Publikationen

Publikationen

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas
Cryptology ePrint Archive, p.1-33
[Journal Article]


Post-Quantum Attribute-Based Signatures from Lattice Assumptions
Bansarkhani, Rachid El; El Kaafarani, Ali
Cryptology ePrint Archive, p.1-28
[Journal Article]


Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates
Wunderer, Thomas
Cryptology ePrint Archive, p.1-35
[Journal Article]


Unlinkable improved multi-biometric iris fuzzy vault
Rathgeb, C.; Tams, B.; Wagner, J.; Busch, C.
EURASIP Journal on Information Security, Vol.2016, p.26
[Journal Article]


Effects of image compression on ear biometrics
Rathgeb, C.; Pflug, A.; Wagner, J.; Busch, C.
IET Biometrics, Vol.5, p.252-261
[Journal Article]


Finger image quality assessment features - definitions and evaluation
Olsen, M.; Šmida, V.; Busch, C.
IET Biometrics, Vol.5, p.47-64
[Journal Article]


Keystroke Biometrics Ongoing Competition
Morales, A.; Fierrez, J.; Tolosana, R.; Ortega-Garcia, J.; Galbally, J.; others
IEEE Access, Vol.4, p.7736-7746
[Journal Article]


Unlinkable and irreversible biometric template protection based on bloom filters
Gomez-Barrero, Marta; Rathgeb, Christian; Galbally, Javier; Busch, Christoph; Fierrez, Julian
Information Sciences, Vol.370—371, p.18-32
[Journal Article]


User-Centric Security and Dependability in the Cloud of Clouds
Lacoste, Marc; Sousa, Paulo; Neves, Nuno; Miettinen, Markus; Ramos, Fernando M.V.; Vukolic, Marko; Charmet, Fabien; Yaich, Reda; Oborzynski, Krzysztof; Vernekar, Gitesh
IEEE Cloud Computing Special issue on Cloud Security, p.64-75
[Journal Article]


Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter
Trautmann, Nils; Alber, Gernot
Physical Review A
[Journal Article]


Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
Degabriele, Jean Paul; Fehr, Victoria; Fischlin, Marc; Gagliardoni, Tommaso; Günther, Felix; Marson, Giorgia Azzurra; Mittelbach, Arno; Paterson, Kenneth G.
International Journal of Information Security, p.637-657
[Journal Article]


Remanence Decay Side-Channel: The PUF Case
Zeitouni, Shaza; Oren, Yossef; Wachsmann, Christian; Koeberl, Patrick; Sadeghi, Ahmad-Reza
IEEE Transactions on Information Forensics and Security
[Journal Article]


The Cybersecurity Landscape in Industrial Control Systems
McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang; Davi, Lucas; Sadeghi, Ahmad-Reza; Maniatakos, Michail; Karri, Ramesh
Proceedings of the IEEE, p.1039-1057
[Journal Article]


Quantum simulation of the dynamical Casimir effect with trapped ions
Trautmann, Nils; Hauke, Philipp
New Journal of Physics
[Journal Article]


mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
Millimeter-wave Networking Workshop (mmNet 2016)
[Journal Article]


An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
[Journal Article]


Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
[Journal Article]


HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
[Journal Article]


"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern
Budurushi, Jurlind; Hilt, Annika; Volkamer, Melanie
Datenschutz und Datensicherheit - DuD, p.300-304
[Journal Article]


An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
IACR - Cryptology ePrint Archive
[Journal Article]


SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, Stephan; Volkamer, Melanie; Budurushi, Jurlind; Prandini, Marco
>Annals of Telecommunications, p.1-16
[Journal Article]


Spot the phish by checking the pruned URL
Volkamer, Melanie; Renaud, Karen; Gerber, Paul
Information and Computer Security, p.372-385
[Journal Article]


Efficient single-photon absorption by a trapped moving atom
Trautmann, Nils; Alber, Gernot; Leuchs, Gerd
Physical Review A
[Journal Article]


Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, Karen; Flowerday, Stephen; English, Rosanne; Volkamer, Melanie
>Information and Computer Security, p.400-415
[Journal Article]


Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]


The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]