Publikationen

Publikationen

Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Si­mu­la­tions in mmTrace
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters)
[Conference Proceedings]


Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure
Shulman, Haya; Waidner, Michael
In Traffic Monitoring and Analysis (TMA)
[Conference Proceedings]


Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Rauzy, Pablo; Kiss, Ágnes; Krämer, Juliane; Seifert, Jean-Pierre
Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), p.111-129
[Conference Proceedings]


Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, Karola; Gutmann, Andreas; Rack, Philipp; Volkamer, Melanie
1st International Workshop on Innovations in Mobile Privacy and Security, p.46-48
[Conference Proceedings]


An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
[Journal Article]


On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Buchmann, Johannes; Göpfert, Florian; Player, Rachel; Wunderer, Thomas
International Conference on Cryptology AFRICACRYPT 2016
[Conference Proceedings]


Privately and Publicly Verifiable Computing Techniques
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas
[Book]


Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
[Journal Article]


An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation
Akleylek, Sedat; Bindel, Nina; Buchmann, Johannes; Krämer, Juliane; Marson, Giorgia Azzurra
International Conference on Cryptology AFRICACRYPT 2016, p.10
[Conference Proceedings]


Identifying and Utilizing Dependencies Across Cloud Security Services
Taha, Ahmed; Metzler, Patrick; Trapero, Ruben; Luna, Jesus; Suri, Neeraj
ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, p.329-340
[Conference Proceedings]


Performance issues and optimizations in JavaScript: an empirical study
Selakovic, Marija; Pradel, Michael
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.61-72
[Conference Proceedings]


Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, Verena; Neumann, Stephan; Braun, Kristoffer; Volkamer, Melanie
Datenschutz und Datensicherheit, p.295-299
[Conference Proceedings]


Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion
Schmitz, Martin; Leister, Andreas; Dezfuli, Niloofar; Riemann, Jan; Müller, Florian; Mühlhäuser, Max
Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, p.2688-2696
[Conference Proceedings]


Debugging for reactive programming
Salvaneschi, Guido; Mezini, Mira
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.796-807
[Conference Proceedings]


Jumping through hoops: why do Java developers struggle with cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.935-946
[Conference Proceedings]


"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
Nadi, Sarah; Krüger, Stefan; Mezini, Mira; Bodden, Eric
International Conference on Software Engineering
[Conference Proceedings]


Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names
Liu, Hui; Liu, Qiurong; Staicu, Cristian-Alexandru; Pradel, Michael; Luo, Yue
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.1063-1073
[Conference Proceedings]


Valiant's Universal Circuit is Practical
Kiss, Ágnes; Schneider, Thomas
35. Advances in Cryptology -- EUROCRYPT 2016, p.699-728
[Conference Proceedings]


BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets
Karuppayah, Shankar; Vasilomanolakis, Emmanouil; Haas, Steffen; Fischer, Mathias; Mühlhäuser, Max
2016 IEEE International Conference on Communications
[Conference Proceedings]


HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
[Journal Article]


Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3
Fischlin, Marc; Günther, Felix; Schmidt, Benedikt; Warinschi, Bogdan
37th IEEE Symposium on Security and Privacy (S&P 2016)
[Conference Proceedings]


"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern
Budurushi, Jurlind; Hilt, Annika; Volkamer, Melanie
Datenschutz und Datensicherheit - DuD, p.300-304
[Journal Article]


High-Performance and Lightweight Lattice-Based Public-Key Encryption
Buchmann, Johannes; Göpfert, Florian; Güneysu, Tim; Oder, Tobias; Pöppelmann, Thomas
IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security
[Conference Proceedings]


Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge
Buchmann, Johannes; Büscher, Niklas; Katzenbeisser, Stefan; Krämer, Juliane; Micciancio, Daniele; Siim, Sander; Vredendaal, Christine van; Walter, Michael; Göpfert, Florian
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography
[Conference Proceedings]


StubDroid: automatic inference of precise data-flow summaries for the android framework
Arzt, Steven; Bodden, Eric
ICSE '16 Proceedings of the 38th International Conference on Software Engineering, p.725-735
[Conference Proceedings]


TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, Melanie; Renaud, Karen; Reinheimer, Benjamin
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.161-175
[Conference Proceedings]


Homomorphic Signature Schemes - A survey
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes
[Book]


Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Larsen, Per; Sadeghi, Ahmad-Reza; Jin, Yier
53rd Design Automation Conference (DAC)
[Conference Proceedings]


Teaching Phishing-Security: Which Way is Best?
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie; Mayer, Peter; Kunz, Alexandra; Rack, Philipp; Lehmann, Daniel
31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), p.135-149
[Conference Proceedings]


GarbledCPU: A MIPS Processor for Secure Computation in Hardware
Songhori, Ebrahim; Zeitouni, Shaza; Dessouky, Ghada; Schneider, Thomas; Sadeghi, Ahmad-Reza; Koushanfar, Farinaz
53. Annual Design Automation Conference (DAC'16), p.73:1-73:6
[Conference Proceedings]