Publications

Publications

A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; Bansarkhani, Rachid El; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
Language: English
[Journal Article]


HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
Language: English
[Journal Article]


Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
Language: English
[Journal Article]


IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
Language: English
[Journal Article]


Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
Language: English
[Journal Article, Conference Proceedings]


Zur Verantwortung der Informatik in einer technologisierten Gesellschaft
Reinhold, Thomas
Sicherheit und Frieden
Language: German
[Journal Article]


Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection
Pottebaum, Jens; Reuter, Christian
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.iv-vii
Language: English
[Journal Article]


The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
Language: English
[Conference Proceedings, Journal Article]


From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement
Mosconi, Gaia; Korn, Matthias; Reuter, Christian; Tolmie, Peter; Teli, Maurizio; Pipek, Volkmar
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.959-1003
Language: English
[Journal Article]


Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays
Ludwig, Thomas; Kotthaus, Christoph; Reuter, Christian; Dongen, Sören Van; Pipek, Volkmar
International Journal on Human-Computer Studies (IJHCS), p.103-121
Language: English
[Journal Article]


Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme
Kaufhold, Marc-André; Reuter, Christian
Wissenschaft trifft Praxis, p.78-88
Language: German
[Journal Article]


Holographic quantum imaging: reconstructing spatial properties via two-particle interference
Trautmann, N.; Ferenczi, Gergely; Croke, Sarah; Barnett, Stephen
Journal of Optics
Language: English
[Journal Article]


Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Günther, Felix; Poettering, Bertram
International Journal of Information Security, p.281-297
Language: English
[Journal Article]


More Efficient Oblivious Transfer Extensions
Asharov, Gilad; Lindell, Yehuda; Schneider, Thomas; Zohner, Michael
Journal of Cryptology (JoC), p.805-858
Language: English
[Journal Article]


Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
Language: English
[Journal Article]


Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, Silke; Volkamer, Melanie; Neumann, Stephan
>Mittelstand 4.0 - Agentur Kommunikation
Language: German
[Journal Article]


Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
Kohnhäuser, Florian; Büscher, Niklas; Gabmeyer, Sebastian; Katzenbeisser, Stefan
arXiv
Language: German
[Journal Article]


User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin; Kunz, Alexandra
>Computers & Security, p.100-113
Language: English
[Journal Article]


Will a Decaying Atom Feel a Friction Force?
Trautmann, Nils; Sonnleitner, Matthias; Barnett, Stephen
Physical Review Letters
Language: English
[Journal Article]


Privacy-Preserving Interdomain Routing at Internet Scale
Asharov, Gilad; Demmler, Daniel; Schapira, Michael; Schneider, Thomas; Segev, Gil; Shenker, Scott; Zohner, Michael
Proceedings on Privacy Enhancing Technologies (PoPETs), p.143-163
Language: English
[Journal Article]


Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, Verena; Volkamer, Melanie; Vogt, Joachim; Henhapl, Birgit
>Datenschutz und Datensicherheit - DUD, p.308-313
Language: German
[Journal Article]


Security Notions for Bidirectional Channels
Marson, Giorgia Azzurra; Poettering, Bertram
IACR Transactions on Symmetric Cryptology, p.405-426
Language: German
[Journal Article]


Quantum Cryptography: a view from classical cryptography
Buchmann, Johannes; Braun, Johannes; Demirel, Denise; Geihs, Matthias
Quantum Science and Technology
Language: German
[Journal Article]


Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie
IEEE Security & Privacy, p.24-29
Language: English
[Journal Article]


Toward Practical Secure Stable Matching
Riazi, M. Sadegh; Songhori, Ebrahim M.; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
Proceedings on Privacy Enhancing Technologies (PoPETs), p.62-78
Language: English
[Journal Article]


Private Set Intersection for Unequal Set Sizes with Mobile Applications
Kiss, Ágnes; Liu, Jian; Schneider, Thomas; Asokan, N.; Pinkas, Benny
Proceedings on Privacy Enhancing Technologies (PoPETs), p.177-197
Language: English
[Journal Article]


The Day the Cryptography Dies
Mulholland, John; Mosca, Michele; Braun, Johannes
IEEE Security & Privacy, p.14-21
Language: German
[Journal Article]


Hash-Based Signatures: State of Play
Butin, Denis
IEEE Security & Privacy, p.37-43
Language: German
[Journal Article]


Postquantum Cryptography - State of the Art
Buchmann, Johannes; Lauter, Kristin; Mosca, Michele
IEEE Security & Privacy, p.12-13
Language: German
[Journal Article]


Survey and Systematization of Secure Device Pairing
Fomichev, Mikhail; Álvarez, Flor; Steinmetzer, Daniel; Gardner-Stephen, Paul; Hollick, Matthias
IEEE Communications Surveys & Tutorials, p.517-550
Language: English
[Journal Article]