Publikationen

Publikationen

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18), p.1-6
Sprache: English
[Conference Proceedings]

Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
ACM SIGSAG Conference on Computer and Communications Security (ACM CCS)
Sprache: English
[Conference Proceedings]

Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference on Computer and Communications Security (CCS) <2018, Toronto>
Sprache: English
[Conference Paper]

RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
Reuter, Christian; Ludwig, Thomas; Mischur, Patrick
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW)
Sprache: English
[Journal Article]

Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel; Bayer, Markus; Hartung, Daniel; Kaygusuz, Cemal
Mensch und Computer 2018: Workshopband
Sprache: German
[Conference Proceedings]

Resilienz durch Kooperationstechnologien
Reuter, Christian; Ludwig, Thomas; Pipek, Volkmar
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.443-465
Sprache: German

Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung
Riebe, Thea; Nordmann, Alfred; Reuter, Christian
Wissenschaft & Frieden, p.60-61
Sprache: German
[Journal Article]

Rethinking the evaluation methodology of authorship verification methods
Halvani, Oren; Graner, Lukas
International Conference of the Cross-Language Evaluation Forum for European Languages (CLEF) <9, 2018, Avignon>
Sprache: English
[Conference Paper]

Revisiting Context-Based Pairing in IoT
Miettinen, Markus; Nguyen, Thien Duc; Asokan, N.; Sadeghi, Ahmad-Reza
Proceedings of the 55th Design Automation Conference (DAC), p.32:1-32:6
Sprache: English
[Conference Proceedings]

Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
Wunderer, Thomas; Wang, Yuntao
ISPEC 2018
Sprache: English
[Conference Proceedings]

Roadmap to Privacy: Presentation held at Amsterdam Privacy Conference, APC 2018
Winter, Christian; Schäfer, Marcel
Amsterdam Privacy Conference (APC) <2018, Amsterdam>
Sprache: English
[Presentation, Electronic Publication]

SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks
Kohnhäuser, Florian; Büscher, Niklas; Katzenbeisser, Stefan
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, p.329-342
Sprache: English
[Conference Proceedings]

Scalable Private Set Intersection Based on OT Extension
Pinkas, Benny; Schneider, Thomas; Zohner, Michael
ACM Transactions on Privacy and Security (TOPS), p.7:1-7:35
Sprache: English
[Journal Article]

SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices
Ambrosin, Moreno; Conti, Mauro; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Schunter, Matthias
23rd European Symposium on Research in Computer Security (ESORICS 2018)
Sprache: English
[Conference Proceedings]

Score Fusion Strategies in Single-Iris Dual-Probe Recognition Systems
Drozdowski, P.; Wiegand, N.; Rathgeb, C.; Busch, C.
Intl. Conf. on Biometric Engineering and Applications (ICBEA), p.13-17
[Conference Proceedings]

Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
Sprache: German
[Conference Proceedings]

Security Analysis for the Middleware Assurance Substrate
Lippert, T.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of FloodLight, ZeroSDN, Beacon and POX SDN Controllers
Ilyas, Q.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of SDN Applications for Big Data
Ahmad, P.; Jacob, S.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of SDN Cloud Applications
Chikhale, A.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of SDN Routing Applications
Sagare, A.A.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of SDN WAN Applications - B4 and IWAN
Jain, R.; Khondoker, R.
Sprache: English
[Book Article]

Security Analysis of SDN WiFi Applications
Artmann, D.; Khondoker, R.
Sprache: English
[Book Article]

Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
Sprache: English
[Conference Proceedings]

Sex-Prediction from Periocular Images across Multiple Sensors and Spectra
Tapia, J.; Rathgeb, C.; Busch, C.
Intl. Workshop on Ubiquitous implicit BIOmetrics and health signals monitoring for person-centric applications (UBIO), p.1-7
[Conference Proceedings]