Publikationen

Publikationen

A View on Privacy \& Trust in IoT
Daubert, J.; Wiesmaier, A.; Kikiras, P.
IEEE ICC 2015 — First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665-2670
[Conference Proceedings]

A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet
Schufrin, Marija; Reynolds, Steven Lamarr; Kuijper, Arjan; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) <17, 2020, Online>
Sprache: English
[Conference Paper]

A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet
Schufrin, Marija; Reynolds, Steven Lamarr; Kuijper, Arjan; Kohlhammer, Jörn
Sprache: English
[Journal Article]

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
22. Annual Network and Distributed System Security Symposium (NDSS'15)
Sprache: English
[Conference Proceedings]

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security'21)
Sprache: English
[Conference Proceedings]

ACCEPT - Anomaliemanagement in Com­pu­ter­sy­stemen durch Complex Event Processing Technologie: Schlussbericht ACCEPT-Projekt; Berichtszeitraum: 01. April 2012 - 31. März 2015
Rieke, Roland
Sprache: German
[Report]

Access control and data separation metrics in cloud infrastructures
Jaeger, B.; Kraft, R.; Luhn, S.; Selzer, A.; Waldmann, U.
International Conference on Availability, Reliability and Security (ARES) <11, 2016, Salzburg>
Sprache: English
[Conference Paper]

Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths
Lerch, Johannes; Späth, Johannes; Bodden, Eric; Mezini, Mira
Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.619-629
Sprache: English
[Conference Proceedings]

Access-path abstraction: Scaling field-sensitive data-flow analysis with unbounded access paths
Lerch, Johannes; Späth, Johannes; Bodden, Eric; Mezini, Mira
International Conference on Automated Software Engineering (ASE) <30, 2015, Lincoln/Nebraska>
Sprache: English
[Conference Paper]

ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, Karen; Volkamer, Melanie; Maguire, Joseph
Human Aspects of Information Security, Privacy, and Trust, p.183-194
Sprache: English
[Conference Proceedings]

Accessing Dual Use in IT Development
Riebe, Thea; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Sprache: English
[Conference Proceedings]

Accuracy Evaluation of Handwritten Signature Verification: Rethinking the Random-Skilled Forgeries Dichotomy
Galbally, J.; Gomez-Barrero, M.; Ross, A.
Proc. Int. Joint Conf. on Biometrics (IJCB)
[Conference Proceedings]

Achieving Facial De-Identification by Taking Advantage of the Latent Space of Generative Adversial Networks
Frick, Raphael Antonius; Steinebach, Martin
Gesellschaft für Informatik (GI Jahrestagung) <51, 2021, Berlin; Online>
Sprache: English
[Conference Paper]

Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication
Putz, Florentin; Álvarez, Flor; Classen, Jiska
WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Sprache: English
[Conference Proceedings]

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
23. USENIX Security Symposium (USENIX Security'14)
Sprache: English
[Conference Proceedings]

Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices
Palacios, Joan; Steinmetzer, Daniel; Loch, Adrian; Hollick, Matthias; Widmer, Joerg
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking
Sprache: English
[Conference Proceedings]

Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures
Dessouky, Ghada; Klaiber, Michael J.; Bailey, Donald G.; Simon, Svenja
24th International Conference on Field Programmable Logic and Applications (FPL)
Sprache: English
[Conference Proceedings]

Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited
Peter, Andreas; Kronberg, M.; Trei, W.; Katzenbeisser, Stefan
International Conference on Information Security (ISC 2012), p.242-257
Sprache: German
[Conference Proceedings]

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity
Rudd, Robert; Skowyra, Richard; Bigelow, David; Dedhia, Veer; Hobson, Thomas; Crane, Stephen; Liebchen, Christopher; Larsen, Per; Davi, Lucas; Franz, Michael; Sadeghi, Ahmad-Reza; Okhravi, Hamed
24th Annual Network & Distributed System Security Symposium (NDSS)
Sprache: German
[Conference Proceedings]

Addressing Industry 4.0 Security by Software-Defined Networking
Khondoker, Rahamatullah; Larbig, Pedro; Scheuermann, Dirk; Weber, Frank; Bayarou, Kpatcha
Sprache: English
[Book Article]

Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
Sprache: English
[Conference Proceedings]

Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, Melanie; Stockhardt, Simon; Bartsch, Steffen; Kauer, Michaela
3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, p.46-52
Sprache: English
[Conference Proceedings]

Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey
Grinko, Margarita; Kaufhold, Marc-André; Reuter, Christian
MuC'19: Proceedings of Mensch und Computer 2019
Sprache: English
[Conference Proceedings]

Advanced multimedia file carving
Yannikos, York; Steinebach, Martin; Martin, Zumudzinski; Winter, Christian
Sprache: English
[Book Article]

Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
Sprache: English
[Conference Proceedings]

Advanced remote firmware upgrades using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
International Conference on ICT Systems Security and Privacy Protection (SEC) <31, 2016, Ghent>
Sprache: English
[Conference Paper]

Advanced Remote Firmware Upgrades Using TPM 2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 31th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]

Advanced security service certificate for SOA: Certified services go digital!
Pazzaglia, J.-C.; Lotz, V.; Campos Cerda, V.; Damiani, E.; Ardagna, C.; Giirgens, S.; Maña, A.; Pandolfo, C.; Spanoudakis, G.; Guida, E.; Menicocci, R.
Information Security Solutions Europe Conference (ISSE) <12, 2010, Berlin>
Sprache: English
[Conference Paper]

Advances and Throwbacks in Hardware-assisted Security: Special Session
Brasser, Ferdinand; Davi, Lucas; Dhavlle, Abhijitt; Frassetto, Tommaso; Dinakarrao, Sai Manoj Pudukotai; Rafatirad, Setareh; Sadeghi, Ahmad-Reza; Sasan, Avesta; Sayadi, Hossein; Zeitouni, Shaza; Homayoun, Houman
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
Sprache: English
[Conference Proceedings]

Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, Oksana; Reinheimer, Benjamin; Gerber, Paul; Volk, Florian; Volkamer, Melanie; Mühlhäuser, Max
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), p.562-569
Sprache: German
[Conference Proceedings]