Publications

Publications

Pretty Bad Privacy: Pitfalls of DNS Encryption
Shulman, Haya
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, p.191-200 (9)
[Conference Proceedings]


Covert Computation - Hiding code in code through compile-time obfuscation
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kieseberg, Peter; Huber, Markus; Leithner, Manuel; Mulazzani, Martin; Weippl, Edgar
Computers & Security, p.13-26
[Conference Proceedings]


Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
Schaller, André; Arul, Tolga; Leest, Vincent van der; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing ( TRUST), p.83-100
[Conference Proceedings]


Exploiting thermal reflection for interactive systems
Sahami Shirazi, Alireza; Abdelrahman, Yomna; Henze, Niels; Schneegass, Stefan; Khalilbeigi, Mohammadreza; Schmidt, Albrecht
Proceedings of the 32nd annual ACM conference on Human factors in computing systems, p.3483--3492
[Conference Proceedings]


NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings
Roos, Stefanie; Strufe, Thorsten
CoRR, abs/1401.2165
[Journal Article]


Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks
Riecker, Michael; Biedermann, Sebastian; Bansarkhani, Rachid El; Hollick, Matthias
International Journal of Information Security, p.155-167
[Journal Article]


A Holistic Framework for the Evaluation of Internet Voting Systems
Neumann, Stephan; Volkamer, Melanie


Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie


Mutant Differential Fault Analysis of Trivium MDFA
Mohamed, Mohamed Saied Emam; Buchmann, Johannes
the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer
[Conference Proceedings]


Open Source für europäische Signaturen
Horsch, Moritz; Derler, David; Rath, Christof; Haase, Hans-Martin; Wich, Tobias
>Datenschutz und Datensicherheit, p.237-241
[Journal Article]


Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
MultiMedia und Recht (MMR), p.154-158
[Journal Article]


Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Günther, Felix; Manulis, Mark; Peter, Andreas
IACR Cryptology ePrint Archive 2014
[Conference Proceedings]


CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations
Franz, Martin; Holzer, Andreas; Katzenbeisser, Stefan; Schallhart, Christian; Veith, Helmut
Compiler Construction (CC)2014, Lecture Notes in Computer Science, p.244-249
[Conference Proceedings]


Robust Multi-Property Combiners for Hash Functions
Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof
J. Cryptology, p.397-428
[Conference Proceedings]


Towards Lattice Based Sequential Aggregate Signatures
Bansarkhani, Rachid El; Buchmann, Johannes
Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, p.336-355
[Conference Proceedings]


LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions
Bansarkhani, Rachid El; Buchmann, Johannes
IACR Cryptology ePrint Archive 2014: 334
[Conference Proceedings]


Unpicking PLAID
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
Security Standardisation Research, p.1-25
[Conference Proceedings]


A Second Look at Fischlin’s Transformation
Dagdelen, Özgür; Venturi, Daniele
Africacrypt 2014
[Conference Proceedings]


Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars
Dagdelen, Özgür; Fischlin, Marc
ISIT 2014 - IEEE International Symposium on Information Theory
[Conference Proceedings]


Usable Privacy for Mobile Sensing Applications
Christin, Delphine; Engelmann, Franziska; Hollick, Matthias
Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), p.92-107
[Journal Article]


A trusted versioning file system for passive mobile storage devices
Catuogno, Luigi; Löhr, Hans; Winandy, Marcel; Sadeghi, Ahmad-Reza
J. Network and Computer Applications, p.65-75
[Conference Proceedings]


Interaction Techniques for Co-located Collaborative TV
Buchner, Karolina; Lissermann, Roman; Holmquist, Lars Erik
CHI 2014, p.1819-1824
[Conference Proceedings]


Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Biedermann, Sebastian; Karvelas, Nikolaos; Peter, Andreas; Katzenbeisser, Stefan
IACR Cryptology ePrint Archive 2014
[Conference Proceedings]


ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Biedermann, Sebastian; Karvelas, Nikolaos; Katzenbeisser, Stefan; Strufe, Thorsten; Peter, Andreas
SOFSEM 2014: Theory and Practice of Computer Science, p.114-125
[Journal Article]


Scalable Offline Monitoring
Basin, David; Caronni, Germano; Ereth, Sarah; Harvan, Matus; Klaedtke, Felix; Mantel, Heiko
Proceedings of the 14th International Conference on Runtime Verification (RV)
[Conference Proceedings]


General Impossibility of Group Homomorphic Encryption in the Quantum World
Armknecht, Frederik; Gagliardoni, Tommaso; Katzenbeisser, Stefan; Peter, Andreas
Public-Key Cryptography PKC 2014, p.556-573
[Conference Proceedings]


Öffentlichkeitsgrundsatz und Stimmzettelbelege
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
[Report]


A Privacy Protection System for HbbTV in Smart TVs
Ghiglieri, Marco; Tews, Erik
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), p.648-653
[Conference Proceedings]


Web-Tracking-Report 2014
Schneider, Markus; Enzmann, Matthias; Stopczynski, Martin
[Report]


Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, Maina; Renaud, Karen; Bartsch, Steffen; Volkamer, Melanie
Workshop on Usable Security (USEC)
[Conference Proceedings]