Publications

Publications

Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
[Journal Article]


Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
[Journal Article]


Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
[Journal Article]


Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
[Journal Article]


Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]


Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
[Journal Article]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
[Journal Article]


Computational trust methods for security quantification in the cloud ecosystem
Habib, Sheikh Mahbub; Volk, Florian; Hauke, Sascha; Mühlhäuser, Max
The Cloud Security Ecosystem, p.463-493
[Journal Article]


Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
[Journal Article]


Toward a Just-in-Time Static Analysis
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
[Journal Article]


Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption
Tao, Chengdong; Xiang, Hong; Petzoldt, Albrecht; Ding, Jintai
Finite Fields and Their Applications, p.352-368
[Journal Article]


DNSSEC for Cyber Forensics
Shulman, Haya; Waidner, Michael
EURASIP J. Information Security, p.14
[Journal Article]


Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, Stephan; Volkamer, Melanie; Strube, Moritz; Jung, Wolfgang; Brelle, Achim
Datenschutz und Datensicherheit, p.747-752
[Journal Article]


Body-worn Cameras for Police Accountability: Opportunities and Risks
Coudert, Fanny; Butin, Denis; Métayer, Daniel Le
Computer Law & Security Review (CLSR), p.749-762
[Journal Article]


Pulse-controlled quantum gate sequences on a strongly coupled qubit chain
Frydrych, Holger; Marthaler, Michael; Alber, Gernot
Physical Review A
[Journal Article]


Long term confidentiality: a survey
Braun, J.; Buchmann, J.; Mullan, C.; Wiesmaier, A.
Designs, Codes and Cryptography (Journal), Vol.71, p.459-478
[Journal Article]


Towards the Smart Grid: Substation Automation Architecture and Technologies
Leonardi, A.; Mathioudakis, K.; Wiesmaier, A.; Zeiger, F.
Advances in Electrical Engineering (Journal), Vol.Article ID 896296
[Journal Article]


NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings
Roos, Stefanie; Strufe, Thorsten
CoRR, abs/1401.2165
[Journal Article]


Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks
Riecker, Michael; Biedermann, Sebastian; Bansarkhani, Rachid El; Hollick, Matthias
International Journal of Information Security, p.155-167
[Journal Article]


Open Source für europäische Signaturen
Horsch, Moritz; Derler, David; Rath, Christof; Haase, Hans-Martin; Wich, Tobias
>Datenschutz und Datensicherheit, p.237-241
[Journal Article]


Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
MultiMedia und Recht (MMR), p.154-158
[Journal Article]


Usable Privacy for Mobile Sensing Applications
Christin, Delphine; Engelmann, Franziska; Hollick, Matthias
Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), p.92-107
[Journal Article]


ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Biedermann, Sebastian; Karvelas, Nikolaos; Katzenbeisser, Stefan; Strufe, Thorsten; Peter, Andreas
SOFSEM 2014: Theory and Practice of Computer Science, p.114-125
[Journal Article]


Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, Carina; Bartsch, Steffen; Volkamer, Melanie
Computer und Recht, p.119-127
[Journal Article]


TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, Delphine; Pons-Sorolla, Daniel Rodriguez; Hollick, Matthias; Kanhere, Salil
International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), p.1-6
[Journal Article]


Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, Jurlind; Jöris, Roman; Volkamer, Melanie
Journal of Information Security and Applications, p.1-10
[Journal Article]


CA Trust Management for the Web PKI
Braun, Johannes; Volk, Florian; Classen, Jiska; Buchmann, Johannes; Mühlhäuser, Max
Journal of Computer Security, p.913-959
[Journal Article]


Long Term Confidentiality: a Survey
Braun, Johannes; Buchmann, Johannes; Mullan, Ciaran; Wiesmaier, Alexander
Designs, Codes and Cryptography, p.459-478
[Journal Article]


Citizen Electronic Identities using {TPM} 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
CoRR, p.37-48
[Journal Article, Conference Proceedings]


The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
Security Privacy, IEEE, p.29-37
[Journal Article]