Publikationen

Publikationen

On the Vulnerability of Face Recognition Systems Towards Morphed Face Attacks
Scherhag, U.; Raghavendra, R.; Raja, K. B.; Gomez-Barrero, M.; Rathgeb, C.; Busch, C.
5th Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]

On Using TLS to Secure In-Vehicle Networks
Zelle, Daniel; Krauß, Christoph; Strauß, Hubert; Schmidt, Karsten
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]

On using TLS to secure in-vehicle networks
Zelle, D.; Krauß, C.; Strauß, H.; Schmidt, K.
International Conference on Availability, Reliability and Security (ARES) <12, 2017, Reggio Calabria>
Sprache: English
[Conference Paper]

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains
Shulman, Haya; Waidner, Michael
The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI)
Sprache: German
[Conference Proceedings]

One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael
Symposium on Networked Systems Design and Implementation (NSDI) <14, 2017, Boston/Mass.>
Sprache: English
[Conference Paper, Electronic Publication]

One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet
Shulman, Haya; Waidner, Michael
Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, p.131-144
Sprache: English
[Conference Proceedings]

OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
Demmler, Daniel; Holz, Marco; Schneider, Thomas
15. International Conference on Applied Cryptography and Network Security (ACNS'17), p.599-619
Sprache: English
[Conference Proceedings]

Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas
European Conference on Ambient Intelligence (AmI) <13, 2017, Malaga>
Sprache: English
[Conference Paper]

ORAMs in a Quantum World
Gagliardoni, Tommaso; Karvelas, Nikolaos; Katzenbeisser, S.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography
Sprache: German
[Conference Proceedings]

Password Assistance
Horsch, Moritz; Braun, Johannes; Buchmann, Johannes
Open Identity Summit 2017
Sprache: German
[Conference Proceedings]

Phonion: Practical Protection of Metadata in Telephony Networks
Heuser, Stephan; Reaves, Bradley; Pendyala, Praveen Kumar; Carter, Henry; Dmitrienko, Alexandra; Kiyavash, Negar; Enck, William; Sadeghi, Ahmad-Reza; Traynor, Patrick
Proceedings on Privacy Enhancing Technologies (PoPETs)
Sprache: German
[Conference Proceedings]

Photonic side channel attacks against RSA
Carmon, E.; Seifert, J.P.; Wool, A.
International Symposium on Hardware-Oriented Security and Trust (HOST) <10, 2017, McLean/Va.>
Sprache: English
[Conference Paper]

Piraterieschutz und labellose Identifizierung von Bauteilen im Rahmen von Industrie 4.0
Bräuning, Marco; Waidner, Michael (Betreuer); Scheuermann, Dirk (Betreuer)
Sprache: German
[Master Thesis]

Positionspapier: Cyber­sicher­heit in Deutschland
Waidner, Michael; Backes, Michael; Müller-Quade, Jörn; Waidner, Michael
Sprache: German
[Report]

Poster: Secure Storage of Masked Passwords
Mayer, Peter; Volkamer, Melanie
IEEE European Symposium on Security and Privacy Posters
Sprache: German
[Conference Proceedings]

Poster: X-ray your DNS
Klein, Amit; Kravtsov, Vladimir; Perlmuter, Alon; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) <2017, Dallas/Tex.>
Sprache: English
[Conference Paper]

Postquantum Cryptography - State of the Art
Buchmann, Johannes; Lauter, Kristin; Mosca, Michele
IEEE Security & Privacy, p.12-13
Sprache: German
[Journal Article]

Practical post-quantum cryptography. White Paper
Niederhagen, Ruben; Waidner, Michael
Sprache: English
[Report, Electronic Publication]

PRF-ODH: Relations, Instantiations, and Impossibility Results
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian
CRYPTO 2017 - 37th International Cryptology Conference, p.651-681
Sprache: German
[Conference Proceedings]

Privacy-Preserving Comparison of Variable-Length Data with Application to Biometric Template Protection
Gomez-Barrero, M.; Galbally, J.; Morales, A.; Fierrez, J.
IEEE Access, Vol.5, p.8606-8619
[Journal Article]

Privacy-Preserving Interdomain Routing at Internet Scale
Asharov, Gilad; Demmler, Daniel; Schapira, Michael; Schneider, Thomas; Segev, Gil; Shenker, Scott; Zohner, Michael
Proceedings on Privacy Enhancing Technologies (PoPETs), p.143-163
Sprache: English
[Journal Article]

Privacy-Preserving Whole-Genome Variant Queries
Demmler, Daniel; Hamacher, Kay; Schneider, Thomas; Stammler, Sebastian
16. International Conference on Cryptology And Network Security (CANS'17)
Sprache: English
[Conference Proceedings]

Private Set Intersection for Unequal Set Sizes with Mobile Applications
Kiss, Ágnes; Liu, Jian; Schneider, Thomas; Asokan, N.; Pinkas, Benny
Proceedings on Privacy Enhancing Technologies (PoPETs), p.177-197
Sprache: English
[Journal Article]

Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, Peter; Gerber, Nina; McDermott, Ronja; Volkamer, Melanie; Vogt, Joachim
Information and Computer Security, p.137-151
Sprache: English
[Journal Article]

Promoting secure Email communication and authentication
Zimmermann, Verena; Henhapl, Birgit; Gerber, Nina; Enzmann, Matthias
Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, p.269-277
Sprache: English
[Conference Proceedings]