Publikationen

Publikationen

FIB efficiency in distributed platforms
Kogan, Kirill; Nikolenko, Sergey I.; Eugster, Patrick; Shalimov, Alexander; Rottenstreich, Ori
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-10
[Conference Proceedings]


An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]


DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]


Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]


AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]


Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]


A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]


Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]


Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
44th International Conference on Parallel Processing (ICPP 2015)
[Conference Proceedings]


TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks
Tancreti, Matthew; Sundaram, Vinaitheerthan; Bagchi, Saurabh; Eugster, Patrick
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, p.286-297
[Conference Proceedings]


HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award)
Arias, Orlando; Davi, Lucas; Hanreich, Matthias; Jin, Yier; Koeberl, Patrick; Paul, Debayan; Sadeghi, Ahmad-Reza; Sullivan, Dean
52nd Design Automation Conference (DAC)
[Conference Proceedings]


Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths
Lerch, Johannes; Späth, Johannes; Bodden, Eric; Mezini, Mira
Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.619-629
[Conference Proceedings]


Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, Nadarajah
Financial Cryptography and Data Security
[Conference Proceedings]


Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
International Workshop on Pervasive Networks for Emergency Management (PerNEM)
[Conference Proceedings]


Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot
Hasan, T.; Kikiras, Panayotis; Leonardi, Alessandro; Ziekow, Holger; Daubert, Jörg
Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), p.1-10
[Conference Proceedings]


A View on Privacy & Trust in IoT
Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis
IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), p.2665-2670
[Conference Proceedings]


End-2-End Privacy Architecture for IoT
Funke, Sebastian; Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis; Mühlhäuser, Max
IEEE Conference on Communications and Network Security (CNS)
[Conference Proceedings]


An Automatic Inference of Minimal Security Types
Bollmann, Dominik; Lortz, Steffen; Mantel, Heiko; Starostin, Artem
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
[Conference Proceedings]


Towards Secure Integration of Cryptographic Software
Arzt, Steven; Nadi, Sarah; Ali, Karim; Bodden, Eric; Erdweg, Sebastian; Mezini, Mira
OOPSLA Onward!
[Conference Proceedings]


Authenticated Key Exchange from Ideal Lattices
Zhang, Jiang; Zhang, Zhenfeng; Ding, Jintai; Snook, Michael; Dagdelen, Özgür
EUROCRYPT 2015
[Conference Proceedings]


Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, p.647-655
[Conference Proceedings]


Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -
Sadeghi, Ahmad-Reza; Davi, Lucas; Larsen, Per
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]


I know where you are: Proofs of Presence resilient to malicious provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference Proceedings]


Time to Rethink: Trust Brokerage using Trusted Execution Environments
Koeberl, Patrick; Phegade, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
8. International Conference on Trust and Trustworthy Computing (TRUST'15), p.181-190
[Conference Proceedings]


On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
Codes, Cryptology and Information Security
[Conference Proceedings]


Lattice Basis Reduction Attack against Physically Unclonable Functions
Ganji, Fatemeh; Krämer, Juliane; Seifert, Jean-Pierre; Tajik, Shahin
22nd ACM Conference on Computer and Communications Security (CCS 2015)
[Conference Proceedings]


A Distributed Reputation System for Certification Authority Trust Management
Classen, Jiska; Braun, Johannes; Volk, Florian; Hollick, Matthias; Buchmann, Johannes; Mühlhäuser, Max
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
[Conference Proceedings]


A Guide to End-to-End Privacy Accountability
Butin, Denis; Métayer, Daniel Le
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015)
[Conference Proceedings]