Detection and Forensics of Domains Hijacking
Borgwart, Andreas; Boukoros, Spyros; Shulman, Haya; Waidner, Michael; Royeen, Carel van
IEEE Global Communications Conference
[Conference Proceedings]

IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Bagci, Ibrahim Ethem; Roedig, Utz; Martinovic, Ivan; Schulz, Matthias; Hollick, Matthias
Using Channel State Information for Tamper Detection in the Internet of Things, p.131-140
[Conference Proceedings]

Poster: Password Entering and Transmission Security
Canova, Gamze; Volkamer, Melanie; Weiler, Simon
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.1418-1420
[Conference Proceedings]

Long term confidentiality: a survey
Braun, J.; Buchmann, J.; Mullan, C.; Wiesmaier, A.
Designs, Codes and Cryptography (Journal), Vol.71, p.459-478
[Journal Article]

Towards the Smart Grid: Substation Automation Architecture and Technologies
Leonardi, A.; Mathioudakis, K.; Wiesmaier, A.; Zeiger, F.
Advances in Electrical Engineering (Journal), Vol.Article ID 896296
[Journal Article]

SAX-PAC (scalable and expressive packet classification)
Kogan, Kirill; Nikolenko, Sergey I.; Rottenstreich, Ori; Culhane, William; Eugster, Patrick
Proceedings of the 2014 ACM conference on SIGCOMM, p.15-26
[Conference Proceedings]

I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV
Ghiglieri, Marco
Workshop Web 2.0 Security & Privacy 2014 in conjunction with the IEEE Symposium on Security and Privacy
[Conference Proceedings]

Authentication Schemes - Comparison and Effective Password Spaces
Mayer, Peter; Volkamer, Melanie; Kauer, Michaela
Information Systems Security : International Conference on Information Systems Security (ICISS), p.204-225
[Conference Proceedings]

Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
Dessouky, Ghada; Klaiber, Michael J.; Bailey, Donald G.; Simon, Svenja
24th International Conference on Field Programmable Logic and Applications (FPL)
[Conference Proceedings]

Swap and Play: Live Updating Hypervisors and Its Application to Xen
Sadeghi, Ahmad-Reza; Brasser, Ferdinand
CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings
[Conference Proceedings]

A performance analysis of long-term archiving techniques
Vigil, Martín; Weinert, Christian; Braden, Kjell; Demirel, Denise; Buchmann, Johannes
IEEE - High Performace Computing and Communications (HPCC 2014), p.878-889
[Conference Proceedings]

AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security
Suri, Neeraj; Taha, Ahmed; Trapero, Ruben; Luna, Jesus
Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14)
[Conference Proceedings]

Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
Shulman, Haya; Waidner, Michael
International Conference on Applied Cryptography and Network Security (ACNS 2014), p.531-548
[Conference Proceedings]

Pretty Bad Privacy: Pitfalls of DNS Encryption
Shulman, Haya
Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, p.191-200 (9)
[Conference Proceedings]

Covert Computation - Hiding code in code through compile-time obfuscation
Schrittwieser, Sebastian; Katzenbeisser, Stefan; Kieseberg, Peter; Huber, Markus; Leithner, Manuel; Mulazzani, Martin; Weippl, Edgar
Computers & Security, p.13-26
[Conference Proceedings]

Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
Schaller, André; Arul, Tolga; Leest, Vincent van der; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing ( TRUST), p.83-100
[Conference Proceedings]

Exploiting thermal reflection for interactive systems
Sahami Shirazi, Alireza; Abdelrahman, Yomna; Henze, Niels; Schneegass, Stefan; Khalilbeigi, Mohammadreza; Schmidt, Albrecht
Proceedings of the 32nd annual ACM conference on Human factors in computing systems, p.3483--3492
[Conference Proceedings]

NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings
Roos, Stefanie; Strufe, Thorsten
CoRR, abs/1401.2165
[Journal Article]

Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks
Riecker, Michael; Biedermann, Sebastian; Bansarkhani, Rachid El; Hollick, Matthias
International Journal of Information Security, p.155-167
[Journal Article]

A Holistic Framework for the Evaluation of Internet Voting Systems
Neumann, Stephan; Volkamer, Melanie

Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie

Mutant Differential Fault Analysis of Trivium MDFA
Mohamed, Mohamed Saied Emam; Buchmann, Johannes
the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer
[Conference Proceedings]

Open Source für europäische Signaturen
Horsch, Moritz; Derler, David; Rath, Christof; Haase, Hans-Martin; Wich, Tobias
>Datenschutz und Datensicherheit, p.237-241
[Journal Article]

Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
MultiMedia und Recht (MMR), p.154-158
[Journal Article]

Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
Günther, Felix; Manulis, Mark; Peter, Andreas
IACR Cryptology ePrint Archive 2014
[Conference Proceedings]

CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations
Franz, Martin; Holzer, Andreas; Katzenbeisser, Stefan; Schallhart, Christian; Veith, Helmut
Compiler Construction (CC)2014, Lecture Notes in Computer Science, p.244-249
[Conference Proceedings]

Robust Multi-Property Combiners for Hash Functions
Fischlin, Marc; Lehmann, Anja; Pietrzak, Krzysztof
J. Cryptology, p.397-428
[Conference Proceedings]

Towards Lattice Based Sequential Aggregate Signatures
Bansarkhani, Rachid El; Buchmann, Johannes
Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, p.336-355
[Conference Proceedings]

LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions
Bansarkhani, Rachid El; Buchmann, Johannes
IACR Cryptology ePrint Archive 2014: 334
[Conference Proceedings]

Unpicking PLAID
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
Security Standardisation Research, p.1-25
[Conference Proceedings]