Browse by Person
![]() | Up a level |
Weller, Mira ; Classen, Jiska ; Ullrich, Fabian ; Waßmann, Denis ; Tews, Erik
Mayrhofer, Rene ; Roland, Michael (eds.) (2020):
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information.
In: WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 184-194,
ACM, 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria, 08.-10.07.2020, ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3399422,
[Conference or Workshop Item]
Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 37-46,
ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference or Workshop Item]
Senftleben, Marius ; Barroso, Ana ; Bucicoiu, Mihai ; Hollick, Matthias ; Katzenbeisser, Stefan ; Tews, Erik (2016):
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, 11 (7), pp. 1578 - 1591. DOI: 10.1109/TIFS.2016.2541633,
[Article]
Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), pp. 43-48,
ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Conference or Workshop Item]
Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, pp. 25-35,
Scottsdale, AZ, USA, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]
Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: SEC'14, In: Proceedings of the 23rd USENIX conference on Security Symposium, pp. 733-748,
USENIX Association, San Diego, CA, USA, ISBN 978 -1- 931971-15 -7,
[Conference or Workshop Item]
Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14),
Springer, [Conference or Workshop Item]
Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 648-653,
IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference or Workshop Item]
Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013):
Security analysis of a widely deployed locking system.
Proceedings of the 2013 A, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 929-940,
[Conference or Workshop Item]
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (eds.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
10/2013, In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, pp. 563-566,
[Conference or Workshop Item]
Tews, Erik (2013):
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
[Report]
Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses,
SecuMedia Verlags-GmbH, [Conference or Workshop Item]
Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]
Tews, Erik (2012):
DECT Security Analysis.
Darmstadt, TU Darmstadt,
[Ph.D. Thesis]
McHardy, Patrick ; Schuler, Andreas ; Tews, Erik (2011):
Interactive decryption of DECT phone calls.
In: Fourth ACM Conference on Wireless Network Security (WiSec '11),
Hamburg, [Conference or Workshop Item]
Tews, Erik ; Wälde, Julian ; Weiner, Michael (2011):
Breaking DVB-CSA.
In: Western European Workshop on Research in Cryptology - WEWoRC 2011,
Weimar, [Conference or Workshop Item]
Weiner, Michael ; Tews, Erik ; Heinz, Benedikt ; Heyszl, Johann (2010):
FPGA Implementation of an Improved Attack Against the DECT Standard Cipher.
In: LNCS, In: ICISC 2010 - 13th Annual International Conference on Information Security and Cryptology,
Springer, Seoul, Korea, [Conference or Workshop Item]
Nohl, Karsten ; Tews, Erik (2010):
Kann man mit DECT noch vertraulich telefonieren?
In: >Datenschutz und Datensicherheit (DuD), 34 (11), pp. 758-760. [Article]
Karatsiolis, Vangelis ; Langer, Lucie ; Schmidt, Axel ; Tews, Erik ; Wiesmaier, Alexander (2010):
Cryptographic Application Scenarios.
(TI-01/10), [Report]
Nohl, Karsten ; Tews, Erik ; Weinmann, Ralf-Philipp (2010):
Cryptanalysis of the DECT Standard Cipher.
In: Fast Software Encryption 2010,
Seoul, [Conference or Workshop Item]
Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), pp. 82-86,
IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]
Lucks, Stefan ; Schuler, Andreas ; Tews, Erik ; Weinmann, Ralf-Philipp ; Wenzel, Matthias
Fischlin, Marc (ed.) (2009):
Attacks on the DECT authentication mechanisms.
In: LNCS, In: CT-RSA 2009,
Springer, San Francisco, CA, USA, ISBN 978-3-642-00861-0,
[Conference or Workshop Item]
Beck, Martin ; Tews, Erik (2009):
Practical attacks against WEP and WPA.
In: Second ACM Conference on Wireless Network Security - WISEC 2009,
[Conference or Workshop Item]
Strenzke, Falko ; Tews, Erik ; Molter, Gregor ; Overbeck, Raphael ; Shoufan, Abdulhadi (2008):
Side Channels in the McEliece PKC.
In: Lecture Notes in Computer Science, In: Int. Workshop on Post-Quantum Cryptography (PQCrypto 2008), pp. 216-229,
DOI: 10.1007/978-3-540-88403-3_15,
[Conference or Workshop Item]
Kühn, Ulrich ; Pyshkin, Andrei ; Tews, Erik ; Weinmann, Ralf-Philipp (2008):
Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit, pp. 97-109,
Saarbrücken, Germany, [Conference or Workshop Item]
Hartle, Michael ; Schumann, Daniel ; Botchak, Arsene ; Tews, Erik ; Mühlhäuser, Max (2008):
Describing Data Format Exploits using Bitstream Segment Graphs <b> (best paper award)</b>.
In: Proceedings of the Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008), pp. 119-124,
IEEE Press, New York, NY, [Conference or Workshop Item]
Tews, Erik (2007):
Attacks on the WEP protocol.
Technische Universität Darmstadt, [Master Thesis]
Tews, Erik ; Weinmann, Ralf-Philipp ; Pyshkin, Andrei (2007):
Breaking 104 Bit WEP in Less Than 60 Seconds.
In: WISA, pp. 188-202,
[Conference or Workshop Item]
Bär, Henning Cornelius ; Tews, Erik ; Rößling, Guido (2005):
Improving feedback and classroom interaction using mobile phones.
In: Proceedings of mobile learning, 2005.- IADIS Pr.- S. 55-62, [Conference or Workshop Item]
Bär, Henning Cornelius ; Mühlhäuser, Max ; Tews, Erik ; Rößling, Guido (2005):
Interaction during lectures using mobile phones.
In: Proceedings of ED-Media 2005, pp. 3767-3772,
AACE, World Conference on Educational Multimedia, Hypermedia & Telecommunications, Montréal, Canada, 27.06.-02.07.2005, ISBN 1-880094-56-8,
[Conference or Workshop Item]