Publikationen

Publikationen

Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks
Rathgeb, C.; Tolosana, R.; Vera, R.; Busch, C.
[Book]


Datenschutzrechtliche Zulässigkeit von Cloud-Computing-Services und deren teilautomatisierte Überprüfbarkeit
Selzer, Annika
[Book]


IT-Sicherheit in Industrie 4.0. Mit Bedrohungen und Risiken umgehen
Selzer, Annika; Schöning, Harald; Laabs, Martin; Dukanovic, Sinisa; Henkel, Thorsten
[Book]


Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens
Aichroth, Patrick; Battis, Verena; Dewes, Andreas; Dibak, Christoph; Doroshenko, Vadym; Geiger, Bernd; Graner, Lukas; Holly, Steffen; Huth, Michael; Kämpgen, Benedikt; Kaulartz, Markus; Mundt, Michael; Rapp, Hermann; Steinebach, Martin; Sushko, Yurii; Swarat, Dominic; Winter, Christian; Weiß, Rebekka
[Book]


Handbook of Vascular Biometrics
Uhl, A.; Busch, C.; Marcel, S.; Veldhuis, R.
[Book]


Die Digitalisierung der Kommunikation: Gesellschaftliche Trends und der Wandel von Organisationen
Reuter, Christian; Schultz, Tanjev; Stegbauer, Christian
[Book]


SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Reuter, Christian
[Book]


Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
[Book]


Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
[Book]


International Journal of Information Systems for Crisis Response and Management : Special Issue on IT Support for Crisis and Continuity Management
Reuter, Christian; Pottebaum, Jens
[Book]


Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement
[Book]


Compilation for Secure Multi-party Computation
Büscher, Niklas; Katzenbeisser, Stefan
[Book]


Privately and Publicly Verifiable Computing Techniques
Buchmann, Johannes; Demirel, Denise; Schabhüser, Lucas
[Book]


Homomorphic Signature Schemes - A survey
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes
[Book]


Certification of ICTs in Elections
Wolf, Peter; Barrat, Jordi; Bolo, Eden; Bravo, Alejandro; Krimmer, Robert; Neumann, Stephan; Parreño, Al; Schürmann, Carsten; Volkamer, Melanie
[Book]


Automated Software Diversity
Larsen, Per; Brunthaler, Stefan; Davi, Lucas; Sadeghi, Ahmad-Reza; Franz, Michael
[Book]


Building Secure Defenses Against Code-Reuse Attacks
Davi, Lucas; Sadeghi, Ahmad-Reza
[Book]


Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Wachsmann, Christian; Sadeghi, Ahmad-Reza
[Book]


Internet Privacy: Options for adequate realization
[Book]


Personal Information Dashboard: Putting the Individual Back in Control
Buchmann, Johannes; Nebel, Maxi; Roßnagel, Alexander; Shirazi, Fatemeh; Simo, Hervais; Waidner, Michael
Digital Enlightenment Yearbook 2013, p.139-164
[Book]


Introduction to Public Key Infrastructures
Buchmann, Johannes; Karatsiolis, Evangelos; Wiesmaier, Alexander
[Book]


Mobile Platform Security
Asokan, N.; Davi, Lucas; Dmitrienko, Alexandra; Heuser, Stephan; Kostiainen, Kari; Reshetova, Elena; Sadeghi, Ahmad-Reza
[Book]


Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis
[Book]


TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures
Bessani, Alysson; Abbadi, Imad M.; Bugiel, Sven; Cesena, Emanuele; Deng, Mina; Gröne, Michael; Marnau, Ninja; Nürnberger, Stefan; Pasin, Marcelo; Schirmer, Norbert
European research activities in cloud computing, p.151-177
[Book]


Trust and Trustworthy Computing : 5th inter­national conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings
Katzenbeisser, Stefan; Weippl, Edgar; Camp, Jean; Volkamer, Melanie; Reiter, Mike; Zhang, Xinwen
[Book]