Publikationen

Publikationen

To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Heidt, Margareta; Olt, Christian M.; Buxmann, Peter
Internationale Tagung Wirtschaftsinformatik
[Conference Proceedings]


HEALED: HEaling & Attestation for Low-end Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019
[Conference Proceedings]


Asymmetric DCnets for Effective and Efficient Sender Anonymity
Grube, Tim; Daubert, Jörg; Mühlhäuser, Max
IEEE Global Communications Conference (GLOBECOM)
[Conference Proceedings]


DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Truong, Hien Thi Thu; Toivonen, Juhani; Nguyen, Thien Duc; Soriente, Claudio; Tarkoma, Sasu; Asokan, N.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019)
[Conference Proceedings]


On (The Lack Of) Location Privacy in Crowdsourcing Applications
Boukoros, Spyros; Humbert, Mathias; Katzenbeisser, Stefan; Troncoso, Carmela
USENIX Security Symposium
[Conference Proceedings]


Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]


Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]


I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads
Mayer, Peter; Gerber, Nina; Reinheimer, Benjamin; Rack, Philipp; Braun, Kristoffer; Volkamer, Melanie
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p.1-12
[Conference Proceedings]


Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen
Kulyk, Oksana; Gerber, Nina; Volkamer, Melanie; Hilt, Annika
Datenschutz und Datensicherheit - DuD, p.81-85
[Journal Article]


Investigating People’s Privacy Risk Perception
Gerber, Nina; Reinheimer, Benjamin; Volkamer, Melanie
Proceedings on Privacy Enhancing Technologies, p.267-288
[Journal Article]


On the Si­mu­la­tion of Smart Grid Environments
Egert, Rolf; Tundis, Andrea; Mühlhäuser, Max
SummerSim '19: Proceedings of the 2019 Summer Si­mu­la­tion Conference
[Conference Proceedings]


Preserving Privacy in Speaker and Speech Characterisation
Nautsch, Andreas; Jiménez, Abelino; Treiber, Amos; Kolberg, Jascha; Jasserand, Catherine; Kindt, Els; Delgado, Héctor; Todisco, Massimiliano; Hmani, Mohamed Amine; Mtibaa, Aymen; Abdelraheem, Mohammed Ahmed; Abad, Alberto; Teixeira, Francisco; Matrouf, Driss; Gomez-Barrero, Marta; Petrovska-Delacrétaz, Dijana; Chollet, Gérard; Evans, Nicholas; Schneider, Thomas; Bonastre, Jean-François; Raj, Bhiksha; Trancoso, Isabel; Busch, Christoph
Computer Speech and Language, p.441-480
[Journal Article]


Encouraging Password Manager Reuse
Renaud, Karen; Zimmermann, Verena
Network Security
[Journal Article]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, p.197-216
[Journal Article]


Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Stebila, Douglas
[Report]


LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
FC 2019: 23rd International Conference on Financial Cryptography and Data Security
[Conference Proceedings]


Assessing Users’ Privacy and Security Concerns of Smart Home Technologies
Zimmermann, Verena; Gerber, Paul; Marky, Karola; Böck, Leon; Kirchbuchner, Florian
i-com Journal of Interactive Media, Vol.18, p.197-216
[Journal Article]


Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]


Science peace security ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
Interdisciplinary Conference on Technical Peace and Security Research
[Conference Proceedings]


Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]


Automated Refactoring to Reactive Programming
Köhler, Mirco; Salvaneschi, Guido
ASE2019
[Conference Proceedings]


Post-Quantum Cryptography in Embedded Systems
Krämer, Juliane; Marzougui, Soundes
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
[Conference Proceedings]


Can an online service predict gender?: on the state-of-the-art in gender identification from texts
Krüger, Stefan; Hermann, Ben
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering
[Conference Proceedings]


Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]


Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]


Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
IET Information Security
[Journal Article]


Environment-Assisted Quantum Transport in a 10-qubit Network
Maier, Christine; Brydges, Tiff; Jurcevic, Petar; Trautmann, Nils; Hempel, Cornelius; Lanyon, Ben P.; Hauke, Philipp; Blatt, Rainer; Roos, Christian F.
PHYSICAL REVIEW LETTERS, p.50501
[Journal Article]


Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, p.29367-29379
[Journal Article]


Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]