TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 29.

Baumann, Peter and Katzenbeisser, Stefan and Stopczynski, Martin and Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]

Senftleben, Marius and Barroso, Ana and Bucicoiu, Mihai and Hollick, Matthias and Katzenbeisser, Stefan and Tews, Erik (2016):
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, pp. 1578 - 1591, 11, (7), DOI: 10.1109/TIFS.2016.2541633,
[Article]

Schulz, Matthias and Klapper, Patrick and Hollick, Matthias and Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Conference or Workshop Item]

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, Scottsdale, AZ, USA, In: ACM, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]

Meyer, Christopher and Somorovsky, Juraj and Weiss, Eugen and Schwenk, Jörg and Schinzel, Sebastian and Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: Proceedings of the 23rd USENIX conference on Security Symposium, USENIX Association, San Diego, CA, USA, In: SEC'14, ISBN 978 -1- 931971-15 -7,
[Conference or Workshop Item]

Senftleben, Marius and Bucicoiu, Mihai and Tews, Erik and Armknecht, Frederik and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference or Workshop Item]

Ghiglieri, Marco and Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]

Tews, Erik and Weiner, M. and Massar, M. and Giese, D. and Wieser, W. (2013):
Security analysis of a widely deployed locking system.
Proceedings of the 2013 A, [Article]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik
Schiele, Otto and Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference or Workshop Item]

Tews, Erik (2013):
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
[Report]

Ghiglieri, Marco and Oswald, Florian and Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference or Workshop Item]

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013, [Article]

Tews, Erik (2012):
DECT Security Analysis.
Darmstadt, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-29328],
[Ph.D. Thesis]

McHardy, Patrick and Schuler, Andreas and Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11), Hamburg, [Conference or Workshop Item]

Tews, Erik and Wälde, Julian and Weiner, Michael (2011):
Breaking DVB-CSA.
In: Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, [Conference or Workshop Item]

Weiner, Michael and Tews, Erik and Heinz, Benedikt and Heyszl, Johann (2010):
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
In: ICISC 2010 - 13th Annual International Conference on Information Security and Cryptology, Springer, Seoul, Korea, In: LNCS, [Conference or Workshop Item]

Nohl, Karsten and Tews, Erik (2010):
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 2010, (11), [Article]

Karatsiolis, Vangelis and Langer, Lucie and Schmidt, Axel and Tews, Erik and Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]

Nohl, Karsten and Tews, Erik and Weinmann, Ralf-Philipp (2010):
Cryptanalysis of the DECT Standard Cipher.
In: Fast Software Encryption 2010, Seoul, [Conference or Workshop Item]

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]

Lucks, Stefan and Schuler, Andreas and Tews, Erik and Weinmann, Ralf-Philipp and Wenzel, Matthias
Fischlin, Marc (ed.) (2009):
Attacks on the DECT authentication mechanisms.
In: CT-RSA 2009, Springer, San Francisco, CA, USA, In: LNCS, ISBN 978-3-642-00861-0,
[Conference or Workshop Item]

Beck, Martin and Tews, Erik (2009):
Practical attacks against WEP and WPA.
In: Second ACM Conference on Wireless Network Security - WISEC 2009, [Conference or Workshop Item]

Strenzke, Falko and Tews, Erik and Molter, Gregor and Overbeck, Raphael and Shoufan, Abdulhadi (2008):
Side Channels in the McEliece PKC.
In: Int. Workshop on Post-Quantum Cryptography (PQCrypto 2008), In: Lecture Notes in Computer Science, DOI: 10.1007/978-3-540-88403-3_15,
[Conference or Workshop Item]

Kühn, Ulrich and Pyshkin, Andrei and Tews, Erik and Weinmann, Ralf-Philipp (2008):
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit, Saarbrücken, Germany, [Conference or Workshop Item]

Hartle, Michael and Schumann, Daniel and Botchak, Arsene and Tews, Erik and Mühlhäuser, Max (2008):
Describing Data Format Exploits using Bitstream Segment Graphs <b> (best paper award)</b>.
In: Proceedings of the Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008), IEEE Press, New York, NY, [Conference or Workshop Item]

Tews, Erik (2007):
Attacks on the WEP protocol.
Technische Universit&auml;t Darmstadt, [Master Thesis]

Tews, Erik and Weinmann, Ralf-Philipp and Pyshkin, Andrei (2007):
Breaking 104 Bit WEP in Less Than 60 Seconds.
In: WISA, [Conference or Workshop Item]

Bär, Henning Cornelius and Tews, Erik and Rößling, Guido (2005):
Improving feedback and classroom interaction using mobile phones.
In: Proceedings of mobile learning, 2005.- IADIS Pr.- S. 55-62, [Conference or Workshop Item]

Bär, Henning Cornelius and Mühlhäuser, Max and Tews, Erik and Rößling, Guido (2005):
Interaction during lectures using mobile phones.
Norfolk, Va., AACE, In: Proceedings of ED-Media 2005, World Conference on Educational Multimedia, Hypermedia & Telecommunications : June 27 - July 2, 2005 Montréal, Canada / AACE, Association for the Advancement of Computing in Education. Ed. by Piet Kommers ...- Norfolk, Va. :, [Conference or Workshop Item]

This list was generated on Tue Nov 19 00:16:15 2019 CET.