Publikationen
Publikationen
Fake News and the Manipulation of Public Opinion
Reuter, Christian
Digitalisation and Communication: Societal Trends and the Change in Organisations, p.13-16
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Dessouky, Ghada; Gruler, Alexander; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
Network and Distributed Systems Security (NDSS) Symposium 2022
[Conference Proceedings]
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings der 15. Internationalen Tagung Wirtschaftsinformatik 2020 : Entwicklungen, Chancen und Herausforderungen der Digitalisierung : WI 2020 : Zentrale Tracks
[Conference Proceedings]
Financially Backed Covert Security
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
International Conference on Practice and Theory of Public-Key Cryptography 2022
[Conference Proceedings]
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization
Fitzke, Erik; Krebs, Robin; Haase, Thorsten; Mengler, Max; Alber, Gernot; Walther, Thomas
New Journal of Physics
[Journal Article]
Hybrid password meters for more secure passwords – a comprehensive study of password meters including nudges and password information
Zimmermann, Verena; Marky, Karola; Renaud, Karen
Behaviour & Information Technology
[Journal Article]
Nomadic Knowledge Sharing Practices and Challenges: Findings From a Long-Term Case Study
Saeed, Saqib; Pipek, Volkmar; Rohde, Markus; Reuter, Christian; Pinatti de Carvalho, Aparecido Fabiano; Wulf, Volker
IEEE Access, p.63564-63577
[Journal Article]
CiFi: Versatile Analysis of Class and Field Immutability
Roth, Tobias; Helm, Dominik; Reif, Michael; Mezini, Mira
Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, p.81-82
[Conference Proceedings]
Proceedings of the 2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
2nd Workshop on Mobile Resilience: Designing Interactive Systems for Crisis Response
[Conference Proceedings]
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities
Zeitouni, Shaza; Dessouky, Ghada; Sadeghi, Ahmad-Reza
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021)
[Conference Proceedings]
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Rodler, Michael; Li, Wenting; Karame, Ghassan O.; Davi, Lucas
30th USENIX Security Symposium
[Conference Proceedings]
SoK: Efficient Privacy-preserving Clustering
Hedge, Aditya; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
21st Privacy Enhancing Technologies Symposium (PETS 2021)
[Conference Proceedings]
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
Chen, Yanjiao; Bai, Yijie; Wang, Kaibo; Mitev, Richard; Xu, Wenyuan; Sadeghi, Ahmad-Reza
ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Bahmani, Raad; Brasser, Ferdinand; Dessouky, Ghada; Jauernig, Patrick; Klimmek, Matthias; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
30th USENIX Security Symposium (USENIX Security'21)
[Conference Proceedings]
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Alkeilani Alkadri, Nabil; Harasser, Patrick; Janson, Christian
20th International Conference on Cryptology and Network Security (CANS 2021)
[Conference Proceedings]
The Cost of Path Information: Routing in Anonymous Communication
Grube, Tim; Egert, Rolf; Daubert, Jörg; Mühlhäuser, Max
Consumer Communications & Networking Conference (CCNC 2021)
[Conference Proceedings]
SAFELearn: Secure Aggregation for private FEderated Learning
Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Möllering, Helen; Nguyen, Thien Duc; Rieger, Phillip; Sadeghi, Ahmad-Reza; Schneider, Thomas; Yalame, Mohammad Hossein; Zeitouni, Shaza
4th Deep Learning and Security Workshop (DLS'21)
[Conference Proceedings]
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation
Demmler, Daniel; Katzenbeisser, Stefan; Schneider, Thomas; Schuster, Tom; Weinert, Christian
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]
Who are Vulnerability Reporters? A Large-scale Empirical Study on FLOSS
Alexopoulos, Nikolaos; Meneely, Andy; Arnouts, Dorian; Mühlhäuser, Max
ESEM '21: Proceedings of the 15th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
[Conference Proceedings]
The Security of ChaCha20-Poly1305 in the Multi-User Setting
Degabriele, Jean Paul; Govinden, Jérôme; Günther, Felix; Paterson, Kenneth G.
CCS´21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1981-2003
[Conference Proceedings]
The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography
Mittelbach, Arno; Fischlin, Marc
[Book]
An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records
Fejrskov, Martin; Pedersen, Jens Myrup; Böck, Leon; Vasilomanolakis, Emmanouil
IEEE Conference on Communications and Network Security
[Conference Proceedings]
LOKI: Development of an interface for task-based, privacy-friendly smart home control through LOCal Information Processing
Gerber, Paul; Heidinger, Marvin; Stiegelmayer, Julia; Gerber, Nina
Mensch und Computer 2021, p.578-581
[Conference Proceedings]
Towards Resilient Critical Infrastructures – Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com, p.161-175
[Journal Article]
Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josefine; Zimmermann, Verena; Gerber, Nina
Mensch und Computer 2021 - Workshopband
[Conference Proceedings]
Exploring energy grid resilience: The impact of data, prosumer awareness, and action
Egert, Rolf; Daubert, Jörg; Marsh, Stephen; Mühlhäuser, Max
Patterns
[Journal Article]
Holonic System Model for Resilient Energy Grid Operation
Egert, Rolf; Grube, Tim; Volk, Florian; Mühlhäuser, Max
Energies
[Journal Article]
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
30th USENIX Security Symposium
[Conference Proceedings]
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
Proceedings: 2021 IEEE Symposium on Security and Privacy (SP 2021), p.1696-1714
[Conference Proceedings]
Towards Resilient Critical Infrastructures - Motivating Users to Contribute to Smart Grid Resilience
Egert, Rolf; Gerber, Nina; Haunschild, Jasmin; Kuehn, Philipp; Zimmermann, Verena
i-com: Journal of Interactive Media, p.161-175
[Journal Article]