Publications

Publications

Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
Reuter, Christian; Hughes, Amanda Lee; Kaufhold, Marc-André
International Journal on Human-Computer Interaction (IJHCI), p.280-294
[Journal Article]


Editorial of the Special Issue on Social Media in Crisis Management
Reuter, Christian; Hughes, Amanda Lee; Hiltz, Starr Roxanne; Imran, Muhammad; Plotnick, Linda
International Journal on Human-Computer Interaction (IJHCI), p.277-279
[Journal Article]


Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
[Journal Article]


A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
[Journal Article]


M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
[Report, Journal Article]


Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
[Journal Article]


DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Dang, Minh Hoang; Asokan, N.; Sadeghi, Ahmad-Reza
CoRR
[Journal Article]


OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
[Journal Article]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Journal of Logical and Algebraic Methods in Programming, p.45-67
[Journal Article]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), p.45-67
[Journal Article]


A Systematic Evaluation of API-Misuse Detectors
Amann, Sven; Nguyen, Hoan Anh; Nadi, Sarah; Nguyen, Tien; Mezini, Mira
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Journal Article]


Scalable Private Set Intersection Based on OT Extension
Pinkas, Benny; Schneider, Thomas; Zohner, Michael
ACM Transactions on Privacy and Security (TOPS), p.7:1-7:35
[Journal Article]


Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks
Trautmann, N.; Hauke, P.
Physical Review A
[Journal Article]


PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
[Journal Article]


Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus
Journal of Mathematical Cryptology
[Journal Article]


An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Cryptography
[Journal Article]


Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
[Journal Article]


Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Schaller, André; Xiong, Wenjie; Jain, Manishkumar; Saleem, Umair; Lotichius, Jan; Gabmeyer, Sebastian; Szefer, Jakub; Katzenbeisser, Stefan
Cryptography
[Journal Article]


A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]


Efficient, accurate, and rotation-invariant iris code
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
[Journal Article]


Execution Integrity with In-Place Encryption
Sullivan, Dean; Arias, Orlando; Gens, David; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
CoRR
[Journal Article]


A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; Bansarkhani, Rachid El; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
[Journal Article]


Selbstdatenschutz im vernetzten Fahrzeug - Eine Datenschutzloesung unter Berücksichtigung der technischen, rechtlichen und Nutzeranforderungen
Krauß, Christoph; Robrahn, Rasmus; von Pape, Thilo; Zelle, Daniel
Datenschutz und Datensicherheit, Vol.41, p.217-222
[Journal Article]


Design and Implementation Aspects of Mobile Derived Identities
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
CoRR, Vol.abs/1707.06505
[Journal Article]


Alle reden über Blockchain
Grimm, Rüdiger; Heinemann, Andreas
Datenschutz und Datensicherheit, Vol.41, p.469
[Journal Article]


Methods for accuracy-preserving acceleration of large-scale comparisons in CPU-based iris recognition systems
Rathgeb, C.; Buchmann, N.; Hofbauer, H.; Baier, H.; Uhl, A.; Busch, C.
IET Biometrics
[Journal Article]


Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
Nautsch, A.; Meuwly, D.; Ramos, D.; Lindh, J.; Busch, C.
IEEE Signal Processing Letters, Vol.24, p.1552-1556
[Journal Article]


Biometric template protection based on Bloom filters and honey templates
Martiri, E.; Gomez-Barrero, M.; Yang, B.; Busch, C.
IET Biometrics, Vol.6, p.19-26
[Journal Article]


Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
Gomez-Barrero, M.; Galbally, J.; Morales, A.; Fierrez, J.
IEEE Access, Vol.5, p.8606-8619
[Journal Article]


Standardisierung von Biometric Template Protection: Aktueller Status und Bewertung der Verknüpfbarkeit
Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
Datenschutz und Datensicherheit, Vol.41, p.422-426
[Journal Article]