Publikationen

Publikationen

Time to Rethink: Trust Brokerage using Trusted Execution Environments
Koeberl, Patrick; Phegade, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
8. International Conference on Trust and Trustworthy Computing (TRUST'15), p.181-190
Sprache: English
[Conference Proceedings]

Time to rethink: Trust brokerage using trusted execution environments
Koeberl, Patrick; Phegada, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
International Conference on Trust and Trustworthy Computing (TRUST) <8, 2015, Heraklion>
Sprache: English
[Conference Paper]

Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
PHYSICAL REVIEW LETTERS
Sprache: German
[Journal Article]

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Songhori, Ebrahim; Hussain, Siam; Sadeghi, Ahmad-Reza; Schneider, Thomas; Koushanfar, Farinaz
36. IEEE Symposium on Security and Privacy (IEEE S&P'15), p.411-428
Sprache: English
[Conference Proceedings]

Tor Experimentation Tools
Shirazi, Fatemeh; Goehring, Matthias; Diaz, Claudia
International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy
Sprache: 1
[Conference Proceedings]

Toward a Just-in-Time Static Analysis
Do, Lisa Nguyen Quang; Ali, Karim; Bodden, Eric; Livshits, Benjamin
Sprache: German
[Journal Article]

Toward a just-in-time static analysis: TUD-CS-2015-1167
Nguyen Quang Do, Lisa; Ali, Karim; Bodden, Eric; Livshits, Benjamin
Sprache: English
[Report, Electronic Publication]

Towards a New Paradigm for Privacy and Security in Cloud Services
Loruenser, Thomas; Rodriguez, Charles Bastos; Demirel, Denise; Fischer-Hübner, Simone; Gross, Thomas R.; Langer, Thomas; des Noes, Mathieu; Poehls, Henrich; Rozenberg, Boris; Slamanig, Daniel
CoRR abs/1506.05980 (2015)
Sprache: 1
[Journal Article]

Towards Bloom Filter-based Indexing of Iris Biometric Data
Rathgeb, C.; Breitinger, F.; Baier, H.; Busch, C.
2015 Intl. Conf. on Biometrics (ICB), p.1-8
[Conference Proceedings]

Towards secure integration of cryptographic software
Arzt, Steven; Nadi, S.; Ali, Karim; Bodden, Eric; Erdweg, S.; Mezini, Mira
International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!) <2015, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]

Towards Secure Integration of Cryptographic Software
Arzt, Steven; Nadi, Sarah; Ali, Karim; Bodden, Eric; Erdweg, Sebastian; Mezini, Mira
OOPSLA Onward!
Sprache: English
[Conference Proceedings]

Towards security of internet naming infrastructure
Shulman, Haya; Waidner, Michael
European Symposium on Research in Computer Security (ESORICS) <20, 2015, Vienna>
Sprache: English
[Conference Paper]

Towards Security of Internet's Naming Infrastructure
Shulman, Haya; Waidner, Michael
Computer Security ESORICS
Sprache: German
[Conference Proceedings]

Transforming Out Timing Leaks, More or Less
Mantel, Heiko; Starostin, Artem
Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, p.20
Sprache: German
[Conference Proceedings]

TypeDevil: dynamic type inconsistency analysis for JavaScript
Pradel, Michael; Schuh, Parker; Sen, Koushik
Proceedings of the 37th International Conference on Software Engineering, p.314-324
Sprache: German
[Conference Proceedings]

TyTAN: Tiny Trust Anchor for Tiny Devices
Brasser, Ferdinand; Koeberl, Patrick; Mahjoub, Brahim El; Sadeghi, Ahmad-Reza; Wachsmann, Christian
52nd Design Automation Conference (DAC) 2015
Sprache: German
[Conference Proceedings]

Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, p.647-655
Sprache: German
[Conference Proceedings]

Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, p.109-114
Sprache: German
[Conference Proceedings]

Universal threshold calculation for fingerprinting decoders using mixture models
Schäfer, Marcel; Mair, Sebastian; Berchtold, Waldemar; Steinebach, Martin
Workshop on Information Hiding and Multimedia Security (IH&MMSec) <3, 2015, Portland/Or.>
Sprache: English
[Conference Paper]

Universality in random quantum networks
Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physical Review A
Sprache: English
[Journal Article]

Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
Sprache: German
[Journal Article]

Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
Sprache: English
[Journal Article]

Using extensible metadata definitions to create a vendor-independent SIEM system
Detken, Kai-Oliver; Scheuermann, Dirk; Hellmann, Bastian
International Conference on Swarm Intelligence (ICSI) <6, 2015, Beijing>
Sprache: English
[Conference Paper]

Using targeted symbolic execution for reducing false-positives in dataflow analysis
Arzt, S.; Rasthofer, S.; Hahn, R.; Bodden, E.
International Workshop on State Of the Art in Program Analysis (SOAP) <4, 2015, Portland/Or.>
Sprache: English
[Conference Paper]

Vertraulichkeitsschutz durch Verschlüsselung. Strategien und Lösungen für Unternehmen
Kraft, Reiner; Weber, Frank; Marx, Ronald; Stöwer, Mechthild; Große-Onnebrink, Hubert; Larbig, Pedro; Oberle, Alexander; Waidner, Michael
Sprache: German
[Report, Electronic Publication]