Publications

Publications

Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]


Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]


Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]


Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen
Kulyk, Oksana; Gerber, Nina; Volkamer, Melanie; Hilt, Annika
Datenschutz und Datensicherheit - DuD, p.81-85
[Journal Article]


Investigating People’s Privacy Risk Perception
Gerber, Nina; Reinheimer, Benjamin; Volkamer, Melanie
Proceedings on Privacy Enhancing Technologies, p.267-288
[Journal Article]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, Andreas; Jiménez, Abelino; Treiber, Amos; Kolberg, Jascha; Jasserand, Catherine; Kindt, Els; Delgado, Héctor; Todisco, Massimiliano; Hmani, Mohamed Amine; Mtibaa, Aymen; Abdelraheem, Mohammed Ahmed; Abad, Alberto; Teixeira, Francisco; Matrouf, Driss; Gomez-Barrero, Marta; Petrovska-Delacrétaz, Dijana; Chollet, Gérard; Evans, Nicholas; Schneider, Thomas; Bonastre, Jean-François; Raj, Bhiksha; Trancoso, Isabel; Busch, Christoph
Computer Speech and Language, p.441-480
[Journal Article]


Encouraging Password Manager Reuse
Renaud, Karen; Zimmermann, Verena
Network Security
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, p.197-216
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
[Journal Article]


Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]


Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]


Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]


Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]


Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
IET Information Security
[Journal Article]


Environment-Assisted Quantum Transport in a 10-qubit Network
Maier, Christine; Brydges, Tiff; Jurcevic, Petar; Trautmann, Nils; Hempel, Cornelius; Lanyon, Ben P.; Hauke, Philipp; Blatt, Rainer; Roos, Christian F.
PHYSICAL REVIEW LETTERS, p.50501
[Journal Article]


Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, p.29367-29379
[Journal Article]


Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]


Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
[Journal Article]


Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
eprint
[Journal Article]


Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
[Journal Article, Report]


Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, p.259
[Journal Article]


Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
[Journal Article]


Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study
Saeed, Saqib; Pipek, Volkmar; Rohde, Markus; Reuter, Christian; Pinatti de Carvalho, Aparecido Fabiano; Wulf, Volker
IEEE Access, p.63564-63577
[Journal Article]


Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Habdank, Matthias
Behaviour & Information Technology (BIT), p.319-342
[Journal Article]


Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas
arXiv:1907.07725 cs.SI, p.1-11
[Journal Article]


Keep on rating – on the systematic rating and comparison of authentication schemes
Zimmermann, Verena; Gerber, Nina; Mayer, Peter; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin
Information & Computer Security
[Journal Article]


X.509-Compliant Hybrid Certificates for the Post-Quantum Transition
Bindel, Nina; Braun, Johannes; Gladiator, Luca; Stöckert, Tobias; Wirth, Johannes
Journal of Open Source Software
[Journal Article]


Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles
Kohnhäuser, Florian; Püllen, Dominik; Katzenbeisser, Stefan
IEEE Workshop on the Internet of Safe Things
[Journal Article]


Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset
Zimmermann, Verena; Renaud, Karen
International Journal of Human-Computer Studies
[Journal Article]