Publikationen

Publikationen

Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Ulitzsch, Vincent Quentin; Marzougui, Soundes; Bagia, Alexis; Tibouchi, Mehdi; Seifert, Jean-Pierre
[Journal Article]


Datenschutzvorsorge in der offensiven Cyber­sicher­heits­forschung
Selzer, Annika; Spiecker gen. Döhmann, Indra; Boll, Alina
[Journal Article]


Resource Management for Programmable Metasurfaces: Concept, Prospects and Challenges
Liaskos, Christos; Katsalis, Kostas; Triay, Joan; Schmid, Stefan
[Journal Article]


Runtime Verification for Programmable Switches
Shukla, Apoorv; Hudemann, Kevin; Vági, Zsolt; Hügerich, Lily; Smaragdakis, Georgios; Hecker, Artur; Schmid, Stefan; Feldmann, Anja
[Journal Article]


Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing
Dai, Wenkai; Foerster, Klaus-Tycho; Fuchssteiner, David; Schmidt, Stefan
[Journal Article]


Künstliche Intelligenz als Instrument des Kinder- und Jugendmedienschutzes
Steinebach, Martin
[Journal Article]


Intermezzo. Welcher Technologie kann man vertrauen?
Schulmann, Haya; Waidner, Michael
[Journal Article]


Aktive Cyberabwehr
Schulmann, Haya; Waidner, Michael
[Journal Article]


Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates
Frieß, Jens; Schulmann, Haya; Waidner, Michael
International Conference on Emerging Networking EXperiments and Technologies 2023
[Journal Article]


Abschreckungseffekte und Überwachungsgefühl im Datenschutzrecht
Büscher, Maximilian; Hornung, Gerrit; Schindler, Stephan; Zurawski, Paul; Gutjahr, Amina; Spiecker gen. Döhmann, Indra; Selzer, Annika; Stummer, Sarah; Wilmer, Thomas
[Journal Article]


Zulässigkeit der Zweckänderung durch Auftragsverarbeiter
Boll, Alina; Gärtner, Tanya; Geissler, Ines; Stummer, Sarah
[Journal Article]


Superpolynomial quantum-classical separation for density modeling
Pirnay, Niklas; Sweke, Ryan; Eisert, Jens; Seifert, Jean-Pierre
[Journal Article]


Evaluating the applicability of hardware trust anchors for automotive applications
Plappert, Christian; Lorych, Dominik; Eckel, Michael; Jäger, Lukas; Fuchs, Andreas; Heddergott, Ronald
[Journal Article]


Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
Krachenfels, Thilo; Seifert, Jean-Pierre; Tajik, Shahin
[Journal Article]


Securing the Future Railway System: Technology Forecast, Security Measures, and Research Demands
Unger, Simon; Heinrichs, Markus; Scheuermann, Dirk; Katzenbeisser, Stefan; Schubert, Max; Hagemann, Leon; Iffländer, Lukas
[Journal Article]


Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Saxena, Deepika; Kumar, Jitendra; Singh, Ashutosh Kumar; Schmid, Stefan
[Journal Article]


Duo: A High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control
Zerwas, Johannes; Györgyi, Csaba; Blenk, Andreas; Schmid, Stefan; Avin, Chen
Association for Computing Machinery, Special Interest Group on Performance Evaluation (ACM SIGMETRICS Conference) 2023
[Journal Article]


Identifizierbarkeit und Anonymität im Internet
Stummer, Sarah
[Journal Article]


Angemessene technische und organisatorische Maßnahmen
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Metrikensysteme als Beitrag zur Umsetzung des risikobasierten Ansatzes
Gärtner, Tanya; Selzer, Annika
[Journal Article]


Personenbezogenheit vs. Anonymität
Stummer, Sarah
[Journal Article]


Digitalisierung in Deutschland: Ein Vergleich zu Südkorea und Singapur
Engelbrecht, Stefan; Gerber, Jens; Gyollai, Michael; Rosch, Philipp; Schulz, Cord C.; Selzer, Annika
[Journal Article]


Ohne Cybersicherheit kein Datenschutz, ohne Datenschutz keine Cybersicherheit?
Boll, Alina
[Journal Article]


Inconsistencies in Darknet Researches
Platzer, Florian; Lux, Alexandra
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Scraping and Analyzing Data of a Large Darknet Marketplace
Yannikos, York; Heeger, Julian; Steinebach, Martin
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Image Hashing Robust Against Cropping and Rotation
Steinebach, Martin; Berwanger, Tiberius; Liu, Huajian
International Conference on Availability, Reliability and Security 2022
[Journal Article]


Wenn aus Worten Bilder werden
Steinebach, Martin
[Journal Article]


Detection of deepfakes using background-matching
Blümer, Stefanie; Steinebach, Martin; Frick, Raphael; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]


Predicting positions of flipped bits in robust image hashes
Hammann, Marius; Steinebach, Martin; Liu, Huajian; Bunzel, Niklas
International Symposium on Electronic Imaging 2023
[Journal Article]


Privacy preserving leak detection in peer-to-peer communication
Heeger, Julian; Bugert, Simon; Berchtold, Waldemar; Gruler, Alexander; Steinebach, Martin
International Symposium on Electronic Imaging 2023
[Journal Article]