Publications

Publications

Unpicking PLAID
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
Security Standardisation Research, p.1-25
[Conference Proceedings]


A Second Look at Fischlin’s Transformation
Dagdelen, Özgür; Venturi, Daniele
Africacrypt 2014
[Conference Proceedings]


Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars
Dagdelen, Özgür; Fischlin, Marc
ISIT 2014 - IEEE International Symposium on Information Theory
[Conference Proceedings]


Usable Privacy for Mobile Sensing Applications
Christin, Delphine; Engelmann, Franziska; Hollick, Matthias
Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), p.92-107
[Journal Article]


A trusted versioning file system for passive mobile storage devices
Catuogno, Luigi; Löhr, Hans; Winandy, Marcel; Sadeghi, Ahmad-Reza
J. Network and Computer Applications, p.65-75
[Conference Proceedings]


Interaction Techniques for Co-located Collaborative TV
Buchner, Karolina; Lissermann, Roman; Holmquist, Lars Erik
CHI 2014, p.1819-1824
[Conference Proceedings]


Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM
Biedermann, Sebastian; Karvelas, Nikolaos; Peter, Andreas; Katzenbeisser, Stefan
IACR Cryptology ePrint Archive 2014
[Conference Proceedings]


ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Biedermann, Sebastian; Karvelas, Nikolaos; Katzenbeisser, Stefan; Strufe, Thorsten; Peter, Andreas
SOFSEM 2014: Theory and Practice of Computer Science, p.114-125
[Journal Article]


Scalable Offline Monitoring
Basin, David; Caronni, Germano; Ereth, Sarah; Harvan, Matus; Klaedtke, Felix; Mantel, Heiko
Proceedings of the 14th International Conference on Runtime Verification (RV)
[Conference Proceedings]


General Impossibility of Group Homomorphic Encryption in the Quantum World
Armknecht, Frederik; Gagliardoni, Tommaso; Katzenbeisser, Stefan; Peter, Andreas
Public-Key Cryptography PKC 2014, p.556-573
[Conference Proceedings]


Öffentlichkeitsgrundsatz und Stimmzettelbelege
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
[Report]


A Privacy Protection System for HbbTV in Smart TVs
Ghiglieri, Marco; Tews, Erik
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), p.648-653
[Conference Proceedings]


Web-Tracking-Report 2014
Schneider, Markus; Enzmann, Matthias; Stopczynski, Martin
[Report]


Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, Maina; Renaud, Karen; Bartsch, Steffen; Volkamer, Melanie
Workshop on Usable Security (USEC)
[Conference Proceedings]


Key2Share for Authentication Services
Busold, Christoph; Dmitrienko, Alexandra; Wachsmann, Christian
SmartCard Workshop
[Conference Proceedings]


Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, Jurlind; Woide, Marcel; Volkamer, Melanie
Workshop on Usable Security (USEC)
[Conference Proceedings]


Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, Carina; Bartsch, Steffen; Volkamer, Melanie
Computer und Recht, p.119-127
[Journal Article]


Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, Steffen; Boos, Carina; Dyck, Dominic; Schwarz, Christopher; Theuerling, Heike; Henhapl, Birgit; Volkamer, Melanie
Vielfalt der Informatik, p.168-171
[Conference Proceedings]


Zertifizierte Datensicherheit für mobile Anwendungen
Sohr, Karsten; Bartsch, Steffen; Volkamer, Melanie; Berger, Bernhard; Bodden, Eric; Brucker, Achim; Maseberg, Sönke; Kus, Mehmet; Heider, Jens
GI Sicherheit 2014, p.283--291
[Conference Proceedings]


MoP-2-MoP - Mobile private microblogging
Senftleben, Marius; Bucicoiu, Mihai; Tews, Erik; Armknecht, Frederik; Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security (FC'14)
[Conference Proceedings]


ASM: A Programmable Interface for Extending Android Security
Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza
[Report]


Personal DLP for Facebook
Ghiglieri, Marco; Stopczynski, Martin; Waidner, Michael
Pervasive Computing and Communications Workshops (PERCOM Workshops), p.629 - 634
[Conference Proceedings]


POSTER: On Offline Payments with Bitcoin
Dmitrienko, Alexandra; Noack, David; Sadeghi, Ahmad-Reza; Yung, Moti
FC'2014: Financial Cryptography and Data Security Conference
[Conference Proceedings]


On the (In)Security of Mobile Two-Factor Authentication
Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security (FC'14)
[Conference Proceedings]


Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations
Diaconita, Irina; Reinhardt, Andreas; Englert, Frank; Christin, Delphine; Steinmetz, Ralf
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), p.1-9
[Conference Proceedings]


Building Castles in Quicksand: Blueprints of a Crowdsourced Study
Renkema-Padmos, Arne; Volkamer, Melanie; Renaud, Karen
CHI 2014
[Conference Proceedings]


TrustLite: A Security Architecture for Tiny Embedded Devices
Koeberl, Patrick; Schulz, Steffen; Sadeghi, Ahmad-Reza; Varadharajan, Vijay
European Conference on Computer Systems (EuroSys)
[Conference Proceedings]


Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian
[Report]


TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, Delphine; Pons-Sorolla, Daniel Rodriguez; Hollick, Matthias; Kanhere, Salil
International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), p.1-6
[Journal Article]


Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, Jurlind; Jöris, Roman; Volkamer, Melanie
Journal of Information Security and Applications, p.1-10
[Journal Article]