Publikationen

Publikationen

Technische Erkennung von Desinformation - Von Kopien über Montagen bis zu Deep-Fake-Videos
Waidner, Michael; Steinebach, Martin; Kreutzer, Michael
[Book Article]


Pitfalls of provably secure systems in internet the case of chronos-NTP
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Secure consensus generation with distributed DoH
Jeitner, P.; Shulman, H.; Waidner, M.
International Conference on Dependable Systems and Networks (DSN) 2020
[Conference Paper]


Privacy und Big Data
Winter, Christian; Steinebach, Martin; Heereman, Wendy; Steiner, Simone; Battis, Verena; Halvani, Oren; Yannikos, York; Schüßler, Christoph
[Study]


Automatisierung beim Auffinden radikaler Inhalte im Internet
Steinebach, Martin; Vogel, Inna; Yannikos, York; Regev, Roey
[Book Article]


Eberbacher Gespräch on "AI, Security & Privacy"
Kreutzer, Michael; Küch, Oliver; Steinebach, Martin
[Report]


Towards Secure Urban Infrastructures: Cyber Security Challenges for Information and Communication Technology in Smart Cities
Reuter, Christian; Haunschild, Jasmin; Hollick, Matthias; Mühlhäuser, Max; Vogt, Joachim; Kreutzer, Michael
Konferenz "Mensch und Computer" (MuC) 2020
[Conference Paper]


TAVeer: An interpretable topic-agnostic authorship verification method
Halvani, Oren; Graner, Lukas; Regev, Roey
International Conference on Availability, Reliability and Security (ARES) 2020
[Conference Paper]


Cortex-M4 Optimizations for \{R,M\}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, Francois
[Paper]


Secure Attestation of Virtualized Environments
Eckel, Michael; Fuchs, Andreas; Repp, Jürgen; Springer, Markus
International Conference on ICT Systems Security and Privacy Protection (SEC) 2020
[Conference Paper]


Herstellung und Detektion von Videos und Bildern mit KI und deren Bezug zu Beweismitteln
Woithe, Jennifer; Becker, Sven; Labudde, Dirk
[Book Article]


Auswahl und Nutzung web­ba­sier­ter Kom­muni­kations­dienste in Zeiten von Corona
Selzer, Annika; Stummer, Sarah; Waldmann, Ulrich
[Report]


TrustEV: Trustworthy Electric Vehicle Charging and Billing
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria
Symposium on Applied Computing (SAC) 2020
[Conference Paper]


Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens
Aichroth, Patrick; Battis, Verena; Dewes, Andreas; Dibak, Christoph; Doroshenko, Vadym; Geiger, Bernd; Graner, Lukas; Holly, Steffen; Huth, Michael; Kämpgen, Benedikt; Kaulartz, Markus; Mundt, Michael; Rapp, Hermann; Steinebach, Martin; Sushko, Yurii; Swarat, Dominic; Winter, Christian; Weiß, Rebekka
[Book]


Detecting and tracking criminals in the real world through an IoT-based system
Tundis, A.; Kaleem, H.; Mühlhäuser, M.
[Journal Article]


Fake News Spreader Detection on Twitter using Character N-Grams
Vogel, Inna; Meghana, Meghana
Conference and Labs of the Evaluation Forum (CLEF) 2020
[Conference Paper]


Cortex-M4 Optimizations for {R, M}LWE Schemes
Alkim, Erdem; Bilgin, Yusuf Alper; Cenk, Murat; Gérard, François
[Journal Article]


Gruppendynamik in Sozialen Netzwerken - Bestimmung und Vorhersage von Gruppendynamiken auf Grundlage von Daten aus Sozialen Netzwerken
Frenzel, Christoph; Labudde, Dirk
[Book Article]


Post-Quantum Secure Boot
Kumar, Vinay B.Y.; Gupta, Naina; Chattopadhyay, Anupam; Kasper, Michael; Krauß, Christoph; Niederhagen, Ruben
Design, Automation and Test in Europe Conference and Exhibition (DATE) 2020
[Conference Paper]


Applying machine intelligence in practice. Selected results of the 2019 Dagstuhl Workshop on Applied Machine Intelligence
Humm, Bernhard; Bense, Hermann; Bock, Jürgen; Classen, Mario; Halvani, Oren; Herta, Christian; Hoppe, Thomas; Juwig, Oliver; Siegel, Melanie
Workshop on Applied Machine Intelligence 2019
[Journal Article]


Cryptology and Network Security. 19th International Conference, CANS 2020. Proceedings
International Conference on Cryptology and Network Security (CANS) 2020
[Conference Proceeding]


Ausprägungen und Erkennung der manipulativen Verwendung von Bildern
Steinebach, Martin
[Book Article]


Datenschutzkonformes Löschen personenbezogener Daten in Kundenbeziehungsmanagementsystemen
Macit, Tugba Koc; Selzer, Annika
[Journal Article]


ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V
Alkim, Erdem; Evkan, Hülya; Lahr, Norman; Niederhagen, Ruben; Petri, Richard
[Journal Article]


Motion Vector based Robust Video Hash
Liu, Huajian; Fach, Sebastian; Steinebach, Martin
Annual Symposium on Electronic Imaging, Science and Technology 2020
[Journal Article]


Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, Oksana; Reinheimer, Benjamin; Aldag, Lukas; Mayer, Peter; Gerber, Nina; Volkamer, Melanie
Financial Cryptography and Data Security, p.84-101
[Conference Proceedings]


Signatures from Sequential-OR Proofs
Fischlin, Marc; Harasser, Patrick; Janson, Christian
Advances in Cryptology - EUROCRYPT 2020, p.212-244
[Conference Proceedings]


IoT Dataset Generation Framework for Evaluating Anomaly Detection Mechanisms
Meyer-Berg, Andreas; Egert, Rolf; Böck, Leon; Mühlhäuser, Max
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]


Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
Advances in Cryptology - ASIACRYPT 2020, p.221-252
[Conference Proceedings]