Publikationen

Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Sauer, Alexander; Alber, Gernot
Cryptography, Vol.4
Sprache: English
[Journal Article]

Handlungsempfehlungen
Jansen, Carolin; Johannes, Christopher; Krämer, Nicole; Kreutzer, Michael; Löber, Lena Isabell; Rinsdorf, Lars; Roßnagel, Alexander; Schaewitz, Leonie
Sprache: German
[Book Article]

Automatisierte Erkennung von Desinformationen
Halvani, Oren; Heereman von Zuydtwyck, Wendy; Herfert, Michael; Kreutzer, Michael; Liu, Huajian; Simo Fhom, Hervais-Clemence; Steinebach, Martin; Vogel, Inna; Wolf, Ruben; Yannikos, York; Zmudzinski, Sascha
Sprache: German
[Book Article]

Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
Sprache: English
[Conference Proceedings]

The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, Vol.133, p.26-44
Sprache: English
[Journal Article]

A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, Vol.31
Sprache: English
[Journal Article]

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
Sprache: English
[Conference Proceedings]