Publikationen
Publikationen
Post-Quantum Cryptography and its Application to the IoT
Krämer, Juliane
Informatik Spektrum, p.343-344
[Journal Article]
Language-integrated privacy-aware distributed queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.167
[Journal Article]
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
IEEE Transactions on Software Engineering
[Journal Article]
Zero-Interaction Security - Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications, p.16-21
[Journal Article]
Long-term integrity protection of genomic data
Buchmann, Johannes; Geihs, Matthias; Hamacher, Kay; Katzenbeisser, Stefan; Stammler, Sebastian
EURASIP Journal on Information Security, p.16
[Journal Article]
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
IET Information Security
[Journal Article]
Environment-Assisted Quantum Transport in a 10-qubit Network
Maier, Christine; Brydges, Tiff; Jurcevic, Petar; Trautmann, Nils; Hempel, Cornelius; Lanyon, Ben P.; Hauke, Philipp; Blatt, Rainer; Roos, Christian F.
PHYSICAL REVIEW LETTERS, p.50501
[Journal Article]
Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, p.29367-29379
[Journal Article]
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]
Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
[Journal Article]
Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
eprint
[Journal Article]
Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
[Journal Article, Report]
Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, p.259
[Journal Article]
Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
[Journal Article]
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study
Saeed, Saqib; Pipek, Volkmar; Rohde, Markus; Reuter, Christian; Pinatti de Carvalho, Aparecido Fabiano; Wulf, Volker
IEEE Access, p.63564-63577
[Journal Article]
Mitigating information overload in social media during conflicts and crises: design and evaluation of a cross-platform alerting system
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Habdank, Matthias
Behaviour & Information Technology (BIT), p.319-342
[Journal Article]
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas
arXiv:1907.07725 cs.SI, p.1-11
[Journal Article]
Keep on rating – on the systematic rating and comparison of authentication schemes
Zimmermann, Verena; Gerber, Nina; Mayer, Peter; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin
Information & Computer Security
[Journal Article]
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition
Bindel, Nina; Braun, Johannes; Gladiator, Luca; Stöckert, Tobias; Wirth, Johannes
Journal of Open Source Software
[Journal Article]
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles
Kohnhäuser, Florian; Püllen, Dominik; Katzenbeisser, Stefan
IEEE Workshop on the Internet of Safe Things
[Journal Article]
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset
Zimmermann, Verena; Renaud, Karen
International Journal of Human-Computer Studies
[Journal Article]
The Status of Quantum-Based Long-Term Secure Communication over the Internet
Geihs, Matthias; Nikiforov, Oleg; Demirel, Denise; Sauer, Alexander; Butin, Denis; Günther, Felix; Alber, Gernot; Walther, Thomas; Buchmann, Johannes
IEEE Transactions on Sustainable Computing
[Journal Article]
Sichere Instant Messaging Apps
Brendel, Jacqueline; Gerber, Nina
Datenschutz und Datensicherheit - DuD, p.276-280
[Journal Article]
AUDI: Towards Autonomous IoT Device-Type Identification
Marchal, Samuel; Miettinen, Markus; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Asokan, N.
IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
[Journal Article]
Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
[Journal Article]
SoK: Modular and Efficient Private Decision Tree Evaluation
Kiss, Ágnes; Naderpour, Masoud; Liu, Jian; Asokan, N.; Schneider, Thomas
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Journal Article]
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
Reuter, Christian; Ludwig, Thomas; Mischur, Patrick
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.209-246
[Journal Article]
Face verification robustness & camera-subject distance
Berthe, Benoit; Croll, Christian; Henniger, Olaf
[Journal Article]
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]