Publikationen

Publikationen

Formal Policy-based Provenance Audit
Butin, Denis; Demirel, Denise; Buchmann, Johannes
The 11th International Workshop on Security - IWSEC 2016
Sprache: German
[Conference Proceedings]

Fragile and authentication watermarks
Steinebach, Martin; Liu, Huajian
Sprache: English
[Book Article]

GarbledCPU: A MIPS Processor for Secure Computation in Hardware
Songhori, Ebrahim; Zeitouni, Shaza; Dessouky, Ghada; Schneider, Thomas; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
53. Annual Design Automation Conference (DAC'16), p.73:1-73:6
Sprache: English
[Conference Proceedings]

Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques
Rasthofer, Siegfried; Arzt, Steven; Miltenberger, Marc; Bodden, Eric
Network and Distributed System Security Symposium 2016, p.1-15
Sprache: German
[Conference Proceedings]

HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
Sprache: English
[Journal Article]

HDA NIST SRE 16 Systems (CRISP \& I4U)
Nautsch, A.; Isadskiy, S.; Rathgeb, C.; Busch, C.
Proc. of the NIST SRE workshop
[Conference Proceedings]

High-Performance and Lightweight Lattice-Based Public-Key Encryption
Buchmann, Johannes; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security
Sprache: German
[Conference Proceedings]

Homomorphic Signature Schemes - A survey
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes
Sprache: 1
[Book]

How to apply Binarized Statistical Image Features to Near-Infrared Iris Recognition effectively
Rathgeb, C.; Struck, F.; Busch, C.
Sixth Intl. Conf. on Image Processing Theory, Tools and Applications (IPTA 2016)
[Conference Proceedings]

How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire: Presentation held at Dev Con 2016, 12th October 2016, Plymouth
Huber, Stephan; Rasthofer, Siegfried
Conference "Dev Con" <2016, Plymouth>
Sprache: English
[Presentation, Electronic Publication]

Idea: Usable platforms for secure programming - mining unix for insight and guidelines
Türpe, Sven
International Symposium on Engineering Secure Software and Systems (ESSoS) <8, 2016, London>
Sprache: English
[Conference Paper]

Identifying and Utilizing Dependencies Across Cloud Security Services
Taha, Ahmed; Metzler, Patrick; Trapero, Ruben; Luna, Jesus; Suri, Neeraj
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.329-340
Sprache: German
[Conference Proceedings]

In Whom Do We Trust - Sharing Security Events
Steinberger, J.; Kuhnert, B.; Sperotto, A.; Baier, H.; Pras, A.
Management and Security in the Age of Hyperconnectivity, p.111-124

Industrie 4.0 - Mit Sicherheit eine digitale Herausforderung - Warum IT-Sicherheit in der digitalen Transformation der Industrie ein enabling Factor sein wird
Henkel, Thorsten
Sprache: German
[Journal Article]

Introducing Proxy Voting to Helios
Kulyk, Oksana; Marky, Karola; Neumann, Stephan; Volkamer, Melanie
11th International Conference on Availability, Reliability and Security - ARES 2016, p.98 - 106
Sprache: German
[Conference Proceedings]

Investigating users' reaction to fine-grained data requests: A market experiment
Eling, N.; Rasthofer, S.; Kolhagen, M.; Bodden, E.; Buxmann, P.
Hawaii International Conference on System Sciences (HICSS) <49, 2016, Kauai/Hawaii>
Sprache: English
[Conference Paper]

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
Sprache: German
[Conference Proceedings]

Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
Sprache: English
[Conference Proceedings]

Jumping through hoops: why do Java developers struggle with cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.935-946
Sprache: German
[Conference Proceedings]

Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Fischlin, Marc; Günther, Felix; Schmidt, Benedikt; Warinschi, Bogdan
37th IEEE Symposium on Security and Privacy (S&P 2016)
Sprache: German
[Conference Proceedings]

Keystroke Biometrics Ongoing Competition
Morales, A.; Fierrez, J.; Tolosana, R.; Ortega-Garcia, J.; Galbally, J.; others
IEEE Access, Vol.4, p.7736-7746
[Journal Article]

Konzept und Entwicklung eines effizienten Multilayer Fuzzing Frameworks für Android
Adam, Christian; Krauß, Christoph
Sprache: German
[Bachelor Thesis]

Laientaugliche Schlüsselgenerierung für die End-zu-End-Verschlüsselung
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich
Sprache: German
[Journal Article]

Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography
Sprache: German
[Conference Proceedings]

Leakage-Resilient Layout Randomization for Mobile Devices
Braden, Kjell; Crane, Stephen; Davi, Lucas; Franz, Michael; Larsen, Per; Liebchen, Christopher; Sadeghi, Ahmad-Reza
23rd Annual Network & Distributed System Security Symposium (NDSS)
Sprache: German
[Conference Proceedings]