Publikationen

Publikationen

The Cybersecurity Landscape in Industrial Control Systems
McLaughlin, Stephen; Konstantinou, Charalambos; Wang, Xueyang; Davi, Lucas; Sadeghi, Ahmad-Reza; Maniatakos, Michail; Karri, Ramesh
Proceedings of the IEEE, p.1039-1057
[Journal Article]


Quantum simulation of the dynamical Casimir effect with trapped ions
Trautmann, Nils; Hauke, Philipp
New Journal of Physics
[Journal Article]


mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing
Steinmetzer, Daniel; Classen, Jiska; Hollick, Matthias
Millimeter-wave Networking Workshop (mmNet 2016)
[Journal Article]


An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Reanaud, Karen; Volkamer, Melanie; Woide, Marcel
Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, p.309-322
[Journal Article]


Cooperative quantum electrodynamical processes in an ellipsoidal cavity
Alber, Gernot; Trautmann, Nils
Journal of Physics: Conference Series
[Journal Article]


HbbTV Security and Privacy: Issues and Challenges
Ghiglieri, Marco; Waidner, Michael
>IEEE Security & Privacy, p.pp. 61-67
[Journal Article]


"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern
Budurushi, Jurlind; Hilt, Annika; Volkamer, Melanie
Datenschutz und Datensicherheit - DuD, p.300-304
[Journal Article]


An Unconditionally Hiding Auditing Procedure for Multi-Party Computations
Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes
IACR - Cryptology ePrint Archive
[Journal Article]


SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, Stephan; Volkamer, Melanie; Budurushi, Jurlind; Prandini, Marco
>Annals of Telecommunications, p.1-16
[Journal Article]


Spot the phish by checking the pruned URL
Volkamer, Melanie; Renaud, Karen; Gerber, Paul
Information and Computer Security, p.372-385
[Journal Article]


Efficient single-photon absorption by a trapped moving atom
Trautmann, Nils; Alber, Gernot; Leuchs, Gerd
Physical Review A
[Journal Article]


Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, Karen; Flowerday, Stephen; English, Rosanne; Volkamer, Melanie
>Information and Computer Security, p.400-415
[Journal Article]


Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Classen, Jiska; Steinmetzer, Daniel; Hollick, Matthias
3rd ACM Workshop on Visible Light Communication Systems
[Journal Article]


The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]


Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
Cryptology ePrint Archive, p.1-19
[Journal Article]


TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Schwabe, Peter
Cryptology ePrints Archive, p.1-24
[Journal Article]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, M.; Buchmann, J.; Cabarcas, D.; Weinert, C.; Wiesmaier, A.
Computer \& Security (Journal), Vol.50, p.16-32
[Journal Article]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Datenschutz und Datensicherheit, Vol.39, p.383-387
[Journal Article]


A probabilistic kernel method for human mobility prediction with smartphones
Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel
Pervasive and Mobile Computing, p.13-28
[Journal Article]


Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
IACR Cryptology ePrint Archive, p.765
[Journal Article]


Universality in random quantum networks
Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physical Review A
[Journal Article]


IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
>Datenschutz und Datensicherheit DuD, p.383-387
[Journal Article]


High Performance Lattice-based CCA-secure Encryption
Bansarkhani, Rachid El; Buchmann, Johannes
Cryptology ePrint Archive, p.20
[Journal Article]


Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Financial Cryptography and Data Security - 19th International Conference, FC 2015, p.5-13
[Journal Article]


Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
Herzberg, Amir; Shulman, Haya
Internet Computing, IEEE, p.80-84
[Journal Article]


Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
ACM SIGCAS Computers and Society, p.16-21
[Journal Article]


Usability und Privacy im Android Ökosystem
Gerber, Paul; Volkamer, Melanie
Datenschutz und Datensicherheit, p.108 - 113
[Journal Article]


Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication
Trautmann, N.; Alber, G.; Agarwal, G. S.; Leuchs, G.
Physical Review Letters
[Journal Article]


Selective dynamical decoupling for quantum state transfer
Frydrych, H.; Hoskovec, A.; Jex, I.; Alber, G.
Journal of Physics B: Atomic, Molecular and Optical Physics
[Journal Article]


Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, Martín; Buchmann, Johannes; Cabarcas, Daniel; Weinert, Christian; Wiesmaier, Alexander
Computers & Security, p.16-32
[Journal Article]