Publications

Publications

Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
[Journal Article]


Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
eprint
[Journal Article]


Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
[Journal Article, Report]


Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation
Günther, Daniel; Kiss, Ágnes; Scheidel, Lukas; Schneider, Thomas
ACM CCS 2019
[Conference Proceedings]


Simple Refreshing in the Noisy Leakage Model
Dziembowski, Stefan; Faust, Sebastian; Zebrowski, Karol
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]


Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, p.259
[Journal Article]


Secure and Private Function Evaluation with Intel SGX
Felsen, Susanne; Kiss, Ágnes; Schneider, Thomas; Weinert, Christian
CCSW 2019 - The ACM Cloud Computing Security Workshop
[Conference Proceedings]


A Formal Treatment of Deterministic Wallets
Das, Poulami; Faust, Sebastian; Loss, Julian
ACM CCS 2019 - Symposium on Computer and Communications Security
[Conference Proceedings]


DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC - 35th Annual Computer Security Applications Conference
[Conference Proceedings]


Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
[Conference Proceedings]


Sponges Resist Leakage: The Case of Authenticated Encryption
Degabriele, Jean Paul; Janson, Christian; Struck, Patrick
25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]


Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
[Conference Proceedings]


Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]


Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]


Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
[Journal Article]


Accessing Dual Use in IT Development
Riebe, Thea; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]


Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]


Threat Intelligence Application for Cyber Attribution
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]


6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]


Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
Reuter, Christian; Häusser, Katja; Bien, Mona; Herbert, Franziska
MuC'19: Proceedings of Mensch und Computer 2019, p.287-297
[Conference Proceedings]


The Future of IT in Peace and Security
Reuter, Christian; Altmann, Jürgen; Aal, Konstantin; Aldehoff, Larissa; Buchmann, Johannes; Bernhardt, Ute; Denker, Kai; Herrmann, Dominik; Hollick, Matthias; Katzenbeisser, Stefan; Kaufhold, Marc-André; Nordmann, Alfred; Reinhold, Thomas; Riebe, Thea; Ripper, Annette; Ruhmann, Ingo; Saalbach, Klaus-Peter; Schörnig, Niklas; Sunyaev, Ali; Wulf, Volker
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.405-413


SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen
Kaufhold, Marc-André; Schmidt, Arne; Seifert, Fabienne; Riebe, Thea; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]


Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks
Kaufhold, Marc-André; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]


Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Wirtschaftsinformatik Proceedings 2019, p.1054-1068
[Conference Proceedings]


TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Wirtschaftsinformatik Proceedings 2019, p.1844-1855
[Conference Proceedings]


Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet
Hartwig, Katrin; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]


Hybride Dienst­leis­tun­gen in digi­tali­sierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.25-30
[Conference Proceedings]


The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments
Almon, Lars; Álvarez, Flor; Kamp, Laurenz; Hollick, Matthias
2019 IEEE 44nd Conference on Local Computer Networks (LCN)
[Conference Proceedings]


Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
[Book]


Cyberwar zwischen Fiktion und Realität – technologische Möglich­keiten
Reuter, Christian; Riebe, Thea; Aldehoff, Larissa; Kaufhold, Marc-André; Reinhold, Thomas
Cyberwar – die Digitalisierung der Kriegsführung?, p.15-38