Publications

Publications

Personal Information Dashboard: Putting the Individual Back in Control
Buchmann, Johannes; Nebel, Maxi; Roßnagel, Alexander; Shirazi, Fatemeh; Simo, Hervais; Waidner, Michael
Digital Enlightenment Yearbook 2013, p.139-164
[Book]


Revocation & Non-Repudiation: When the first destroys the latter
Braun, Johannes; Kiefer, Franziskus; Hülsing, Andreas
Public Key Infrastructures, Services and Applications - EuroPKI 2013, p.31-46
[Conference Proceedings]


How Long Are You Staying? Predicting Residence Time from Human Mobility Traces
Baumann, Paul; Kleiminger, Wilhelm; Santini, Silvia
The 19th Annual International Conference on Mobile Computing and Networking, p.231-233
[Conference Proceedings]


Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
RiskKom-Workshop, INFORMATIK 2013, p.1971-1984
[Conference Proceedings]


Code based Identification and Signature Schemes in Software
Yousfi Alaoui, Sidi Mohamed el; Bansarkhani, Rachid El; Cayrel, Pierre-Louis; Hoffmann, Gerhard
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Conference Proceedings]


Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
Stancill, Blaine; Snow, Kevin; Otterness, Nathan; Monrose, Fabian; Davi, Lucas; Sadeghi, Ahmad-Reza
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Conference Proceedings]


HbbTV: Neue Funktionen mit möglichen Nebenwirkungen
Ghiglieri, Marco; Oswald, Florian; Tews, Erik
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, p.563-566
[Conference Proceedings]


Mental Models – General Introduction and Review of Their Application to Human-Centred Security
Volkamer, Melanie; Renaud, Karen
Number Theory and Cryptography, p.255-280


Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]


Bita: Coverage-Guided, Automatic Testing of Actor Programs
Tasharofi, Samira; Pradel, Michael; Lin, Yu; Johnson, Ralph
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.114-124
[Conference Proceedings]


PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dobre, Dan; Karame, Ghassan O.; Li, Wenting; Majuntke, Matthias; Suri, Neeraj; Vukolic, Marko
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.285-298
[Conference Proceedings]


Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
[Conference Proceedings]


Schutz­maß­nahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglich­keiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps
Bodden, Eric; Rasthofer, Siegfried; Richter, Philipp; Roßnagel, Alexander
Datenschutz und Datensicherheit, p.720 - 725
[Journal Article]


A Security Framework for Analysis and Design of Software Attestation
Armknecht, Frederik; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
ACM Conference on Computer and Communications Security (CCS), p.1-12
[Conference Proceedings]


On the Efficacy of Solving LWE by Reduction to Unique-SVP
Albrecht, Martin; Fitzpatrick, Robert; Göpfert, Florian
ICISC 2013
[Conference Proceedings]


Assured Cloud-Based Data Analysis with ClusterBFT
Stephen, Julian James; Eugster, Patrick
Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Proceedings, p.82-102
[Conference Proceedings]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p.804-818
[Conference Proceedings]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
Cryptology ePrint Archive, p.1-12
[Conference Proceedings, Journal Article]


Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; Cristofaro, Emiliano De; Dmitrienko, Alexandra; Asokan, N.; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2013)
[Conference Proceedings]


Atmosphere: A Universal Cross-Cloud Communication Infrastructure
Jayalath, Chamikara; Stephen, Julian James; Eugster, Patrick
Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Beijing, China. December 2013. Proceedings., p.163-182
[Conference Proceedings]


Introduction to Public Key Infrastructures
Buchmann, Johannes; Karatsiolis, Evangelos; Wiesmaier, Alexander
[Book]


Mobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza
[Book]


Digital Identity based VoIP Authentication Mechanism
Plies, Andreas; Massoth, Michael; Stengel, Ingo
The 11th International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, Vienna, Austria, December 2-4, 2013, p.239
[Conference Proceedings]


Effiziente Ausführung des PACE Protokolls
Wiesmaier, A.; Horsch, M.; Hühnlein, D.; Kiefer, F.; Strenzke, F.


Reader as an electronic identification
Wiesmaier, A.; Horsch, M.; Hühnlein, D.; Braun, J.


Decoupling Authentication from the Usage of Services
Horsch, M.; Braun, J.; Wiesmaier, A.
[Report]


Schlanke Infrastrukturen für den digitalen Rechtsverkehr
Braun, J.; Hülsing, A.; Wiesmaier, A.
[Report]


On the design and implementation of the Open eCard App
Hühnlein, D.; Petrautzki, D.; Schmölz, J.; Wich, T.; Horsch, M.; Wieland, T.; Eichholz, J.; Wiesmaier, A.; Braun, J.; Feldmann, F.; Potzernheim, S.; Schwenk, J.; Kahlo, C.; Kühne, A.; Veit, H.
Sicherheit 2012 — Schutz und Zuverlässigkeit, p.95-110
[Conference Proceedings]


iPIN and mTAN for Secure eID Applications
Braun, J.; Horsch, M.; Wiesmaier, A.
Information Security Practice and Experience (ISPEC 2012), p.259-276
[Conference Proceedings]


Practical Security in E-Mail Applications
Kiefer, F.; Wiesmaier, A.; Fritz, C.
The 2012 International Conference on Security and Management (SAM 12), p.138-144
[Conference Proceedings]