Publications

Publications

Exploring energy grid resilience: The impact of data, prosumer awareness, and action
Egert, Rolf; Daubert, Jörg; Marsh, Stephen; Mühlhäuser, Max
Patterns
[Journal Article]


Holonic System Model for Resilient Energy Grid Operation
Egert, Rolf; Grube, Tim; Volk, Florian; Mühlhäuser, Max
Energies
[Journal Article]


PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]


Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com: Journal of Interactive Media, p.161-175
[Journal Article]


A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Journal of Cryptology
[Journal Article]


Multipath TLS 1.3
Fischlin, Marc; Müller, Sven-Andre; Münch, Jean-Pierre; Porth, Lars
Computer Security - ESORICS 2021, p.86-105
[Conference Proceedings]


Revisiting Hybrid Private Information Retrieval
Günther, Daniel; Schneider, Thomas; Wiegand, Felix
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2408-2410
[Conference Proceedings]


A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract)
Braun, Lennart; Cammarota, Rosario; Schneider, Thomas
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems
[Conference Proceedings]


Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
Fischlin, Marc; Sanina, Olga
Advances in Cryptology - ASIACRYPT 2021, p.696-725
[Conference Proceedings]


The Exact Security of BIP32 Wallets
Das, Poulami; Erwig, Andreas; Faust, Sebastian; Loss, Julian; Riahi, Siavash
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1020-1042
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josephine; Zimmermann, Verena; Gerber, Nina
i-com, p.161-175
[Conference Proceedings]


Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems
Zankel, Lisa Marie; Gerber, Paul; Zimmermann, Verena; Gerber, Nina
Adjunct Proceedings: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, p.71-76
[Conference Proceedings]


Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Brendel, Jacqueline; Fiedler, Rune; Günther, Felix; Janson, Christian; Stebila, Douglas
[Report]


On Derandomizing Yao’s Weak-to-Strong OWF Construction
Brzuska, Christina; Couteau, Geoffrey; Karanko, Phila; Rohrbach, Felix
Theory of Cryptography, p.429-456
[Conference Proceedings]


RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints
Surminski, Sebastian; Niesler, Christian; Brasser, Ferdinand; Davi, Lucas; Sadeghi, Ahmad-Reza
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2890-2905
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]


Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs
Hassan, Sohaib S.; Reuter, Christian; Bzhalava, Levan
International Journal of Innovation Management
[Journal Article]


Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]


On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]


SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]


Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Weber, Alexandra; Nikiforov, Oleg; Sauer, Alexander; Schickel, Johannes; Alber, Gernot; Mantel, Heiko; Walther, Thomas
26th European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


Privacy-preserving density-based clustering
Bozdemir, Beyza; Canard, Sebastian; Ermis, Orhan; Möllering, Helen; Önen, Melek; Schneider, Thomas
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21)
[Conference Proceedings]


Verifying Post-Quantum Signatures in 8kB of RAM
Gonzalez, Ruben; Hülsing, Andreas; Kannwischer, Matthias; Krämer, Juliane; Lange, Tanja; Stöttinger, Marc; Waitz, Elisabeth; Wiggers, Thom; Yang, Bo-Yin
Post-Quantum Cryptography, p.215-233
[Conference Proceedings]


Quantum Indistinguishability for Public Key Encryption
Gagliardoni, Tommaso; Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings
[Conference Proceedings]


FastZIP: faster and more secure zero-interaction pairing
Fomichev, Mikhail; Hesse, Julia; Almon, Lars; Lippert, Timm; Han, Jun; Hollick, Matthias
MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, p.440-452
[Conference Proceedings]


Exploring cybersecurity-related emotions and finding that they are challenging to measure
Renaud, Karen; Zimmermann, Verena; Schürmann, Tim; Böhm, Carlos
Humanities and Social Sciences Communications
[Journal Article]


Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]