Publikationen

Publikationen

ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation
Hessel, Frank; Almon, Lars; Álvarez, Flor
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.306-316
Sprache: English
[Conference Proceedings]


Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators
Stojanovic, Vladimir M.
Physical Review Letters, p.190504
Sprache: English
[Journal Article]


MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
Heinze, Dennis; Classen, Jiska; Rohrbach, Felix
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Sprache: English
[Conference Proceedings]


On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
The 25th Australasian Conference on Information Security and Privacy (ACISP'20)
Sprache: English
[Conference Proceedings]


Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models
Stojanovic, Vladimir M.
Physical Review B
Sprache: English
[Journal Article]


LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
Sprache: English
[Journal Article]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
Sprache: English
[Conference Proceedings]


Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
Sprache: English
[Conference Proceedings]


TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Cloosters, Tobias; Rodler, Michael; Davi, Lucas
29th USENIX Security Symposium
Sprache: English
[Conference Proceedings]


Trusted Execution Environments: Properties, Applications, and Challenges
Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
IEEE Security & Privacy, p.56-60
Sprache: English
[Journal Article]


Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Krämer, Juliane; Struck, Patrick
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020)
Sprache: English
[Conference Proceedings]


On the Security of Strong Memristor-based Physically Unclonable Functions
Zeitouni, Shaza; Stapf, Emmanuel; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Design Automation Conference 2020
Sprache: English
[Conference Proceedings]


SAFE: A Secure and Efficient Long-Term Distributed Storage System
Buchmann, Johannes; Dessouky, Ghada; Frassetto, Tommaso; Kiss, Ágnes; Sadeghi, Ahmad-Reza; Schneider, Thomas; Traverso, Giulia; Zeitouni, Shaza
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20)
Sprache: English
[Conference Proceedings]


Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Nguyen, Thien Duc; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020
Sprache: English
[Conference Proceedings]


BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
24th International Conference on Financial Cryptography and Data Security (FC'20)
Sprache: English
[Conference Proceedings]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Sauer, Alexander; Alber, Gernot
Cryptography, Vol.4
Sprache: English
[Journal Article]


Deterministic twirling with low resources
Stonner, David Jakob; Kysela, Jaroslav; Weir, Graeme; Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physics letters A
Sprache: English
[Journal Article]


Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
Sprache: English
[Conference Proceedings]


The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
Sprache: English
[Journal Article]


A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems
Sprache: English
[Journal Article]


Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz
Reuter, Christian
Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, p.309-318
Sprache: German


Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
Sprache: English
[Journal Article]


HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
Sprache: English
[Conference Proceedings]