Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
[Journal Article]

Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience
Reuter, Christian; Kaufhold, Marc-André; Comes, Tina; Knodt, Michèle; Mühlhäuser, Max
Mobile HCI 2020: Expanding the Horizon of Mobile Interaction
[Conference Proceedings]

Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Mensch und Computer 2020 - Workshopband
[Conference Proceedings]

Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, Oksana; Reinheimer, Benjamin; Aldag, Lukas; Mayer, Peter; Gerber, Nina; Volkamer, Melanie
Financial Cryptography and Data Security, p.84-101
[Conference Proceedings]

Signatures from Sequential-OR Proofs
Fischlin, Marc; Harasser, Patrick; Janson, Christian
Advances in Cryptology - EUROCRYPT 2020, p.212-244
[Conference Proceedings]

IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Meyer-Berg, Andreas; Egert, Rolf; Böck, Leon; Mühlhäuser, Max
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
[Journal Article]

Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
Advances in Cryptology - ASIACRYPT 2020, p.221-252
[Conference Proceedings]

Verfassungs- und völkerrechtliche Fragen im militärischen Cyber- und Informationsraum unter besonderer Berücksichtigung des Parlamentsvorbehalts, der Zurechenbarkeit von Cyberangriffen sowie einer möglichen Anpassung nationaler und inter­nationaler Normen
Reinhold, Thomas

An Overview of the Botnet Si­mu­la­tion Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]

Control Behavior Integrity for Distributed Cyber-Physical Systems
Adepu, Sridhar; Brasser, Ferdinand; Garcia, Luis; Rodler, Michael; Davi, Lucas; Sadeghi, Ahmad-Reza; Zonouz, Saman A.
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), p.1-15
[Conference Proceedings]

Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]

Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]

LegIoT: Ledgered Trust Management Platform for IoT
Neureither, Jens; Dmitrienko, Alexandra; Koisser, David; Brasser, Ferdinand; Sadeghi, Ahmad-Reza
Computer Security - ESORICS 2020, p.377-396
[Conference Proceedings]

Information-Theoretic Security of Cryptographic Channels
Fischlin, Marc; Günther, Felix; Muth, Philipp
Information and Communications Security, p.295-311
[Conference Proceedings]

LeakyPick: IoT Audio Spy Detector
Mitev, Richard; Pazii, Anna; Miettinen, Markus; Enck, William; Sadeghi, Ahmad-Reza
ACSAC '20: Annual Computer Security Applications Conference, p.694-705
[Conference Proceedings]

Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic
Nguyen, Thien Duc; Miettinen, Markus; Sadeghi, Ahmad-Reza
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense
[Conference Proceedings]

Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild
Lauinger, Johannes; Baumgärtner, Lars; Wickert, Anna-Katharina; Mezini, Mira
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.410-417
[Conference Proceedings]

Mind the GAP: Security & Privacy Risks of Contact Tracing Apps
Baumgärtner, Lars; Dmitrienko, Alexandra; Freisleben, Bernd; Gruler, Alexander; Höchst, Jonas; Kühlberg, Joshua; Mezini, Mira; Mitev, Richard; Miettinen, Markus; Muhamedagic, Anel; Nguyen, Thien Duc; Penning, Alvar; Pustelnik, Frederik; Roos, Filipp; Sadeghi, Ahmad-Reza; Schwarz, Michael; Uhl, Christian
Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.458-467
[Conference Proceedings]

Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy
Glanz, Leonid; Müller, Patrick; Baumgärtner, Lars; Reif, Michael; Anthonysamy, Pauline; Mezini, Mira
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, p.694-707
[Conference Proceedings]

How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]

Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
[Journal Article]

LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]

Classic McEliece Implementation with Low Memory Footprint
Roth, Johannes; Karatsiolis, Vangelis; Krämer, Juliane
19th Smart Card Research and Advanced Application Conference (CARDIS 2020)
[Conference Proceedings]

Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]

Cost Fairness for Blockchain-Based Two-Party Exchang Protocols
Lohr, Matthias; Schlosser, Benjamin; Jürjens, Jan; Staab, Matthias
3rd IEEE International Conference on Blockchain
[Conference Proceedings]

Security of Public Key Encryption against Resetting Attacks
Krämer, Juliane; Struck, Patrick
21st International Conference on Cryptology in India (Indocrypt 2020)
[Conference Proceedings]

Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the 28th European Conference on Information Systems (ECIS)
[Conference Proceedings]

OptiSwap: Fast Optimistic Fair Exchange
Eckey, Lisa; Faust, Sebastian; Schlosser, Benjamin
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20)
[Conference Proceedings]

Towards Post-Quantum Security for Signal's X3DH Handshake
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas
27th Selected Areas in Cryptography (SAC 2020)
[Conference Proceedings]