Publikationen

Publikationen

The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments
Almon, Lars; Álvarez, Flor; Kamp, Laurenz; Hollick, Matthias
2019 IEEE 44nd Conference on Local Computer Networks (LCN)
Sprache: English
[Conference Proceedings]

The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S.L.M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
Sprache: English
[Electronic Publication]

The need for steganalysis in image distribution channels
Steinebach, Martin; Liu, Huajian; Ester, Andre
Sprache: English
[Journal Article]

The Practice Turn in IT Security - An Interdisciplinary Approach
Kocksch, Laura; Poller, Andreas
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Sprache: English
[Conference Paper]

The SPHINCS+ Signature Framework
Niederhagen, Ruben; Bernstein, Daniel J.; Hülsing, Andreas; Kölbl, Stefan; Rijneveld, Joost; Schwabe, Peter
Conference on Computer and Communications Security (CCS) <26, 2019, London>
Sprache: English
[Conference Paper]

The Status of Quantum-Based Long-Term Secure Communication over the Internet
Geihs, Matthias; Nikiforov, Oleg; Demirel, Denise; Sauer, Alexander; Butin, Denis; Günther, Felix; Alber, Gernot; Walther, Thomas; Buchmann, Johannes
IEEE Transactions on Sustainable Computing
Sprache: English
[Journal Article]

Thermal and Cross-spectral Palm Image Matching in the Visual Domain by Robust Image Transformation
Bartuzi, Ewelina; Damer, Naser
International Conference on Biometrics (ICB) <12, 2019, Crete>
Sprache: English
[Conference Paper]

Threat Intelligence Application for Cyber Attribution
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Sprache: English
[Conference Proceedings]

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
Sprache: English
[Conference Proceedings]

To Detect or not to Detect: The Right Faces to Morph
Damer, Naser; Saladie, Alexandra Moseguí; Zienert, Steffen; Wainakh, Yaza; Kirchbuchner, Florian; Kuijper, Arjan; Terhörst, Philipp
International Conference on Biometrics (ICB) <12, 2019, Crete>
Sprache: English
[Conference Paper]

Too Confident to Care: Investigating Overconfidence in Privacy Decision Making
Wagner, Amina; Mesbah, Neda
European Conference on Information Systems - ECIS 2019
Sprache: English
[Conference Proceedings]

Towards Systematic Design of Collective Remote Attestation Protocols
De Oliveira Nunes, Ivan; Dessouky, Ghada; Ibrahim, Ahmad; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
The 39th International Conference on Distributed Computing Systems (ICDCS) 2019
Sprache: English
[Conference Proceedings]

Tracking Criminal Events through IoT Devices and an Edge Computing Approach
Tundis, Andrea; Kaleem, Humayun; Mühlhäuser, Max
International Conference on Computer Communication and Networks (ICCCN) <28, 2019, Valencia>
Sprache: English
[Conference Paper]

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
Sprache: English
[Conference Proceedings]

TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
Sprache: English
[Conference Proceedings]

Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing
Drozdowski, P.; Rathgeb, C.; Busch, C.
Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), p.1-5
[Conference Proceedings]

Unary and Binary Classification Approaches and their Implications for Authorship Verification
Halvani, Oren; Winter, Christian; Graner, Lukas
Sprache: English
[Report, Electronic Publication]

Unsupervised Discovery of Geometrically Common Structural Motifs and Long-Range Contacts in Protein 3D Structures
Kaiser, F.; Labudde, D.
Sprache: English
[Journal Article]

Unsupervised Privacy-enhancement of Face Representations Using Similarity-sensitive Noise Transformations
Terhörst, Philipp; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
Sprache: English
[Journal Article]

Verification in Cyberspace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
Sprache: English

Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Sprache: German
[Journal Article]

Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Sprache: German
[Conference Paper, Electronic Publication]

Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Zimmermann, Verena; Dickhaut, Ernestine; Gerber, Paul; Vogt, Joachim
4th European Workshop on Usable Security (EuroUSEC 2019)
Sprache: English
[Conference Proceedings]

Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
Sprache: English
[Conference Proceedings]

Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
Sprache: English
[Conference Proceedings]