Publikationen

Publikationen

Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, Carina; Bartsch, Steffen; Volkamer, Melanie
Computer und Recht, p.119-127
[Journal Article]


TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, Delphine; Pons-Sorolla, Daniel Rodriguez; Hollick, Matthias; Kanhere, Salil
International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), p.1-6
[Journal Article]


Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, Jurlind; Jöris, Roman; Volkamer, Melanie
Journal of Information Security and Applications, p.1-10
[Journal Article]


CA Trust Management for the Web PKI
Braun, Johannes; Volk, Florian; Classen, Jiska; Buchmann, Johannes; Mühlhäuser, Max
Journal of Computer Security, p.913-959
[Journal Article]


Long Term Confidentiality: a Survey
Braun, Johannes; Buchmann, Johannes; Mullan, Ciaran; Wiesmaier, Alexander
Designs, Codes and Cryptography, p.459-478
[Journal Article]


Citizen Electronic Identities using {TPM} 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
CoRR, p.37-48
[Journal Article, Conference Proceedings]


The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
Security Privacy, IEEE, p.29-37
[Journal Article]


Security Analysis of Mobile Two-Factor Authentication Schemes
Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza
Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition
[Journal Article]


Mobile Trusted Computing
Asokan, N.; Ekberg, Jan-Erik; Kostiainen, Kari; Rajan, Anand; Rozas, Carlos; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
Proceedings of the IEEE, p.1189-1206
[Journal Article]


Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source
Habib, Sheikh Mahbub; Ries, Sebastian; Varikkattu, Prabhu; Mühlhäuser, Max
Security and Communication Networks, p.2185-2200
[Journal Article]


Generation of entangled matter qubits in two opposing parabolic mirrors
Trautmann, N.; Bernad, J. Z.; Sondermann, M.; Alber, G.; Sanchez-Soto, L. L.; Leuchs, G.
Physical Review A
[Journal Article]


Instantiating Treeless Signature Schemes
Weiden, Patrick; Hülsing, Andreas; Cabarcas, Daniel; Buchmann, Johannes
Cryptology ePrint Archive, p.1-18
[Journal Article]


Provably Secure LWE-Encryption with Uniform Secret
Cabarcas, Daniel; Göpfert, Florian; Weiden, Patrick
Cryptology ePrint Archive, p.1-20
[Journal Article]


From big smartphone data to worldwide research: The Mobile Data Challenge
Laurila, Juha; Gatica-Perez, Daniel; Aad, Imad; Blom, Jan; Bornet, Olivier; Do, Trinh Minh Tri; Dousse, Olivier; Eberle, Julien; Miettinen, Markus
Pervasive and Mobile Computing, p.752-771
[Journal Article]


Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, Daniela; Neumann, Stephan; Kahlert, Anna; Richter, Philipp; Grimm, Rüdiger; Volkamer, Melanie; Roßnagel, Alexander
International Journal of Information Security and Privacy (IJISP), p.16-35
[Journal Article]


Towards Measuring Resilience in Anonymous Communication Networks
Shirazi, Fatemeh; Diaz, Claudia; Mullan, Ciaran; Wright, Joss; Buchmann, Johannes
HotPETs 2013
[Journal Article]


On the security of the Winternitz one-time signature scheme
Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus
International Journal of Applied Cryptography, p.84-96
[Journal Article]


Efficiently Outsourcing Multiparty Computation under Multiple Keys
Peter, Andreas; Tews, Erik; Katzenbeisser, Stefan
Cryptology ePrint Archive, p.1-24
[Journal Article]


Usable secure email communications: criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information Management & Computer Security, p.41-52
[Journal Article]


Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Franz, M.; Deiseroth, B.; Hamacher, Kay; Jha, Somesh; Katzenbeisser, S.; Schröder, H.
Information Security Technical Report, p.117-128
[Journal Article]


Pseudorandom Signatures
Fleischhacker, N.; Günther, F.; Kiefer, F.; Poettering, B.
>8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Journal Article]


Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Armknecht, F.; Katzenbeisser, S.; Peter, A.
Designs, Codes and Cryptography, p.209-232
[Journal Article]


Internet Privacy. Taking opportunities, assessing risks, building trust.
Simo-Fhom, Hervais
>Springer Vieweg; 2013
[Journal Article]


Sichere Nutzung von Cloud-Speicherdiensten
Kalabis, Lukas; Wolf, Ruben; Kunz, Thomas
Datenschutz und Datensicherheit, p.512-516
[Journal Article]


Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]


Schutz­maß­nahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglich­keiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps
Bodden, Eric; Rasthofer, Siegfried; Richter, Philipp; Roßnagel, Alexander
Datenschutz und Datensicherheit, p.720 - 725
[Journal Article]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
Cryptology ePrint Archive, p.1-12
[Conference Proceedings, Journal Article]


Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey
Vigil, Martín Gagliotti; Cabarcas, Daniel; Wiesmaier, Alexander; Buchmann, Johannes
IACR Cryptology ePrint Archive
[Journal Article]


Certified Grid Job Submission in the ALICE Grid Services
Schreiner, Steffen; Grigoras, Costin; Litmaath, Maarten; Betev, Latchezar; Buchmann, Johannes
Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Journal Article]


Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet
Kalabis, Lukas; Selzer, Annika
Datenschutz und Datensicherheit, p.670--675
[Journal Article]