Publications

Publications

LARA - A Design Concept for Lattice-based Encryption
El Bansarkhani, Rachid
Language: English
[Report]

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies
Tkachenko, Oleksandr; Weinert, Christian; Schneider, Thomas; Hamacher, Kay
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.221-235
Language: English
[Conference Proceedings]

Lattice Based Modularization of Static Analyses
Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
Language: English
[Conference Proceedings]

Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Language: English
[Journal Article]

M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
CoRR
Language: English
[Report, Journal Article]

Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail
Reuter, Christian; Leopold, Inken
Media in Action: An Interdisciplinary Journal on Cooperative Media, p.in press
Language: English
[Journal Article]

Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
Language: English
[Journal Article]

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
Language: German
[Journal Article]

Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
Language: English
[Conference Proceedings]

OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
Language: English
[Journal Article]

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Journal of Logical and Algebraic Methods in Programming, p.45-67
Language: English
[Journal Article]

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), p.45-67
Language: English
[Journal Article]

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Language: English
[Conference Proceedings]

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
Language: English
[Conference Proceedings]

Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
Language: English
[Conference Proceedings]

Path MTU Discovery Considered Harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems
Language: English
[Conference Proceedings]

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
HotNets'18: 17th ACM Workshop on Hot Topics in Networks
Language: English
[Conference Proceedings]

PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
Language: English
[Journal Article]

Practical Experience: Methodologies for Measuring Route Origin Validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks
Language: English
[Conference Proceedings]

Privacy-Preserving Genomics on a Large Scale
Tkachenko, Oleksandr
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Language: English
[Conference Proceedings]

Private Function Evaluation with Universal Circuits
Günther, Daniel
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
Language: English
[Conference Proceedings]

PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
Language: English
[Conference Proceedings]

Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
Language: English
[Journal Article]

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18), p.1-6
Language: English
[Conference Proceedings]

Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
Language: English
[Conference Proceedings]