Publications
Publications
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
Heinze, Dennis; Classen, Jiska; Rohrbach, Felix
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
The 25th Australasian Conference on Information Security and Privacy (ACISP'20)
[Conference Proceedings]
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models
Stojanovic, Vladimir M.
Physical Review B
[Journal Article]
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]
The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
[Conference Proceedings]
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
[Conference Proceedings]
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Cloosters, Tobias; Rodler, Michael; Davi, Lucas
29th USENIX Security Symposium
[Conference Proceedings]
Trusted Execution Environments: Properties, Applications, and Challenges
Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
IEEE Security & Privacy, p.56-60
[Journal Article]
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Krämer, Juliane; Struck, Patrick
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020)
[Conference Proceedings]
On the Security of Strong Memristor-based Physically Unclonable Functions
Zeitouni, Shaza; Stapf, Emmanuel; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Design Automation Conference 2020
[Conference Proceedings]
SAFE: A Secure and Efficient Long-Term Distributed Storage System
Buchmann, Johannes; Dessouky, Ghada; Frassetto, Tommaso; Kiss, Ágnes; Sadeghi, Ahmad-Reza; Schneider, Thomas; Traverso, Giulia; Zeitouni, Shaza
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20)
[Conference Proceedings]
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Nguyen, Thien Duc; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020
[Conference Proceedings]
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
24th International Conference on Financial Cryptography and Data Security (FC'20)
[Conference Proceedings]
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Sauer, Alexander; Alber, Gernot
Cryptography, Vol.4
[Journal Article]
Deterministic twirling with low resources
Stonner, David Jakob; Kysela, Jaroslav; Weir, Graeme; Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physics letters A
[Journal Article]
Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
[Journal Article]
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, p.543-546
[Journal Article]
Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz
Reuter, Christian
Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, p.309-318
Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
[Journal Article]
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]
Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Heidt, Margareta; Olt, Christian M.; Buxmann, Peter
Internationale Tagung Wirtschaftsinformatik
[Conference Proceedings]
HEALED: HEaling & Attestation for Low-end
Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019
[Conference Proceedings]
Asymmetric DCnets for Effective and Efficient Sender Anonymity
Grube, Tim; Daubert, Jörg; Mühlhäuser, Max
IEEE Global Communications Conference (GLOBECOM)
[Conference Proceedings]
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Truong, Hien Thi Thu; Toivonen, Juhani; Nguyen, Thien Duc; Soriente, Claudio; Tarkoma, Sasu; Asokan, N.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019)
[Conference Proceedings]
On (The Lack Of) Location Privacy in Crowdsourcing Applications
Boukoros, Spyros; Humbert, Mathias; Katzenbeisser, Stefan; Troncoso, Carmela
USENIX Security Symposium
[Conference Proceedings]
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]
Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads
Mayer, Peter; Gerber, Nina; Reinheimer, Benjamin; Rack, Philipp; Braun, Kristoffer; Volkamer, Melanie
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p.1-12
[Conference Proceedings]