Publikationen

Publikationen

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies
Tkachenko, Oleksandr; Weinert, Christian; Schneider, Thomas; Hamacher, Kay
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), p.221-235
Sprache: English
[Conference Proceedings]

Lattice Based Modularization of Static Analyses
Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
Sprache: English
[Conference Proceedings]

Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards
Heidt, Margareta
European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress]
Sprache: English
[Journal Article]

Little Brother is Watching - We know all your Secrets!
Rasthofer, Siegfried; Huber, Stephan; Arzt, Steven
Conference "Virusbulletin" (VB) <2018, Montreal>
Sprache: English
[Conference Paper, Electronic Publication]

M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
CoRR
Sprache: English
[Report, Journal Article]

Method, computer program and system for providing a control signal for a software development environment
Eichler, Jörn; Holzinger, Philipp; Laabs, Martin; Poller, Andreas; Türpe, Sven; Weber, Heiko; Zenkoff, Albert
Sprache: English
[Patent, Electronic Publication]

Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail
Reuter, Christian; Leopold, Inken
Media in Action: An Interdisciplinary Journal on Cooperative Media, p.in press
Sprache: English
[Journal Article]

Monitoring product sales in darknet shops
Yannikos, York; Schäfer, Annika; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>
Sprache: English
[Conference Paper]

MorGAN: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Generative Adversarial Network
Damer, Naser; Moseguí Saladié, Alexandra; Braun, Andreas; Kuijper, Arjan
International Conference on Biometrics - Theory, Applications and Systems (BTAS) <9, 2018, Redondo Beach/Calif.>
Sprache: English
[Conference Paper]

Morph detection from single face images: a multi-algorithm fusion approach
Scherhag, U.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications 2018 (ICBEA), p.1-7
[Conference Proceedings]

Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]

Multi-biometric template protection based on bloom filters
Gomez-Barrero, M.; Rathgeb, C.; Li, G.; Raghavendra, R.; Galbally, J.; Busch, C.
Information Fusion, Vol.42, p.37-50
[Journal Article]

Multi-sample Compression of Iris Images using High Efficiency Video Coding
Rathgeb, C.; Schlett, T.; Buchmann, N.; Baier, H.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-6
[Conference Proceedings]

Multi-spectral Iris Segmentation in Visible Wavelengths
Schlett, T.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometrics (ICB 18), p.1-5
[Conference Proceedings]

New authentication concept using certificates for big data analytic tools
Velthuis, Paul; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) <13, 2018, Hamburg>
Sprache: English
[Conference Paper]

Nudging folks towards stronger password choices: Providing certainty is the key.
Renaud, Karen; Zimmermann, Verena
Behavioural Public Policy (BPP), p.1-31
Sprache: English
[Journal Article]

Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie; Hilt, Tobias
Datenschutz und Datensicherheit (DuD), p.680-685
Sprache: German
[Journal Article]

Off-path attacks against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) <2018, Toronto>
Sprache: English
[Conference Paper]

Off-path Attacks Against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (CCS 2018)
Sprache: English
[Conference Proceedings]

OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
Sprache: English
[Journal Article]

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Journal of Logical and Algebraic Methods in Programming, p.45-67
Sprache: English
[Journal Article]

On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), p.45-67
Sprache: English
[Journal Article]

One Billion Apples' Secret Sauce : Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, p.529-543
Sprache: English
[Conference Proceedings]

One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
Sprache: English
[Conference Proceedings]

Open Source Value Chains for Addressing Security Issues Efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion, p.599-606
[Conference Proceedings]