Publikationen

Publikationen

Coercion-resistant Proxy Voting
Kulyk, Oksana; Neumann, Stephan; Marky, Karola; Budurushi, Jurlind; Volkamer, Melanie
31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, p.3-16
Sprache: English
[Conference Proceedings]

Collaborative DDoS defense using flow-based security event information
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, p.516-522
[Conference Proceedings]

Combining low-level features of offline questionnaires for handwriting identification
Siegmund, Dirk; Ebert, Tina; Damer, Naser
International Conference on Image Analysis and Recognition (ICIAR) <13, 2016, Póvoa de Varzim>
Sprache: English
[Conference Paper]

Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Diedrich, Lennart; Jattke, Patrick; Murati, Lulzim; Senker, Matthias; Wiesmaier, Alexander
Sprache: German
[Report]

Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8
Jattke, Patrick; Senker, Matthias; Wiesmaier, Alexander
Sprache: German
[Report]

Compiling Low Depth Circuits for Practical Secure Computation
Buescher, Niklas; Holzer, Andreas; Weber, Alina; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016)
Sprache: German
[Conference Proceedings]

Computational Security of Quantum Encryption
Alagic, Gorjan; Broadbent, Anne; Fefferman, Bill; Gagliardoni, Tommaso; Schaffner, Christian; Jules, Michael St.
Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, p.47-71
Sprache: English

Consumer oriented privacy preserving access control for electronic health records in the cloud
Fernando, Ruchith; Ranchal, Rohit; An, Byungchan; Ben Othmane, Lotfi; Bhargava, Bharat
International Conference on Cloud Computing (CLOUD) <9, 2016, San Francisco/Calif.>
Sprache: English
[Conference Paper]

Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
Sprache: German
[Journal Article]

Correlation-resistant fuzzy vault for fingerprints
Merkle, J.; Butt, M.; Korte, U.; Busch, C.
Sicherheit 2016: Sicherheit, Schutz und Zuverlässigkeit, p.125-136
[Conference Proceedings]

Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Buchmann, Johannes; Büscher, Niklas; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; van Vredendaal, Christine; Walter, Michael; Göpfert, Florian
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography
Sprache: German
[Conference Proceedings]

DARPA: Device Attestation Resilient to Physical Attacks
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene; Zeitouni, Shaza
ACM WiSEC 2016
Sprache: German
[Conference Proceedings]

Datenschutz und Datenanalyse: He­raus­for­de­rung­en und Lösungsansätze
Steinebach, Martin; Krempel, Erik; Jung, Christian; Hoffmann, Mario
Sprache: German
[Journal Article]

DDoS 3.0 - How Terrorists Bring Down the Internet
Pras, A.; Santanna, J.; Steinberger, J.; Sperotto, A.
Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, p.1-4

Debugging for reactive programming
Salvaneschi, Guido; Mezini, Mira
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.796-807
Sprache: German
[Conference Proceedings]

Decision Robustness of Voice Activity Segmentation in Unconstrained Mobile Speaker Recognition Environments
Nautsch, A.; Bamberger, R.; Busch, C.
Proc. of 2016 Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-7
[Conference Proceedings]

Delegierbare Zugriffssteuerung
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Sprache: German
[Patent, Electronic Publication]

DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
Schulz, Matthias; Loch, Adrian; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.201-203
Sprache: English
[Conference Proceedings]

DEMO: Using NexMon, the C-based WiFi firmware modification framework
Schulz, Matthias; Wegemer, Daniel; Hollick, Matthias
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), p.213-215
Sprache: English
[Conference Proceedings]

Dependency-based attacks on node.js
Pfretzschner, B.; Othmane, L. ben
Cybersecurity Development Conference (SecDev) <2016, Boston/Mass.>
Sprache: English
[Conference Paper]

Design Decisions for an Iris Recognition SDK
Rathgeb, C.; Uhl, A.; Wild, P.; Hofbauer, H.
Handbook of Iris Recognition, p.359-396

Detecting Android obfuscation techniques
Hachenberger, Julien; Krauß, Christoph; Baier, Harald; Rasthofer, Siegfried
Sprache: English
[Master Thesis]

Die Kontrolle des Umsetzungsgrades des Zugangs- und Zugriffsschutzes: Teilautomatisierte Datenschutzkontrollen im Cloud-Umfeld zur Stärkung des Vertrauens in Cloud-Dienste
Jäger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
Sprache: German
[Journal Article]

Die teilautomatisierte Verifizierung der getrennten Verarbeitung in der Cloud
Jäger, Bernd; Kraft, Reiner; Selzer, Annika; Waldmann, Ulrich
Sprache: German
[Journal Article]

Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
Sprache: German
[Conference Proceedings]