Publications

Publications

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
Cryptology ePrint Archive, p.1-19
Language: English
[Journal Article]


TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Schwabe, Peter
Cryptology ePrints Archive, p.1-24
Language: English
[Journal Article]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, M.; Buchmann, J.; Cabarcas, D.; Weinert, C.; Wiesmaier, A.
Computer \& Security (Journal), Vol.50, p.16-32
[Journal Article]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Datenschutz und Datensicherheit, Vol.39, p.383-387
[Journal Article]


A probabilistic kernel method for human mobility prediction with smartphones
Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel
Pervasive and Mobile Computing, p.13-28
Language: German
[Journal Article]


Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
IACR Cryptology ePrint Archive, p.765
Language: English
[Journal Article]


Universality in random quantum networks
Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physical Review A
Language: English
[Journal Article]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
>Datenschutz und Datensicherheit DuD, p.383-387
Language: German
[Journal Article]


High Performance Lattice-based CCA-secure Encryption
Bansarkhani, Rachid El; Buchmann, Johannes
Cryptology ePrint Archive, p.20
Language: German
[Journal Article]


Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
Language: German
[Journal Article]


Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
Language: German
[Journal Article]


Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
Language: English
[Journal Article]


Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
Language: German
[Journal Article]


Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
PHYSICAL REVIEW LETTERS
Language: German
[Journal Article]


Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
Language: English
[Journal Article]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
Language: 1
[Journal Article]


Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
Language: English
[Journal Article]


Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
Language: 1
[Journal Article]


Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
Language: German
[Journal Article]


Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Tao, Chengdong; Xiang, Hong; Petzoldt, Albrecht; Ding, Jintai
Finite Fields and Their Applications, p.352-368
Language: 1
[Journal Article]


DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
Language: German
[Journal Article]


Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
Language: German
[Journal Article]


Body-worn Cameras for Police Accountability: Opportunities and Risks
Coudert, Fanny; Butin, Denis; Métayer, Daniel Le
Computer Law & Security Review (CLSR), p.749-762
Language: German
[Journal Article]


Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
Language: English
[Journal Article]


Wirtschaftskriminalität: Betrugsradar entwickeln. Interview
Steinebach, Martin
Language: German
[Journal Article, Electronic Publication]


Security compliance tracking of processes in networked cooperating systems
Rieke, Roland; Zhdanova, Maria; Repp, Jürgen
Language: English
[Journal Article, Electronic Publication]


Konsequenzen festgestellter Verstöße bei der Auftragsdatenverarbeitungskontrolle: Anwendbarkeit auf automatisierte Kontrollen im Rahmen der Erbringung von Cloud-Diensten
Kunz, Thomas; Selzer, Annika; Steiner, Simone
Language: German
[Journal Article]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Language: German
[Journal Article]


An integrated security and systems engineering process and modelling framework
Ruiz, J.F.; Mana, A.; Rudolph, C.
Language: English
[Journal Article]


Incorporating attacker capabilities in risk estimation and mitigation
Othmane, L. ben; Ranchal, R.; Fernando, R.; Bhargava, B.; Bodden, E.
Language: English
[Journal Article]