Publications

Publications

Grösser Denken - Die Technologieprognose System Bahn 2050
Iffländer, Lukas; Buder, Thomas; Leining, Michael; Schubert, Max; Heinrich, Markus; Katzenbeißer, Stefan; Unger, Simon; Scheuermann, Dirk
[Journal Article]


Principles for Designing Authentication Mechanisms for Young Children: Lessons Learned from KidzPass
Renaud, Karen; Volkamer, Melanie; Mayer, Peter; Grimm, Rüdiger
[Journal Article]


Rock'n'roll PUFs: Crafting provably secure pufs from less secure ones (extended version)
Ganji, Fatemeh; Tajik, Shahin; Stauss, Pascal; Seifert, Jean-Pierre; Tehranipoor, Mark Mohammad; Forte, Domenic
International Workshop on Security Proofs for Embedded Systems (PROOFS) 2019
[Journal Article]


Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Phishing detection on tor hidden services
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 2021
[Journal Article]


An Economic Analysis of Appropriateness under Article 32 GDPR
Selzer, Annika; Woods, Daniel; Böhme, Rainer
[Journal Article]


Potenziale anonymer Da­ten­verarbeitungen nutzen. Ein Vorschlag für Smart Cities
Selzer, Annika; Timm, Ingo J.
[Journal Article]


Improved scalability of demand-aware datacenter topologies with minimal route lengths and congestion
Pacut, Maciej; Dai, Wenkai; Labbe, Alexandre; Foerster, Klaus-T.; Schmid, Stefan
[Journal Article]


Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
[Journal Article]


Einsatz von FIDO2 im PSD II-konformen Zahlungsverkehr
Heider, Jens
[Journal Article]


Cyber­sicher­heits­forschung als Teil der nationalen Sicherheitsarchitektur
Kreutzer, Michael; Schneider, Markus
[Journal Article]


Preacher: Network Policy Checker for Adversarial Environments
Thimmaraju, K.; Schiff, L.; Schmid, S.
[Journal Article]


Das digitale Erbe
Selzer, Annika; Waldmann, Ulrich
[Journal Article]


RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
[Journal Article]


Gestaltung eines Treuhand-Systems zum anonymen Datenaustausch in einer Smart-City-Umgebung. Gewährleistung angemessener Schutz­maß­nahmen
Selzer, Annika; Timm, Ingo J.
[Journal Article]


Optimized Portable Unilateral Magnetic Resonance Sensor for Assessing the Aging Status of Silicon Rubber Insulators
Xu, Xianneng; Guo, Pan; Lu, Ming; Zhao, Shujie; Xu, Zheng
[Journal Article]


Datenschutzmetriken im Beschäftigungsverhältnis. Verifikation der datenschutzkonformen Einwilligung
Diel, Sarah; Kohn, Matthias; Schleper, Janine; Selzer, Annika
[Journal Article]


Critical Traffic Analysis on the Tor Network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 2020
[Journal Article]


Privacy and Robust Hashes. Privacy-Preserving Forensics for Image Re-Identification
Steinebach, Martin; Lutz, Sebastian; Liu, Huajian
[Journal Article]


Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts
Frick, Raphael Antonius; Zmudzinski, Sascha; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


The structural basis of the genetic code: amino acid recognition by aminoacyl-tRNA synthetases
Kaiser, F.; Krautwurst, S.; Salentin, S.; Haupt, V.J.; Leberecht, C.; Bittrich, S.; Labudde, D.; Schroeder, M.
[Journal Article]


Secure IT without vulnerabilities and back doors
Weber, Arnd; Heiser, Gernot; Kuhlmann, Dirk; Schallbruch, Martin; Chattopadhyay, Anupam; Guilley, Sylvain; Kasper, Michael; Krauß, Christoph; Krüger, Philipp S.; Reith, Steffen; Seifert, Jean-Pierre
[Journal Article]


JAB Code - A Versatile Polychrome 2D Barcode
Berchtold, Waldemar; Liu, Huajian; Steinebach, Martin; Klein, Dominik; Senger, Tobias; Thenee, Nicolas
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


Uploadfilter - Funktionsweisen, Einsatzmöglichkeiten und Parametrisierung
Raue, Benjamin; Steinebach, Martin
Symposium "FILTER(N) oder nicht? Der Einsatz von Filtertechnologien im Urheber- und Medienrecht" 2020
[Journal Article]


Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models
Fenzl, Florian; Rieke, Roland; Chevalier, Y.; Dominik, A.; Kotenko, I.
[Journal Article]


Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Alkim, Erdem; Cheng, Dean Yun-Li; Chung, Chi-Ming Marvin; Evkan, Hülya; Huang, Leo Wei-Lun; Hwang, Vincent; Li, Ching-Lin Trista; Niederhagen, Ruben; Shih, Cheng-Jhih; Wälde, Julian; Yang, Bo-Yin
[Journal Article]


Checking the Integrity of Images with Signed Thumbnail Images
Steinebach, Martin; Jörg, Sebastian; Liu, Huajian
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


Fake News Detection by Image Montage Recognition
Steinebach, Martin; Liu, Huajian; Gotkowski, Karol
[Journal Article]


Datenschutz und Datensicherheit im Digital Public Health
Kunz, Thomas; Lange, Benjamin; Selzer, Annika
[Journal Article]


IT-Sicherheitsarchitektur für die nächste Generation der Leit- und Sicherheitstechnik
Heinrich, Markus; Krauß, Christoph; Zhdanova, Maria; Eckel, Michael; Katzenbeisser, Stefan; Kuzhiyelil, Don; Cosic, Jasmin; Drodt, Matthias
[Journal Article]