Publikationen

Publikationen

Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, Daniela; Neumann, Stephan; Kahlert, Anna; Richter, Philipp; Grimm, Rüdiger; Volkamer, Melanie; Roßnagel, Alexander
International Journal of Information Security and Privacy (IJISP), p.16-35
[Journal Article]


Towards Measuring Resilience in Anonymous Communication Networks
Shirazi, Fatemeh; Diaz, Claudia; Mullan, Ciaran; Wright, Joss; Buchmann, Johannes
HotPETs 2013
[Journal Article]


On the security of the Winternitz one-time signature scheme
Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus
International Journal of Applied Cryptography, p.84-96
[Journal Article]


Efficiently Outsourcing Multiparty Computation under Multiple Keys
Peter, Andreas; Tews, Erik; Katzenbeisser, Stefan
Cryptology ePrint Archive, p.1-24
[Journal Article]


Usable secure email communications: criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information Management & Computer Security, p.41-52
[Journal Article]


Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Franz, M.; Deiseroth, B.; Hamacher, Kay; Jha, Somesh; Katzenbeisser, S.; Schröder, H.
Information Security Technical Report, p.117-128
[Journal Article]


Pseudorandom Signatures
Fleischhacker, N.; Günther, F.; Kiefer, F.; Poettering, B.
>8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Journal Article]


Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Armknecht, F.; Katzenbeisser, S.; Peter, A.
Designs, Codes and Cryptography, p.209-232
[Journal Article]


Internet Privacy. Taking opportunities, assessing risks, building trust.
Simo-Fhom, Hervais
>Springer Vieweg; 2013
[Journal Article]


Sichere Nutzung von Cloud-Speicherdiensten
Kalabis, Lukas; Wolf, Ruben; Kunz, Thomas
Datenschutz und Datensicherheit, p.512-516
[Journal Article]


Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]


Schutz­maß­nahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglich­keiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps
Bodden, Eric; Rasthofer, Siegfried; Richter, Philipp; Roßnagel, Alexander
Datenschutz und Datensicherheit, p.720 - 725
[Journal Article]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
Cryptology ePrint Archive, p.1-12
[Conference Proceedings, Journal Article]


Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey
Vigil, Martín Gagliotti; Cabarcas, Daniel; Wiesmaier, Alexander; Buchmann, Johannes
IACR Cryptology ePrint Archive
[Journal Article]


Certified Grid Job Submission in the ALICE Grid Services
Schreiner, Steffen; Grigoras, Costin; Litmaath, Maarten; Betev, Latchezar; Buchmann, Johannes
Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Journal Article]


Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet
Kalabis, Lukas; Selzer, Annika
Datenschutz und Datensicherheit, p.670--675
[Journal Article]


Sicherheitskern(e) für Smartphones: Ansätze und Lösungen
Alkassar, Ammar; Schulz, Steffen; Stüble, Christian
Datenschutz und Datensicherheit (DuD), p.175-179
[Journal Article]


Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]


Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information and Computer Security, p.75-85
[Journal Article]


Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems
Demirel, Denise; Henning, Maria
Jusletter IT - Die Zeitschrift für IT und Recht
[Journal Article]


IT-Sicher­heits­forschung in Darmstadt - von den Grundlagen bis zur Anwendung
Kreutzer, Michael; Waidner, Michael; Buchmann, Johannes
Praxis der Informationsverarbeitung und Kommunikation, p.305-308
[Journal Article]


Physical Unclonable Functions: Sicher­heits­eigen­schaften und Anwendungen
Katzenbeisser, Stefan; Schaller, André
Datenschutz und Datensicherheit, p.881-885
[Journal Article]


A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
[Journal Article]


Secure Long-Term Record Keeping in the Public Sector
Langer, L.; Wiesmaier, A.; Buchmann, J.
eGovernment Review (Journal), Vol.7, p.14-15
[Journal Article]


In-packet Bloom filters: Design and networking applications
Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]


Eine kurze Geschichte der Schlüssel
Buchmann, J.; Wiesmaier, A.
360$^\circ$ — Fachmagazin für das Management im öffentlichen Sektor (Journal), Vol.17, p.21-23
[Journal Article]


Digital signierte Wägeresultate — Neue Wege in der Sicherung eichfähiger Messwerte
Rauchschwalbe, U.; Wiesmaier, A.; Ludwig, C.; Buchmann, J.
WDM — Wägen, Dosieren + Mischen (Journal), Vol.3, p.23-27
[Journal Article]


Life-Cycle Management of X.509 Certificates Based on LDAP Directories
Lippert, M.; Karatsiolis, E.; Wiesmaier, A.; Buchmann, J.
Journal of Computer Security, Vol.14, p.419-439
[Journal Article]