Publikationen
Publikationen
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Biedermann, Sebastian; Karvelas, Nikolaos; Katzenbeisser, Stefan; Strufe, Thorsten; Peter, Andreas
SOFSEM 2014: Theory and Practice of Computer Science, p.114-125
[Journal Article]
Scalable Offline Monitoring
Basin, David; Caronni, Germano; Ereth, Sarah; Harvan, Matus; Klaedtke, Felix; Mantel, Heiko
Proceedings of the 14th International Conference on Runtime Verification (RV)
[Conference Proceedings]
General Impossibility of Group Homomorphic Encryption in the Quantum World
Armknecht, Frederik; Gagliardoni, Tommaso; Katzenbeisser, Stefan; Peter, Andreas
Public-Key Cryptography PKC 2014, p.556-573
[Conference Proceedings]
Öffentlichkeitsgrundsatz und Stimmzettelbelege
Henning, Maria; Budurushi, Jurlind; Volkamer, Melanie
[Report]
A Privacy Protection System for HbbTV in Smart TVs
Ghiglieri, Marco; Tews, Erik
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), p.648-653
[Conference Proceedings]
Web-Tracking-Report 2014
Schneider, Markus; Enzmann, Matthias; Stopczynski, Martin
[Report]
Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, Maina; Renaud, Karen; Bartsch, Steffen; Volkamer, Melanie
Workshop on Usable Security (USEC)
[Conference Proceedings]
Key2Share for Authentication Services
Busold, Christoph; Dmitrienko, Alexandra; Wachsmann, Christian
SmartCard Workshop
[Conference Proceedings]
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, Jurlind; Woide, Marcel; Volkamer, Melanie
Workshop on Usable Security (USEC)
[Conference Proceedings]
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, Carina; Bartsch, Steffen; Volkamer, Melanie
Computer und Recht, p.119-127
[Journal Article]
Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, Steffen; Boos, Carina; Dyck, Dominic; Schwarz, Christopher; Theuerling, Heike; Henhapl, Birgit; Volkamer, Melanie
Vielfalt der Informatik, p.168-171
[Conference Proceedings]
Zertifizierte Datensicherheit für mobile Anwendungen
Sohr, Karsten; Bartsch, Steffen; Volkamer, Melanie; Berger, Bernhard; Bodden, Eric; Brucker, Achim; Maseberg, Sönke; Kus, Mehmet; Heider, Jens
GI Sicherheit 2014, p.283--291
[Conference Proceedings]
MoP-2-MoP - Mobile private microblogging
Senftleben, Marius; Bucicoiu, Mihai; Tews, Erik; Armknecht, Frederik; Katzenbeisser, Stefan; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security (FC'14)
[Conference Proceedings]
ASM: A Programmable Interface for Extending Android Security
Heuser, Stephan; Nadkarni, Adwait; Enck, William; Sadeghi, Ahmad-Reza
[Report]
Personal DLP for Facebook
Ghiglieri, Marco; Stopczynski, Martin; Waidner, Michael
Pervasive Computing and Communications Workshops (PERCOM Workshops), p.629 - 634
[Conference Proceedings]
POSTER: On Offline Payments with Bitcoin
Dmitrienko, Alexandra; Noack, David; Sadeghi, Ahmad-Reza; Yung, Moti
FC'2014: Financial Cryptography and Data Security Conference
[Conference Proceedings]
On the (In)Security of Mobile Two-Factor Authentication
Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza
Financial Cryptography and Data Security (FC'14)
[Conference Proceedings]
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations
Diaconita, Irina; Reinhardt, Andreas; Englert, Frank; Christin, Delphine; Steinmetz, Ralf
2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), p.1-9
[Conference Proceedings]
Building Castles in Quicksand: Blueprints of a Crowdsourced Study
Renkema-Padmos, Arne; Volkamer, Melanie; Renaud, Karen
CHI 2014
[Conference Proceedings]
TrustLite: A Security Architecture for Tiny Embedded Devices
Koeberl, Patrick; Schulz, Steffen; Sadeghi, Ahmad-Reza; Varadharajan, Vijay
European Conference on Computer Systems (EuroSys)
[Conference Proceedings]
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection
Davi, Lucas; Lehmann, Daniel; Sadeghi, Ahmad-Reza; Monrose, Fabian
[Report]
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, Delphine; Pons-Sorolla, Daniel Rodriguez; Hollick, Matthias; Kanhere, Salil
International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), p.1-6
[Journal Article]
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, Jurlind; Jöris, Roman; Volkamer, Melanie
Journal of Information Security and Applications, p.1-10
[Journal Article]
Salvaging Indifferentiability in a Multi-stage Setting
Mittelbach, Arno
Advances in Cryptology – EUROCRYPT 2014. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings., p.603-621
[Conference Proceedings]
Automated analysis of security protocols with global state
Kremer, Steve; Künnemann, Robert
Proceedings of the 2014 IEEE Symposium on Security and Privacy, p.163-178
[Conference Proceedings]
Incorrect HTTPS Certificate Validation in Samsung Smart TVs
Ghiglieri, Marco
[Report]
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Volkamer, Melanie
International Conference for E-Democracy and Open Government 2014, p.141-152
[Conference Proceedings]
Using Indistinguishability Obfuscation via UCEs
Brzuska, Christina; Mittelbach, Arno
Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., p.22-141
[Conference Proceedings]
Expert Knowledge for Contextualized Warnings
Bartsch, Steffen; Volkamer, Melanie
[Report]
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT"
Schneider, Matthias; Schneider, Thomas
IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, p.432-440
[Conference Proceedings]