Publikationen

Publikationen

Optimal transport layer for secure computation
Brandt, M.; Orlandi, C.; Shrishak, K.; Shulman, H.
International Conference on Security and Cryptography (SECRYPT) 17, 2020, Online>
Sprache: English
[Conference Paper]


Cryptanalysis of FNV-Based cookies
Klein, A.; Shulman, H.; Waidner, M.
Global Communications Conference (GLOBECOM) 2020, Online>
Sprache: English
[Conference Paper]


The structural basis of the genetic code: amino acid recognition by aminoacyl-tRNA synthetases
Kaiser, F.; Krautwurst, S.; Salentin, S.; Haupt, V.J.; Leberecht, C.; Bittrich, S.; Labudde, D.; Schroeder, M.
Sprache: English
[Journal Article, Electronic Publication]


Development and empirical optimization of an electrochemical analysis cell for the visualization of latent fingerprints and their chemical adhesives
Bergmann, Tommy; Gottschall, Sebastian; Fuchs, Enrico; Berlipp, Oliver; Labudde, Dirk
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 19, 2020, Online>
Sprache: English
[Conference Paper, Electronic Publication]


Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4
Alkim, Erdem; Cheng, Dean Yun-Li; Chung, Chi-Ming Marvin; Evkan, Hülya; Huang, Leo Wei-Lun; Hwang, Vincent; Li, Ching-Lin Trista; Niederhagen, Ruben; Shih, Cheng-Jhih; Wälde, Julian; Yang, Bo-Yin
Sprache: English
[Journal Article, Electronic Publication]


A novel approach for generating synthetic datasets for digital forensics
Göbel, T.; Schäfer, T.; Hachenberger, J.; Türr, J.; Baier, H.
International Conference on Digital Forensics 2020, New Delhi>
Sprache: English
[Conference Paper]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, E.; Barreto, P.S.L.M.; Bindel, N.; Krämer, J.; Longa, P.; Ricardini, J.E.
International Conference on Applied Cryptography and Network Security (ACNS) 18, 2020, Online>
Sprache: English
[Conference Paper]


Side Channel Information Set Decoding Using Iterative Chunking: Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation
Lahr, Norman; Niederhagen, Ruben; Petri, Richard; Samardjiska, Simona
International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) 26, 2020, Online>
Sprache: English
[Conference Paper]


Performance penalties of resilient SDN infrastructures
Senf, Daniel; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 16, 2020, Online>
Sprache: English
[Conference Paper]


Cryptology and Network Security. 19th International Conference, CANS 2020. Proceedings: Vienna, Austria, December 14-16, 2020
Krenn, Stephan; Shulman, Haya; Vaudenay, Serge ; International Association for Cryptologic Research -IACR-
International Conference on Cryptology and Network Security (CANS) 19, 2020, Online>
Sprache: English
[Conference Proceedings]


Blocking Email Bombs with EmailGlass
Schneider, Markus; Shulman, Haya; Waidner, Michael
Global Communications Conference (GLOBECOM) 2020, Online>
Sprache: English
[Conference Paper]


Black-box caches fingerprinting
Klein, Amit; Heftrig, Elias; Shulman, Haya; Waidner, Michael
International Conference on emerging Networking EXperiments and Technologies (CoNEXT) 16, 2020, Online>
Sprache: English
[Conference Paper]


ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS
Mohan, Prashanth; Wang, Wen; Jungk, Bernhard; Niederhagen, Ruben; Szefer, Jakub; Mai, Ken
International Conference on Computer Design (ICCD) 38, 2020, Online>
Sprache: English
[Conference Paper]


IT/OT-Security bei Internet of Railway Things (IoRT)
Arul, Tolga; Cosic, Jasmin; Drodt, Matthias; Friedrich, Marcus; Heinrich, Markus; Kant, Michael; Katzenbeisser, Stefan; Klarer, Helmut; Rauscher, Patrick; Schubert, Max; Still, Gerhard; Wallenhorst, Detlef; Zhdanova, Maria
Sprache: German
[Report, Electronic Publication]


Ensuring the Integrity and Security of Network Equipment is Critical in the Fight Against Cyber Attacks
Eckel, Michael; Laffey, Tom
Sprache: English
[Journal Article]


Security Analysis of Automotive Protocols
Lauser, Timm; Zelle, Daniel; Krauß, Christoph
Computer Science in Cars Symposium (CSCS) 4, 2020, Online>
Sprache: English
[Conference Paper]


Raising Security Awareness on Mobile Systems through Gamification
Heid, Kris; Heider, Jens; Qasempour, Kasra
European Interdisciplinary Cyber­security Conference (EICC) 2020, Online>
Sprache: English
[Conference Paper]


Privacy und Big Data: Studie des Verbundprojekts "Cybersicherheit für die digitale Verwaltung"
Winter, Christian; Steinebach, Martin; Heereman, Wendy; Steiner, Simone; Battis, Verena; Halvani, Oren; Yannikos, York; Schüßler, Christoph
Sprache: German
[Study, Electronic Publication]


IT-Sicherheit in Industrie 4.0. Mit Bedrohungen und Risiken umgehen
Selzer, Annika; Schöning, Harald; Laabs, Martin; Dukanovic, Sinisa; Henkel, Thorsten; Steven, Marion
Sprache: German
[Book]


Auswahl und Nutzung web­ba­sier­ter Kom­muni­kations­dienste in Zeiten von Corona: Datenschutz und Datensicherheitsaspekte
Selzer, Annika; Stummer, Sarah; Waldmann, Ulrich
Sprache: German
[Report, Electronic Publication]


Herstellung und Detektion von Videos und Bildern mit KI und deren Bezug zu Beweismitteln
Woithe, Jennifer; Becker, Sven; Labudde, Dirk
Sprache: German
[Book Article]


Gruppendynamik in Sozialen Netzwerken - Bestimmung und Vorhersage von Gruppendynamiken auf Grundlage von Daten aus Sozialen Netzwerken
Frenzel, Christoph; Labudde, Dirk
Sprache: German
[Book Article]


Detecting Fake News Spreaders on Twitter from a Multilingual Perspective
Vogel, Inna; Meghana, Meghana
International Conference on Data Science and Advanced Analytics (DSAA) 7, 2020, Online>
Sprache: English
[Conference Paper]


Data Mining zur Erfassung extremistischer Aktivitäten in Online-Netzwerken: Technische und juristische Rahmen­bedingungen bei der Erfassung und Aufbereitung von Social Media-Daten für wissen­schaft­liche Zwecke
Hamachers, Annika; Gundlach, Julia; Heereman, Wendy; Selzer, Annika; Yannikos, York
Sprache: German
[Book Article]


Automatisierung beim Auffinden radikaler Inhalte im Internet
Steinebach, Martin; Vogel, Inna; Yannikos, York; Regev, Roey
Sprache: German
[Book Article]


A Step Towards Interpretable Authorship Verification: Published on arXiv
Halvani, Oren; Graner, Lukas; Regev, Roey
International Conference on Availability, Reliability and Security (ARES) 15, 2020, Online>
Sprache: English
[Conference Paper, Electronic Publication, Preprint, Presentation]


An Improved Topic Masking Technique for Authorship Analysis: Published on arXiv
Halvani, Oren; Graner, Lukas; Regev, Roey; Marquardt, Philipp
International Conference on Availability, Reliability and Security (ARES) 16, 2021, Online>
Sprache: English
[Report, Electronic Publication, Preprint, Presentation]


HIP-20: Integration of Vehicle-HSM-Generated Credentials into Plug-and-Charge Infrastructure
Fuchs, Andreas; Kern, Dustin; Krauß, Christoph; Zhdanova, Maria; Heddergott, Ronald
Computer Science in Cars Symposium (CSCS) 4, 2020, Online>
Sprache: English
[Conference Paper, Electronic Publication]


Cross-Domain Authorship Verification Based on Topic Agnostic Features
Halvani, Oren; Graner, Lukas; Regev, Roey
Conference and Labs of the Evaluation Forum (CLEF) 2020, Online>
Sprache: English
[Conference Paper, Electronic Publication]


Ausprägungen und Erkennung der manipulativen Verwendung von Bildern
Steinebach, Martin
Sprache: German
[Book Article]