Publikationen

Publikationen

Classic McEliece Implementation with Low Memory Footprint
Roth, Johannes; Karatsiolis, Vangelis; Krämer, Juliane
19th Smart Card Research and Advanced Application Conference (CARDIS 2020)
[Conference Proceedings]


Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]


Cost Fairness for Blockchain-Based Two-Party Exchang Protocols
Lohr, Matthias; Schlosser, Benjamin; Jürjens, Jan; Staab, Matthias
3rd IEEE International Conference on Blockchain
[Conference Proceedings]


Security of Public Key Encryption against Resetting Attacks
Krämer, Juliane; Struck, Patrick
21st International Conference on Cryptology in India (Indocrypt 2020)
[Conference Proceedings]


Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany
Kaufhold, Marc-André; Haunschild, Jasmin; Reuter, Christian
Proceedings of the 28th European Conference on Information Systems (ECIS)
[Conference Proceedings]


OptiSwap: Fast Optimistic Fair Exchange
Eckey, Lisa; Faust, Sebastian; Schlosser, Benjamin
15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20)
[Conference Proceedings]


Towards Post-Quantum Security for Signal's X3DH Handshake
Brendel, Jacqueline; Fischlin, Marc; Günther, Felix; Janson, Christian; Stebila, Douglas
27th Selected Areas in Cryptography (SAC 2020)
[Conference Proceedings]


Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
Bauspieß, Pia; Kolberg, Jascha; Demmler, Daniel; Krämer, Juliane; Busch, Christoph
12th IEEE International Workshop on Information Forensics and Security (WIFS 2020)
[Conference Proceedings]


Deterministic Wallets in a Quantum World
Alkeilani Alkadri, Nabil; Das, Poulami; Erwig, Andreas; Faust, Sebastian; Krämer, Juliane; Riahi, Siavash; Struck, Patrick
The 27th ACM Conference on Computer and Communications Security (CCS 2020)
[Conference Proceedings]


Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing & Management
[Journal Article]


Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala
Weisenburger, Pascal; Salvaneschi, Guido
The Art, Science, and Engineering of Programming, p.17:1-17:29
[Journal Article]


TRIDEnT: Towards a Decentralized Threat Indicator Marketplace
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Le Roux, Stephane; Rowe, Steven; Mühlhäuser, Max
35th ACM/SIGAPP Symposium on Applied Computing (SAC'20)
[Conference Proceedings]


Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany
Haunschild, Jasmin; Kaufhold, Marc-André; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI), p.1545-1560
[Conference Proceedings]


Empirical Insights for Designing Information and Communication Technology for International Disaster Response
Stute, Milan; Maass, Max; Schons, Tom; Kaufhold, Marc-André; Reuter, Christian; Hollick, Matthias
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017
Reuter, Christian; Kaufhold, Marc-André; Spahr, Fabian; Spielhofer, Thomas; Hahne, Anna Sophie
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


A Programming Model for Semi-implicit Parallelization of Static Analyses
Helm, Dominik; Kübler, Florian; Kölzer, Jan Thomas; Haller, Philipp; Eichberg, Michael; Salvaneschi, Guido; Mezini, Mira
ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis
[Conference Proceedings]


Firmware Insider: Bluetooth Randomness is Mostly Random
Tillmanns, Jörn; Classen, Jiska; Rohrbach, Felix; Hollick, Matthias
14th USENIX Workshop on Offensive Technologies (WOOT 2020)
[Conference Proceedings]


Trustworthy AI Inference Systems: An Industry Research View
Cammarota, Rosario; Schunter, Matthias; Rajan, Anand; Boemer, Fabian; Kiss, Ágnes; Treiber, Amos; Weinert, Christian; Schneider, Thomas; Stapf, Emmanuel; Sadeghi, Ahmad-Reza; Demmler, Daniel; Chen, Huili; Hussain, Siam Umar; Riazi, M. Sadegh; Koushanfar, Farinaz; Gupta, Saransh; Rosing, Tajan Simunic; Chaudhuri, Kamalika; Nejatollahi, Hamid; Dutt, Nikil; Imani, Mohsen; Laine, Kim; Dubey, Anuj; Aysu, Aydin; Sadat Hosseini, Fateme; Yang, Chengmo; Wallace, Eric; Norton, Pamela
[Report]


MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk)
Boemer, Fabian; Cammarota, Rosario; Demmler, Daniel; Schneider, Thomas; Yalame, Mohammad Hossein
The 2nd Privacy-Preserving Machine Learning Workshop
[Conference Proceedings]


The Tip of the Iceberg: On the Merits of Finding Security Bugs
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
ACM Transactions on Privacy and Security
[Journal Article]


A survey of multitier programming
Salvaneschi, Guido; Wirth, Johannes; Weisenburger, Pascal
ACM Computing Surveys
[Journal Article]


CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk)
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
The 2nd Privacy-Preserving Machine Learning Workshop
[Conference Proceedings]


CryptoSPN: Expanding PPML beyond Neural Networks
Treiber, Amos; Molina, Alejandro; Weinert, Christian; Schneider, Thomas; Kersting, Kristian
Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop
[Conference Proceedings]


Engineering Privacy-Preserving Machine Learning Protocols
Schneider, Thomas
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20)
[Conference Proceedings]


Modular Collaborative Program Analysis in OPAL
Helm, Dominik; Kübler, Florian; Reif, Michael; Eichberg, Michael; Mezini, Mira
ESEC/FSE 2020 : Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, p.184-196
[Conference Proceedings]


RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhäuser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
Transactions on Dependable and Secure Computing
[Journal Article]


Peek-a-Boo: I see your smart home activities, even encrypted!
Acar, Abbas; Fereidooni, Hossein; Abera, Tigist; Sikder, Amit Kumsr; Miettinen, Markus; Aksu, Hidayet; Conti, Mauro; Sadeghi, Ahmad-Reza
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Putz, Florentin; Álvarez, Flor; Classen, Jiska
WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.31-41
[Conference Proceedings]


Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation
Nieminen, Raine; Järvinen, Kimmo
IEEE Transactions on Mobile Computing
[Journal Article]


DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and MobileNetworks, p.331-333
[Conference Proceedings]