Publications

Publications

"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern
Budurushi, Jurlind; Hilt, Annika; Volkamer, Melanie
Datenschutz und Datensicherheit - DuD, p.300-304
Language: German
[Journal Article]

"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
International Conference on Software Engineering
Language: German
[Conference Proceedings]

(In-)security of smartphone anti-virus and security apps
Huber, Stephan; Rasthofer, Siegfried
Virus Bulletin International Conference (VB) <26, 2016, Denver/Colo.>
Language: English
[Conference Paper, Electronic Publication]

26. SIT-SmartCard Workshop 2016: Darmstadt, 17. und 18. Februar 2016
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
SmartCard Workshop <26, 2016, Darmstadt>
Language: German
[Conference Proceedings]

A Binarization Scheme for Face Recognition Based on Multi-Scale Block Local Binary Patterns
Schlett, T.; Rathgeb, C.; Busch, C.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-4
[Conference Proceedings]

A comparison of block ciphers SIMON, SPECK, and KATAN
Bossert, Andreas; Cooper, Steven; Wiesmaier, Alexander
Language: German
[Report]

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
Language: English
[Journal Article]

A novel attack model for collusion secure fingerprinting codes
Schäfer, Marcel; Berchtold, Waldemar; Reimers, Nils; Stark, Teetje; Steinebach, Martin
International Symposium on Electronic Imaging <2016, San Francisco/Calif.>
Language: English
[Conference Paper]

A Preliminary Study on the Feasibility of Storing Fingerprint and Iris Image Data in 2D-Barcodes
Buchmann, N.; Rathgeb, C.; Wagner, J.; Busch, C.; Baier, H.
2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-5
[Conference Proceedings]

A privacy-friendly method to reward participants of online-surveys
Herfert, Michael; Lange, Benjamin; Selzer, Annika; Waldmann, Ulrich
International Conference on e-Democracy <6, 2015, Athens>
Language: English
[Conference Paper]

A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
Language: German
[Conference Proceedings]

A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
Roepke, Rene; Thraem, Timo; Wagener, Johannes; Wiesmaier, Alexander
Language: German
[Report]

A vectorized, cache efficient LLL implementation
Mariano, Artur; Correia, Fabio; Bischof, Christian
VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science
Language: English
[Conference Proceedings]

Access control and data separation metrics in cloud infrastructures
Jaeger, B.; Kraft, R.; Luhn, S.; Selzer, A.; Waldmann, U.
International Conference on Availability, Reliability and Security (ARES) <11, 2016, Salzburg>
Language: English
[Conference Paper]

Advanced remote firmware upgrades using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
International Conference on ICT Systems Security and Privacy Protection (SEC) <31, 2016, Ghent>
Language: English
[Conference Paper]

Advanced Remote Firmware Upgrades Using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Rauzy, Pablo; Kiss, Ágnes; Krämer, Juliane; Seifert, Jean-Pierre
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), p.111-129
Language: English
[Conference Proceedings]

Altered fingerprint detection - algorithm performance evaluation
Haraksim, Rudolf; Anthonioz, Alexandre; Champod, Christophe; Olsen, Martin; Ellingsgaard, John; Busch, Christophe
2016 4th Intl. Conf. on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

An Analysis of OpenSSL's Random Number Generator
Strenzke, Falko
Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, p.644-669
Language: German
[Conference Proceedings]

An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
El Bansarkhani, Rachid; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
Language: German
[Conference Proceedings]

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Akleylek, Sedat; Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Marson, Giorgia Azzurra
International Conference on Cryptology AFRICACRYPT 2016, p.10
Language: German
[Conference Proceedings]

An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
Kumar Bairagi, A.; Khondoker, R.; Islam, R.
Language: English
[Journal Article]

An in-depth study of more than ten years of Java exploitation
Holzinger, P.; Triller, S.; Bartel, A.; Bodden, E.
Conference on Computer and Communications Security (CCS) <23, 2016, Vienna>
Language: English
[Conference Paper]

An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
Language: German
[Journal Article]

An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016)
Language: German
[Conference Proceedings]