Publikationen

Publikationen

Messung der Datenminimierung für den Beschäftigtendatenschutz am Beispiel von Standortdaten
Schleper, Janine; Kohn, Matthias; Jo Pesch, Paulina; Waldmann, Ulrich; Kunz, Thomas
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Towards Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


Datenschutzrecht. Ein Kommentar für Studium und Praxis
[Scientific Anthology]


Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
Paul, S.; Kuzovkova, Y.; Lahr, Norman; Niederhagen, R.
Asia Conference on Computer and Communications Security 2022
[Conference Paper]


Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Jeitner, Philipp; Shulman, Haya
USENIX Security Symposium 2021
[Paper]


Anwendungsszenarien und Bedenken beim Einsatz Künstlicher Intelligenz in der öffentlichen Verwaltung
Heeremann, Wendy; Abagnale, Giusi
[Journal Article]


Kapitel VII: Zusam­men­arbeit und Kohärenz (Art. 60-76). Teilkommentierung Art. 68, 69, 70, 71, 72, 73, 74, 75, 76 DSGVO
Schreiber, Linda
[Book Article]


Application layer denial-of-service attacks and defense mechanisms: A survey
Tripathi, N.; Hubballi, N.
[Journal Article]


Recognition of objects from looted excavations by smartphone app and deep learning
Berchtold, Waldemar; Liu, Huajian; Bugert, Simon; Yannikos, York; Wang, Jingcun; Heeger, Julian; Steinebach, Martin; Frühwein, Marco
Conference "Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications" 2022
[Journal Article]


Kapitel 5: Vertretung im Europäischen Datenschutzausschuss, zentrale Anlaufstelle, Zusam­men­arbeit der Aufsichtsbehörden des Bundes und der Länder in Angelegenheiten der Europäischen Union (§§ 17-19). Teilkommentierung §§ 17, 18, 19 BDSG
Schreiber, Linda
[Book Article]


Smart RPKI Validation: Avoiding Errors and Preventing Hijacks
Hlavacek, Tomas; Shulman, Haya; Waidner, Michael
European Symposium on Research in Computer Security 2022
[Conference Paper]


Robust face recognition: How much face is needed?
Bunzel, Niklas
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]


Desinformationen und Messengerdienste: Herausforderung und Lösungsansätze
Krämer, Nicole; Hornung, Gerrit; Jansen, Carolin; Kluck, Jan Philipp; Rinsdorf, Lars; Setz, Tahireh; Steinebach, Martin; Vogel, Inna; Yannikos, York
[Book Article]


Issues of Verifying Anonymity: An Overview
Stummer-Diel, Sarah
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Simplifying multimodal journeys: An authentication and data sharing framework in the mobility service domain
Gadacz, Henry
[Paper]


Towards a Privacy-Aware Electric Vehicle Architecture
Plappert, Christian; Stancke, Jonathan; Jäger, Lukas
International Conference on Parallel, Distributed and Network-Based Processing 2022
[Conference Paper]


Kapitel I: Allgemeine Bestimmungen (Art. 1-4). Teilkommentierung Art. 4, DSGVO
Schreiber, Linda
[Book Article]


Selbstbestimmung, Privatheit und Datenschutz
[Scientific Anthology]


Stalloris: RPKI Downgrade Attack
Hlavacek, Tomas; Jeitner, Philipp; Mirdita, Donika; Shulman, Haya; Waidner, Michael
USENIX Security Symposium 2022
[Paper]


Compliance: Ein Überblick über wichtige Rechtsvorschriften für Startups in der Cybersicherheit
Stummer-Diel, Sarah
[Paper]


Digitalisierung des Energiesystems - 14 Thesen zum Erfolg
Bergsträßer, Jonathan; Gkoktsis, George; Hirsch, Tilo; Klaiber, Stefan; Klobasa, Marian; Kohrs, Robert; Lauer, Hagen; Nicolai, Steffen; Offergeld, Thomas; Rülicke, Linda; Schmidt, Dietrich; Warweg, Oliver; Welisch, Marijke; Wende-von Berg, Sebastian; Werner, Daniel; Wickert, Manuel
[Report]


A survey on Bluetooth Low Energy security and privacy
Cäsar, Matthias; Pawelke, Tobias; Steffan, Jan; Terhorst, Gabriel
[Journal Article]


Learning classical readout quantum PUFs based on single-qubit gates
Pirnay, Niklas; Pappa, Anna; Seifert, Jean-Pierre
[Journal Article]


XDRI Attacks - and - How to Enhance Resilience of Residential Routers
Jeitner, Philipp; Shulman, Haya; Teichmann, Lucas Andreas; Waidner, Michael
USENIX Security Symposium 2022
[Conference Paper]


NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches
Gotkowski, Karol; Liu, Huajian; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]


Transformer-based Extraction of Deep Image Models
Battis, Verena; Penner, Alexander
European Symposium on Security and Privacy 2022
[Conference Paper]


ML-basierte Klassifizierung von E-Mails für die datenschutzkonforme Löschung und Archivierung
Kunz, Thomas; Waldmann, Ulrich
Gesellschaft für Informatik (Jahrestagung) 2022
[Conference Paper]


Using Telegram as a carrier for image steganography: Analysing Telegrams API limits
Bunzel, Niklas; Chen, Tobias; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Conference Paper]


On the Benefits of Joint Optimization of Reconfigurable CDN-ISP Infrastructure
Zerwas, Johannes; Poese, Ingmar; Schmid, Stefan; Blenk, Andreas
[Journal Article]


Smartphone-supported integrity verification of printed documents
Berchtold, Waldemar; El-Soufi, Dani; Steinebach, Martin
International Symposium on Electronic Imaging: Media Watermarking, Security, and Forensics 2022
[Journal Article]