Execution Integrity with In-Place Encryption
Sullivan, Dean; Arias, Orlando; Gens, David; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
[Journal Article]

A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; Bansarkhani, Rachid El; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
[Journal Article]

Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Krauß, Christoph; Robrahn, Rasmus; von Pape, Thilo; Zelle, Daniel
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]

Design and Implementation Aspects of Mobile Derived Identities
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
CoRR, Vol.abs/1707.06505
[Journal Article]

Alle reden über Blockchain
Grimm, Rüdiger; Heinemann, Andreas
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]

Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
Rathgeb, C.; Buchmann, N.; Hofbauer, H.; Baier, H.; Uhl, A.; Busch, C.
IET Biometrics
[Journal Article]

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]

Biometric template protection based on Bloom filters and honey templates
Martiri, E.; Gomez-Barrero, M.; Yang, B.; Busch, C.
IET Biometrics, Vol.6, p.19-26
[Journal Article]

Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
Gomez-Barrero, M.; Galbally, J.; Morales, A.; Fierrez, J.
IEEE Access, Vol.5, p.8606-8619
[Journal Article]

Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]

Multi-Biometric Template Protection Based on Homomorphic Encryption
Gomez-Barrero, M.; Maiorana, E.; Galbally, J.; Campisi, P.; Fierrez, J.
Pattern Recognition, Vol.67, p.149-163
[Journal Article]

Standardisierung von Biometric Template Protection
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]

Bloom Filter-based Search Structures for Indexing and Retrieving Iris-Codes
Drozdowski, P.; Rathgeb, C.; Busch, C.
IET Biometrics, Vol.7, p.260-268
[Journal Article]

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
[Journal Article]

Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
[Journal Article]

IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
[Journal Article]

Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
[Journal Article, Conference Proceedings]

Zur Verantwortung der Informatik in einer technologisierten Gesellschaft
Reinhold, Thomas
Sicherheit und Frieden
[Journal Article]

Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection
Pottebaum, Jens; Reuter, Christian
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.iv-vii
[Journal Article]

The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Conference Proceedings, Journal Article]

From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement
Mosconi, Gaia; Korn, Matthias; Reuter, Christian; Tolmie, Peter; Teli, Maurizio; Pipek, Volkmar
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.959-1003
[Journal Article]

Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays
Ludwig, Thomas; Kotthaus, Christoph; Reuter, Christian; Dongen, Sören Van; Pipek, Volkmar
International Journal on Human-Computer Studies (IJHCS), p.103-121
[Journal Article]

Integration von Flow in die Mensch-Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme
Kaufhold, Marc-André; Reuter, Christian
Wissenschaft trifft Praxis, p.78-88
[Journal Article]

Holographic quantum imaging: reconstructing spatial properties via two-particle interference
Trautmann, N.; Ferenczi, Gergely; Croke, Sarah; Barnett, Stephen
Journal of Optics
[Journal Article]

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
International Journal of Information Security, p.281-297
[Journal Article]

More Efficient Oblivious Transfer Extensions
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
Journal of Cryptology (JoC), p.805-858
[Journal Article]

Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
[Journal Article]

Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, Silke; Volkamer, Melanie; Neumann, Stephan
>Mittelstand 4.0 - Agentur Kommunikation
[Journal Article]

Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
[Journal Article]

User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
>Computers & Security, p.100-113
[Journal Article]