Publikationen

Publikationen

Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Fischlin, Marc; Günther, Felix
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.12
[Conference Proceedings]


Positive but skeptical - A study of attitudes towards Internet voting in Sweden
Faraon, Montathar; Stenberg, Georg J. H.; Budurushi, Jurlind; Kaipainen, Mauri
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, p.191-205
[Conference Proceedings]


Fast, Expressive Top-k Matching
Culhane, William; Jayaram, K. R.; Eugster, Patrick
Proceedings of the 15th International Middleware Conference, p.73-84
[Conference Proceedings]


Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Brzuska, Christina; Mittelbach, Arno
Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., p.142-161
[Conference Proceedings]


Hot-Hardening: Getting More Out of Your Security Settings
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Proceedings of the 30th Annual Computer Security Applications Conference, p.6-15
[Conference Proceedings]


How to Avoid the Breakdown of Public Key Infrastructures – Forward Secure Signatures for Certificate Authorities
J. Braun and A. Hülsing and A. Wiesmaier and M. Vigil and J. Buchmann
9th European PKI Workshop: Research and Applications (EuroPKI 2012), p.53–58
[Conference Proceedings]


On the Security of Encrypted Secret Sharing
J. Braun and A. Wiesmaier and J. Buchmann
46th Hawaii International Conference on System Sciences (HICSS-46), p.4966–4975
[Conference Proceedings]


Privacy for Smart Metering Ecosystems
P. Ebinger and J. L. Hernández Ramos and P. Kikiras and M. Lischka and A. Wiesmaier
First Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec12), p.120–131
[Conference Proceedings]


Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis
M. Horsch and D. Hühnlein and C. Breitenstrom and T. Wieland and A. Wiesmaier and B. Biallowons and D. Petrautzki and S. Potzernheim and J. Schmölz and A. Wesner and T. Wich
Informationssicherheit stärken – Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.391–403
[Conference Proceedings]


Multi Domain Information Architecture and Modeling for Smart Grids
A. Chandra-Sekaran and A. Wiesmaier and A. Hessler
Innovative Smart Grid Technologies — Asia (ISGT Asia), 2013 IEEE, p.1–6
[Conference Proceedings]


Automatic Protocol Selection in Secure Two-Party Computations
Kerschbaum, Florian; Schneider, Thomas; Schröpfer, Axel
20th Network and Distributed System Security Symposium (NDSS'13)
[Conference Proceedings]


Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor
Northrop, Erik; Lipford, Heather Richter; Bartsch, Steffen; Volkamer, Melanie
[Conference Proceedings]


Poster: On the Usability of Secure GUIs
Nas, Aysegül; Filyanov, Atanas; Volkamer, Melanie; Winandy, Marcel
[Conference Proceedings]


The use of linguistics in cryptography and its application to improve the HB protocol
Gutmann, Andreas; Matsuura, Kanta
Computer Security Symposium 2013, p.518-525
[Conference Proceedings]


A Comparison of American and German Folk Models of Home Computer Security
Kauer, Michaela; Günther, Sebastian; Storck, Daniel; Volkamer, Melanie
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, p.100-109
[Conference Proceedings]


Contextualized Web warnings, and how they cause distrust
Bartsch, Steffen; Volkamer, Melanie; Theuerling, Heike; Karayumak, Fatih
Trust and Trustworthy Computing (TRUST 2013), p.205-222
[Conference Proceedings]


Vertrauenswürdige Smartphones: Tech­no­logien und Lösungen
Alkassar, Ammar; Heuser, Stephan; Stüble, Christian
13. Deutscher IT-Sicherheitskongress
[Conference Proceedings]


PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award)
Werthmann, Tim; Hund, Ralf; Davi, Lucas; Sadeghi, Ahmad-Reza; Holz, Thorsten
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Conference Proceedings]


A User-Centric Digital Signature Scheme
Werlang, Felipe; Vigil, Martín; Custódio, Ricardo Felipe
EuroPKI 2013
[Conference Proceedings]


Sieving for Shortest Vectors in Ideal Lattices
Schneider, Michael
Africa Crypt 2013
[Conference Proceedings]


Developing and Testing a Visual Hash Scheme
Olembo, Maina; Stockhardt, Simon; Hülsing, Andreas; Volkamer, Melanie
European Information Security Multi-Conference (EISMC 2013), p.91-100
[Conference Proceedings]


Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme
Nie, Xuyun; Xu, Zhaohu; Buchmann, Johannes
Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, p.155-164
[Conference Proceedings]


Cryptanalysis of 2-layer Nonlinear Piece In Hand Method
Nie, Xuyun; Petzoldt, Albrecht; Buchmann, Johannes
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, p.91-104
[Conference Proceedings]


WOTS+ - Shorter Signatures for Hash-Based Signature Schemes
Hülsing, Andreas
Africa Crypt 2013
[Conference Proceedings]


A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces
Habib, Sheikh Mahbub; Varadharajan, Vijay; Mühlhäuser, Max
Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC'13)
[Conference Proceedings]


Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass
Ghiglieri, Marco; Kalabis, Lukas; Kelm, David
13. Deutschen IT-Sicherheitskongress
[Conference Proceedings]


A Polynomial Time Version of LLL With Deep Insertions
Fontein, Felix; Schneider, Michael; Wagner, Urs
International Workshop on Coding and Cryptography - WCC 2013
[Conference Proceedings]


Prêt à Voter Providing Everlasting Privacy
Demirel, Denise; Henning, Maria; Graaf, Jeroen van de; Ryan, Peter Y. A.; Buchmann, Johannes
VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, p.156-175
[Conference Proceedings]


The Fiat-Shamir Transformation in the Quantum World
Dagdelen, Özgür; Fischlin, Marc; Gagliardoni, Tommaso
ASIACRYPT 2013
[Conference Proceedings]


k-anonymous reputation
Clauß, Sebastian; Schiffner, Stefan; Kerschbaum, Florian
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, p.359-368
[Conference Proceedings]