An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Bansarkhani, Rachid El; Sturm, Jan
15th International Conference on Cryptology and Network Security - CANS 2016
[Conference Proceedings]

DNSSEC Misconfigurations in Popular Domains
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Cryptology and Network Security. CANS 2016
[Conference Proceedings]

Scalable Secure Computation from ANSI-C
Buescher, Niklas; Kretzmer, David; Jindal, Arnav; Katzenbeisser, Stefan
WIFS - IEEE International Workshop on Information Forensics and Security
[Conference Proceedings]

AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Traverso, Giulia; Demirel, Denise; Habib, Sheikh Mahbub; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]

Programming Scalable Cloud Services with AEON
Sang, Bo; Petri, Gustavo; Ardekani, Masoud Saeida; Ravi, Srivatsan; Eugster, Patrick
Middleware '16 Proceedings of the 17th International Middleware Conference, p.16:1
[Conference Proceedings]

Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, Peter; Berket, Hermann; Volkamer, Melanie
International Conference on Passwords
[Conference Proceedings]

The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, Paul; Renaud, Karen; Volkamer, Melanie
>Journal of Information Security and Applications, p.8-26
[Journal Article]

A security analysis of techniques for long-term integrity protection
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
2016 Privacy, Security and Trust Conference
[Conference Proceedings]

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks
Garcia Cordero, Carlos; Hauke, Sascha; Mühlhäuser, Max; Fischer, Mathias
Privacy, Security and Trust Conference, p.317 - 324
[Conference Proceedings]

Efficient Proactive Secret Sharing
Brendel, Jacqueline; Demirel, Denise
2016 Privacy, Security and Trust Conference
[Conference Proceedings]

AnonDrop – Räumlich begrenzte anonyme Informationsverbreitung
Zeier, Alexander; Heinemann, Andreas
D-A-CH Security 2016 Tagungsband, p.241-252
[Conference Proceedings]

Security-Management-as-a-Service für die öffentliche Verwaltung
Heinemann, Andreas; Kern, Fabian; Lange, Steffen; Margraf, Marian; Otterbein, Florian
D-A-CH Security 2016 Tagungsband. SECMGT Workshop
[Conference Proceedings]

Zur Benutzbarkeit der AusweisApp2
Willomitzer, Jörg; Heinemann, Andreas; Margraf, Marian
Mensch und Computer 2016 – Workshopband
[Conference Proceedings]

Personalized face reference from video: Key-face selection and feature-level fusion
Damer, Naser; Samartzidis, Timotheos; Nouak, Alexander
International Workshop on Face and Facial Expression Recognition from Real World Videos (FFER) 2014
[Conference Paper]

Weighted integration of neighbors distance ratio in multi-biometric fusion
Damer, Naser; Nouak, Alexander
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG International Conference) 2015
[Conference Paper]

Fuzzy logic and multi-biometric fusion
Maul, Fabian; Damer, Naser
International Conference on Pattern Recognition Applications and Methods (ICPRAM) 2015
[Conference Paper]

Robust 2D face recognition under different illuminations using binarized partial face features: Towards protecting ID documents
Butt, Moazzam; Alkhatib, Wael
International Workshop on Computational Forensics (IWCF) 2012
[Conference Paper]

Stream ciphers in the IoT: Grain and Trivium
Lennart Diedrich, Lulzim Murati, Alex Wiesmaier

Comparing Lightweight Hash Functions — PHOTON \& Quark
Schmidt, Larissa; Meuser, Tobias; Wiesmaier, Alexander

Block ciphers PRESENT and SEA in comparison
Tobias Kußmaul, Johannes Löffer, Alex Wiesmaier

Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP
Mariano, Artur; Laarhoven, Thijs; Bischof, Christian
44th International Conference on Parallel Processing (ICPP 2015)
[Conference Proceedings]

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, Oksana; Neumann, Stephan; Budurushi, Jurlind; Volkamer, Melanie; Haenni, Rolf; Koenig, Reto; Bergen, Philemon von
Cryptology ePrint Archive, p.1-19
[Journal Article]

TESLA: Tightly-Secure Efficient Signatures from Standard Lattices
Alkim, Erdem; Bindel, Nina; Buchmann, Johannes; Dagdelen, Özgür; Schwabe, Peter
Cryptology ePrints Archive, p.1-24
[Journal Article]

IoT: Challenges, Projects, Architectures
Gazis, "Vangelis; Goertz, Manuel; Huber, Marco; Leonardi, Alessandro; Mathioudakis, Kostas; Wiesmaier, Alexander; Zeiger", Florian
"18th International Conference on Intelligence in Next Generation Networks (ICIN)", p.145-147
[Conference Proceedings]

Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
Vigil, M.; Buchmann, J.; Cabarcas, D.; Weinert, C.; Wiesmaier, A.
Computer \& Security (Journal), Vol.50, p.16-32
[Journal Article]

Security Perspectives for Collaborative Data Acquisition in the Internet of Things
Gazis, Vangelis; Cordero, Carlos Garcia; Vasilomanolakis, Emmanouil; Kikiras, Panayotis; Wiesmaier, Alex
Internet of Things. IoT Infrastructures — IoT360 / SaSeIoT 2014, p.271-282

A View on Privacy \& Trust in IoT
Daubert, J.; Wiesmaier, A.; Kikiras, P.
IEEE ICC 2015 — First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC), p.2665-2670
[Conference Proceedings]

A Survey of Technologies for the Internet of Things
Gazis, Vangelis; Goertz, Manuel; Huber, Marco; Leonardi, Alessandro; Mathioudakis, Kostas; Vasilomanolakis, Emmanouil; Wiesmaier, Alexander; Zeiger, Florian
2015 International Wireless Communications \& Mobile Computing Conference (IWCMC), p.1090-1095
[Conference Proceedings]

Decision-making criteria for cyber security adoption: Internet of Things privacy and cyber security issues
Lukavchenko, Alexandra; Rajasekaran, Hariharan; Wiesmaier, Alexander; Kikiras, Panayotis
10th Future Security Conference 2015 (Future Security 2015), p.245-252
[Conference Proceedings]

End-2-End Privacy Architecture for IoT
Funke, S.; Daubert, J.; Wiesmaier, A.; Kikiras, P.; Mühlhäuser, M.
Third IEEE Conference on Communications and Network Security (CNS 2015), p.705-706
[Conference Proceedings]