eContracting: Case Study - Face Recognition in the Biometric Passport
Busch, C.
eDemocracy and eGovernment

Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Stebila, Douglas

LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
FC 2019: 23rd International Conference on Financial Cryptography and Data Security
[Conference Proceedings]

Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
[Journal Article]

Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]

SCIENCE PEACE SECURITY ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
[Conference Proceedings]

Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]

Automated Refactoring to Reactive Programming
Köhler, Mirco; Salvaneschi, Guido
[Conference Proceedings]

Post-Quantum Cryptography in Embedded Systems
Krämer, Juliane; Marzougui, Soundes
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
[Conference Proceedings]

Can an online service predict gender?: on the state-of-the-art in gender identification from texts
Krüger, Stefan; Hermann, Ben
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering
[Conference Proceedings]

Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]

Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]

Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
IET Information Security
[Journal Article]

Environment-Assisted Quantum Transport in a 10-qubit Network
Maier, Christine; Brydges, Tiff; Jurcevic, Petar; Trautmann, Nils; Hempel, Cornelius; Lanyon, Ben P.; Hauke, Philipp; Blatt, Rainer; Roos, Christian F.
[Journal Article]

Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, p.29367-29379
[Journal Article]

Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
[Journal Article]

Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
[Journal Article]

Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
[Journal Article]

Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
[Journal Article, Report]

Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation
Günther, Daniel; Kiss, Ágnes; Scheidel, Lukas; Schneider, Thomas
ACM CCS 2019
[Conference Proceedings]

Simple Refreshing in the Noisy Leakage Model
Dziembowski, Stefan; Faust, Sebastian; Zebrowski, Karol
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]

Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, Vol.18, p.259
[Journal Article]

Secure and Private Function Evaluation with Intel SGX
Felsen, Susanne; Kiss, Ágnes; Schneider, Thomas; Weinert, Christian
CCSW 2019 - The ACM Cloud Computing Security Workshop
[Conference Proceedings]

A Formal Treatment of Deterministic Wallets
Das, Poulami; Faust, Sebastian; Loss, Julian
ACM CCS 2019 - Symposium on Computer and Communications Security
[Conference Proceedings]

DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC - 35th Annual Computer Security Applications Conference
[Conference Proceedings]

Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
[Conference Proceedings]

Sponges Resist Leakage: The Case of Authenticated Encryption
Degabriele, Jean Paul; Janson, Christian; Struck, Patrick
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
[Conference Proceedings]

Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]