Publikationen

Publikationen

The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, Michael; Volkamer, Melanie
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, p.410-418
Sprache: English
[Conference Proceedings]


Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria
Olembo, Maina; Volkamer, Melanie
Sprache: English
[Report]


Malacoda: towards high-level compilation of network security applications on reconfigurable hardware
Mühlbach, Sascha; Koch, Andreas
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, p.247-258
Sprache: German
[Conference Proceedings]


Decoupling Authentication from the Usage of Services
Horsch, Moritz; Braun, Johannes; Wiesmaier, Alexander
Sprache: 1
[Report]


Secure Two-Party Computations in ANSI C
Holzer, Andreas; Franz, Martin; Katzenbeisser, Stefan; Veith, Helmut
Conference on Computer and Communications Security (CCS 2012), p.772-783
Sprache: German
[Conference Proceedings]


iPIN and mTAN for secure eID applications
Braun, Johannes; Horsch, Moritz; Wiesmaier, Alexander
8th International Conference on Information Security Practice and Experience (ISPEC 2012), p.259-276
Sprache: English
[Conference Proceedings]


Cleaning up the PKI for Long-term Signatures
Vigil, Martín; Custódio, Ricardo Felipe
12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, p.140-153
Sprache: 1
[Conference Proceedings]


Smart Home Dashboard – Das intelligente Energiemanagement
Stopczynski, Martin; Ghiglieri, Marco
VDE KONGRESS 2012 Smart Grid
Sprache: German
[Conference Proceedings]


IT-Sicher­heits­forschung in Darmstadt - von den Grundlagen bis zur Anwendung
Kreutzer, Michael; Waidner, Michael; Buchmann, Johannes
Praxis der Informationsverarbeitung und Kommunikation, p.305-308
Sprache: German
[Journal Article]


myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android
Bugiel, Sven; Heuser, Stephan; Sadeghi, Ahmad-Reza
Sprache: German
[Report]


Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware
Bugiel, Sven; Heuser, Stephan; Sadeghi, Ahmad-Reza
Sprache: German
[Report]


Privacy-Preserving Architecture for Forensic Image Recognition
Peter, Andreas; Hartmann, T.; Müller, S.; Katzenbeisser, Stefan
International Workshop on Information Forensics and Security (WIFS 2012), p.79-84
Sprache: German
[Conference Proceedings]


Physical Unclonable Functions: Sicher­heits­eigen­schaften und Anwendungen
Katzenbeisser, Stefan; Schaller, André
Datenschutz und Datensicherheit, p.881-885
Sprache: German
[Journal Article]


A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
Sprache: 1
[Journal Article]


Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication
Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Sadeghi, Ahmad-Reza
BlackHat Abu Dhabi
Sprache: German
[Conference Proceedings]


Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen
Braun, Johannes; Hülsing, Andreas; Wiesmaier, Alexander
Sprache: German
[Report]


Warum Googles Datensammeln gar nicht so böse ist
Türpe, Sven
Sprache: German
[Report, Electronic Publication]


Vulnerabilities through usability pitfalls in cloud services: Security problems due to unverified email addresses
Hahn, T.; Kunz, T.; Schneider, M.; Vowe, S.
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 11, 2012, Liverpool>
Sprache: English
[Conference Paper]


Virtual private networks for peer-to-peer infrastructures
Dudani, Hiro
Sprache: English
[Thesis, Electronic Publication]


Verantwortung: Smartphone: Editorial
Heider, Jens
Sprache: German
[Journal Article]


Untersuchung von reputationsbasierten Schutzmechanismen gegen Malware-Angriffe in Browsern
Czajkowski, Katja; Schneider, Markus; Wolf, Ruben; Yannikos, York; Waidner, Michael (Hrsg.)
Sprache: German
[Report]


Trusted service access with dynamic security infrastructure configuration
Marx, R.; Kuntze, N.; Rudolph, C.; Bente, I.; Vieweg, J.
Asia-Pacific Conference on Communications (APCC) 18, 2012, Jeju/South Korea>
Sprache: English
[Conference Paper]


A Trusted Information Agent for Security Information and Event Management
Coppolino, Luigi; Jäger, Michael; Kuntze, Nicolai; Rieke, Roland
International Conference on Systems (ICONS) 7, 2012, Saint Gilles>
Sprache: English
[Conference Paper]


Trust areas: A security paradigm for the future Internet
Rudolph, C.
International Workshop on Security and Trust Management (STM) 7, 2011, Copenhagen>
Sprache: English
[Conference Paper]


Towards a security engineering process model for electronic business processes: Presentation held at EDCC 2012, European Dependable Computing Conference
Eichler, Jörn
European Dependable Computing Conference (EDCC) 9, 2012, Sibiu/Romania>
Sprache: English
[Presentation, Electronic Publication]


Tetherway: A framework for tethering camouflage
Schulz, S.; Sadeghi, A.-R.; Zhdanova, M.; Mustafa, H.A.; Xu, W.; Varadharajan, V.
ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 5, 2012, Tucson>
Sprache: English
[Conference Paper]


Synthetic data creation for forensic tool testing: Improving performance of the 3LSPG framework
Yannikos, Y.; Winter, C.; Schneider, M.
International Conference on Availability, Reliability and Security (ARES) 7, 2012, Prague>
Sprache: English
[Conference Paper]


Softer smartcards usable cryptographic tokens with secure execution
Brasser, F.F.; Bugiel, S.; Filyanov, A.; Sadeghi, A.-R.; Schulz, S.
International Conference on Financial Cryptography and Data Security (FC) 16, 2012, Kralendijk, Bonaire>
Sprache: English
[Conference Paper]


SmartTokens: Delegable access control with NFC-enabled smartphones
Dmitrienko, A.; Sadeghi, A.-R.; Tamrakar, S.; Wachsmann, C.
International Conference on Trust and Trustworthy Computing (TRUST) 5, 2012, Wien>
Sprache: English
[Conference Paper]


Si­mu­la­tion Environment (SE) for mobile Virtualized Security Appliances (VSA)
Detken, K.-O.; Oberle, A.; Kuntze, N.; Eren, E.
International Symposium on Wireless Systems (SWS) 1, 2012, Offenburg>
Sprache: English
[Conference Paper, Electronic Publication]