Certification of ICTs in Elections
Wolf, Peter; Barrat, Jordi; Bolo, Eden; Bravo, Alejandro; Krimmer, Robert; Neumann, Stephan; Parreño, Al; Schürmann, Carsten; Volkamer, Melanie

jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
Pellegrino, Giancarlo; Tschürtz, Constantin; Bodden, Eric; Rossow, Christian
Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., p.295-316
[Conference Proceedings]

Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, Peter; Volkamer, Melanie
Proceedings of the 31st Annual Computer Security Applications Conference, p.431-440
[Conference Proceedings]

Automated Software Diversity
Larsen, Per; Brunthaler, Stefan; Davi, Lucas; Sadeghi, Ahmad-Reza; Franz, Michael

Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
[Journal Article]

Building Secure Defenses Against Code-Reuse Attacks
Davi, Lucas; Sadeghi, Ahmad-Reza

Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]

IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]