Publikationen
Publikationen
SANA: Secure and Scalable Aggregate Network Attestation
Sadeghi, Ahmad-Reza; Schunter, Matthias; Ibrahim, Ahmad; Conti, Mauro; Neven, Gregory
23rd ACM Conference on Computer and Communications Security (CCS) 2016
[Conference Proceedings]
Analyzing TETRA Location Privacy and Network Availability
Pfeiffer, Martin; Kwiotek, Jan-Pascal; Classen, Jiska; Klose, Robin; Hollick, Matthias
6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, p.117--122
[Conference Proceedings]
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817-1819
[Conference Proceedings]
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, Peter; Neumann, Stephan; Volkamer, Melanie
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, p.1817--1819
[Conference Proceedings]
Stratum Filtering: Cloud-Based Detection of Attack Sources
Herzberg, Amir; Shulman, Haya; Waidner, Michael
ACM Cloud Computing Security Workshop (CCSW)
[Conference Proceedings]
SecureScala: Scala embedding of secure computations
Hauck, Markus; Savvides, Savvas; Eugster, Patrick; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala
[Conference Proceedings]
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Deshotels, Luke; Deaconescu, Razvan; Chiroiu, Mihai; Davi, Lucas; Enck, William; Sadeghi, Ahmad-Reza
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection
Baumann, Peter; Katzenbeisser, Stefan; Stopczynski, Martin; Tews, Erik
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, p.37-46
[Conference Proceedings]
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Abera, Tigist; Asokan, N.; Davi, Lucas; Ekberg, Jan-Erik; Nyman, Thomas; Paverd, Andrew; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference Proceedings]
WebRanz: web page randomization for better advertisement delivery and web-bot prevention
Wang, Weihang; Zheng, Yunhui; Xing, Xinyu; Kwon, Yonghwi; Zhang, Xiangyu; Eugster, Patrick
FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, p.205-216
[Conference Proceedings]
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds
Wang, Lin; Jiao, Lei; Kliazovich, Dzmitry; Bouvry, Pascal
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-6
[Conference Proceedings]
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Sullivan, Dean; Arias, Orlando; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
Black Hat Europe
[Conference Proceedings]
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper)
Nobach, Leonhard; Rimac, I.; Hilt, V.; Hausheer, David
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-2
[Conference Proceedings]
FIB efficiency in distributed platforms
Kogan, Kirill; Nikolenko, Sergey I.; Eugster, Patrick; Shalimov, Alexander; Rottenstreich, Ori
2016 IEEE 24th International Conference on Network Protocols (ICNP), p.1-10
[Conference Proceedings]
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]
DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]
Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]
Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]
A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]
Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]
IoT: Challenges, Projects, Architectures
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger
18th International Conference on Intelligence in Next Generation Networks (ICIN), p.145–147
[Conference Proceedings]
A View on Privacy & Trust in IoT
J. Daubert and A. Wiesmaier and P. Kikiras
IEEE ICC 2015 – First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665–2670
[Conference Proceedings]
A Survey of Technologies for the Internet of Things
V. Gazis and M. Görtz and M. Huber and A. Leonardi and K. Mathioudakis and A. Wiesmaier and F. Zeiger and E. Vasilomanolakis
2015 International Wireless Communications & Mobile Computing Conference (IWCMC), p.1090–1095
[Conference Proceedings]
End-2-End Privacy Architecture for IoT
S. Funke and J. Daubert and A. Wiesmaier and P. Kikiras and M. Mühlhäuser
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705–706
[Conference Proceedings]
Towards Bloom Filter-based Indexing of Iris Biometric Data
C. Rathgeb and F. Breitinger and H. Baier and C. Busch
2015 Intl. Conf. on Biometrics (ICB), p.1–8
[Conference Proceedings]
Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander
International Workshop on Face and Facial Expression Recognition from Real World Videos (FFER) 2014
[Conference Paper]
Weighted integration of neighbors distance ratio in multi-biometric fusion
Damer, Naser; Nouak, Alexander
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2015
[Conference Paper]


