TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 30.

Weller, Mira ; Classen, Jiska ; Ullrich, Fabian ; Waßmann, Denis ; Tews, Erik
eds.: Mayrhofer, Rene ; Roland, Michael (2020)
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Linz, Austria (08.-10.07.2020)
doi: 10.1145/3395351.3399422
Conference or Workshop Item, Bibliographie

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016)
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
Vienna, Austria
doi: 10.1145/2994620.2994621
Conference or Workshop Item, Bibliographie

Senftleben, Marius ; Barroso, Ana ; Bucicoiu, Mihai ; Hollick, Matthias ; Katzenbeisser, Stefan ; Tews, Erik (2016)
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, 11 (7)
doi: 10.1109/TIFS.2016.2541633
Article, Bibliographie

Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik (2016)
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
doi: 10.1145/2939918.2940650
Conference or Workshop Item, Bibliographie

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014)
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Scottsdale, AZ, USA
doi: 10.1145/2665943.2665962
Conference or Workshop Item, Bibliographie

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014)
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
San Diego, CA, USA
Conference or Workshop Item, Bibliographie

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014)
MoP-2-MoP - Mobile private microblogging.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Tews, Erik (2014)
A Privacy Protection System for HbbTV in Smart TVs.
Las Vegas, NV
doi: 10.1109/CCNC.2014.6866595
Conference or Workshop Item, Bibliographie

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013)
Security analysis of a widely deployed locking system.
Conference or Workshop Item, Bibliographie

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
eds.: Schiele, Otto ; Schön, Willi (2013)
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
Conference or Workshop Item, Bibliographie

Tews, Erik (2013)
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
Report, Bibliographie

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013)
HbbTV - I Know What You Are Watching.
Conference or Workshop Item, Bibliographie

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013)
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13)
Article, Bibliographie

Tews, Erik (2012)
DECT Security Analysis.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011)
Interactive decryption of DECT phone calls.
Hamburg
Conference or Workshop Item, Bibliographie

Tews, Erik ; Wälde, Julian ; Weiner, Michael (2011)
Breaking DVB-CSA.
Weimar
Conference or Workshop Item, Bibliographie

Weiner, Michael ; Tews, Erik ; Heinz, Benedikt ; Heyszl, Johann (2010)
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
Seoul, Korea
Conference or Workshop Item, Bibliographie

Nohl, Karsten ; Tews, Erik (2010)
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 34 (11)
Article, Bibliographie

Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010)
Cryptographic Application Scenarios.
Report, Bibliographie

Nohl, Karsten ; Tews, Erik ; Weinmann, Ralf-Philipp (2010)
Cryptanalysis of the DECT Standard Cipher.
Seoul
Conference or Workshop Item, Bibliographie

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009)
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
doi: 10.1109/ICWMC.2009.20
Conference or Workshop Item, Bibliographie

Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
ed.: Fischlin, Marc (2009)
Attacks on the DECT authentication mechanisms.
San Francisco, CA, USA
Conference or Workshop Item, Bibliographie

Beck, Martin ; Tews, Erik (2009)
Practical attacks against WEP and WPA.
Conference or Workshop Item, Bibliographie

Strenzke, Falko ; Tews, Erik ; Molter, Gregor ; Overbeck, Raphael ; Shoufan, Abdulhadi (2008)
Side Channels in the McEliece PKC.
doi: 10.1007/978-3-540-88403-3_15
Conference or Workshop Item, Bibliographie

Kühn, Ulrich ; Pyshkin, Andrei ; Tews, Erik ; Weinmann, Ralf-Philipp (2008)
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Saarbrücken, Germany
Conference or Workshop Item, Bibliographie

Hartle, Michael ; Schumann, Daniel ; Botchak, Arsene ; Tews, Erik ; Mühlhäuser, Max (2008)
Describing Data Format Exploits using Bitstream Segment Graphs <b> (best paper award)</b>.
Conference or Workshop Item, Bibliographie

Tews, Erik (2007)
Attacks on the WEP protocol.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Tews, Erik ; Weinmann, Ralf-Philipp ; Pyshkin, Andrei (2007)
Breaking 104 Bit WEP in Less Than 60 Seconds.
Conference or Workshop Item, Bibliographie

Bär, Henning Cornelius ; Tews, Erik ; Rößling, Guido (2005)
Improving feedback and classroom interaction using mobile phones.
Conference or Workshop Item, Bibliographie

Bär, Henning Cornelius ; Mühlhäuser, Max ; Tews, Erik ; Rößling, Guido (2005)
Interaction during lectures using mobile phones.
World Conference on Educational Multimedia, Hypermedia & Telecommunications. Montréal, Canada (27.06.-02.07.2005)
Conference or Workshop Item, Bibliographie

This list was generated on Sat May 18 01:42:10 2024 CEST.