity Networks.
Conference or Workshop Item, Bibliographie
Ort, Andreas ; Assmann, Ralf ; Bleumer, Gerrit ; Böttger, Manfred ; Fox, Dirk ; Pfitzmann, Andreas ; Pfitzmann, Birgit ; Waidner, Michael (1992)
Schutz in verteilten Systemen durch Kryptologie - Ein Praktikum im
Informatik-Hauptstudium.
In: Datenschutz und Datensicherung DuD, 16 (11)
Article, Bibliographie
P
Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015)
Design Principles for HFEv- based Signature Schemes.
Auckland, New Zealand
Conference or Workshop Item, Bibliographie
Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas (2015)
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
Conference or Workshop Item, Bibliographie
Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj (2015)
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Conference or Workshop Item, Bibliographie
Piper, Thorsten ; Winter, Stefan ; Schwahn, Oliver ; Bidarahalli, Suman ; Suri, Neeraj (2015)
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems.
Conference or Workshop Item, Bibliographie
Paul, Thomas ; Hornung, Marius ; Strufe, Thorsten (2014)
Distributed Discovery of User Handles with Privacy.
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (August 20–22, 2014)
Conference or Workshop Item, Bibliographie
Patzina, Sven (2014)
Entwicklung einer Spezifikationssprache zur modellbasierten Generierung von Security-/Safety-Monitoren zur Absicherung von (Eingebetteten) Systemen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Patzina, Lars (2014)
Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication
Pham, Thieu Nga ; Hoang, Dang Hai ; Strufe, Thorsten ; Le, Quang Duc ; Bui, Phong Thanh ; Thai, Nguyet Thi ; Le, Thuy Duong ; Schweizer, Immanuel (2013)
Processing and Visualizing Traffic Pollution Data in Hanoi City From a Wireless Sensor Network.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes (2013)
A multivariate based threshold ring signature scheme.
In: Applicable Algebra in Engineering, Communication and Computing, 24 (3 - 4)
doi: 10.1007/s00200-013-0190-3
Article, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Gaborit, Philippe (2013)
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes.
Limoges, France
Conference or Workshop Item, Bibliographie
Patzina, Lars ; Patzina, Sven ; Piper, Thorsten ; Manns, Paul
eds.: Gorp, Pieter Van ; Ritter, Tom ; Rose, Louis (2013)
Model-Based Generation of Run-Time Monitors for AUTOSAR.
Montpellier
doi: 10.1007/978-3-642-39013-5_6
Conference or Workshop Item, Bibliographie
Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan (2012)
Privacy-Preserving Architecture for Forensic Image Recognition.
doi: 10.1109/WIFS.2012.6412629
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav (2012)
Linear Recurring Sequences for the UOV Key Generation Revisited.
Seoul, Korea
Conference or Workshop Item, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS: colors for privacy settings.
Lyon, France
doi: 10.1145/2187980.2188139
Conference or Workshop Item, Bibliographie
Pflug, Anika ; Hartung, Daniel ; Busch, Christoph (2012)
Feature Extraction from Vein Images using Spatial Information and Chain Codes.
In: ISTR, (17)
doi: 10.1016/j.istr.2012.02.003
Article, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS - Colors for Privacy Settings.
Conference or Workshop Item, Bibliographie
Poller, Andreas ; Steinebach, Martin ; Liu, Huajian (2012)
Robust image obfuscation for privacy protection in Web 2.0 applications.
Conference or Workshop Item, Bibliographie
Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas (2012)
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
Report, Bibliographie
Patzina, Sven ; Patzina, Lars
eds.: Schürr, Andy ; Varró, Daniel ; Varró, Gergely (2012)
A Case Study Based Comparison of ATL and SDM.
doi: 10.1007/978-3-642-34176-2_18
Conference or Workshop Item, Bibliographie
Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan (2012)
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
Conference or Workshop Item, Bibliographie
Paul, Thomas ; Greschbach, Benjamin ; Buchegger, Sonja ; Strufe, Thorsten (2012)
Exploring Decentralization Dimensions of Social Network Services: Adversaries and Availability.
Conference or Workshop Item, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS - Helping Facebookers Manage Their Privacy Settings.
In: Social Informatics 4th International Conference, SocInfo 2012, proceedings
doi: 10.1007/978-3-642-35386-4_15
Book Section, Bibliographie
Paul, Thomas ; Stopczynski, Martin ; Puscher, Daniel ; Volkamer, Melanie ; Strufe, Thorsten (2012)
C4PS - Helping Facebookers Manage their Privacy Settings.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
eds.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Catalano, Dario ; Fazio, Nelly ; Gennaro, Rosario ; Nicolosi, Antonio (2011)
Linear Recurring Sequences for the UOV Key Generation.
Conference or Workshop Item, Bibliographie
Popovic, Darko (2011)
Kosten-Nutzen-Analyse von elektronischen Wahlen an der TU Darmstadt.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Paul, Thomas ; Buchegger, Sonja ; Strufe, Thorsten
ed.: Bianchi, Giuseppe (2011)
Handbook on the Trustworthy Internet.
Book Section, Bibliographie
Paul, Thomas ; Strufe, Thorsten (2011)
Improving the Usability of Privacy Settings in Facebook.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2011)
Efficient browser-based identity management providing personal control and anonymity.
Norm, patent, standard, Bibliographie
Pantel, Björn (2011)
Secure Logging of Data Transferred from Optical Disc Media.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Gong, G. ; Gupta, K. C. (2010)
CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
eds.: Cid, Carlos ; Faugere, Jean-Charles (2010)
A Multivariate Signature Scheme with a Partially Cyclic Public Key.
Conference or Workshop Item, Bibliographie
Popall, Enrico (2010)
Wirtschaftlicher Nutzen des neuen Personalausweises.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie
Petzoldt, Albrecht ; Bulygin, Stanislav ; Buchmann, Johannes
ed.: Sendrier, Nicolas (2010)
Selecting Parameters for the Rainbow Signature Scheme.
Conference or Workshop Item, Bibliographie
Paul, Thomas ; Buchegger, Sonja ; Strufe, Thorsten (2010)
Decentralizing Social Networking Services.
Conference or Workshop Item, Bibliographie
Plies, Andreas ; Massoth, Michael ; Marx, Ronald (2010)
Approach to Identity Card-based Voice-over-IP Authentication.
Conference or Workshop Item, Bibliographie
Petter, Andreas ; Behring, Alexander ; Mühlhäuser, Max (2009)
A Methodology for Model-Driven Development of Crisis Management Applications using Solverational.
Lübeck
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Schunter, Matthias ; Waidner, Michael (2006)
Reactively Simulatable Certified Mail.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2005)
Digital Rights Management.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Federated Identity-Management Protocols -- Where User Authentication
Protocols May Go.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Analysis of Liberty Single-Sign-on with Enabled Clients.
In: IEEE Internet Computing, 7 (6)
Article, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Providing Identity-related Information and Preventing Man-in-the-middle Attacks.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Identity Management System Using Single Sign-on.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2003)
Efficient Browser-based Identity Management Providing Personal Control and Anonymity.
Norm, patent, standard, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
Token-based Web Single Signon with Enabled Clients.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
BBAE -- A General Protocol for Browser-based Attribute Exchange.
Report, Bibliographie
Pfitzmann, Birgit ; Waidner, Michael (2002)
Privacy in Browser-Based Attribute Exchange.
Conference or Workshop Item, Bibliographie
Pfitzmann, Birgit ; Steiner, Michael ; Waidner, Michael (2002)
A Formal Model for Multiparty Group Key Agreement.
Report, Bibliographie
Powell, D. ; Adelsbach, A. ; Cachin, C. ; Creese, S. ; Dacier, M. ; Deswarte, Y. ; McCutcheon, T. ; Neves, N. ;