Publikationen

Publikationen

AWESOME - Automated web emulation for secure operation of a malware-analysis environment

Brunner, Martin; Fuchs, Christian; Todt, Sascha
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) <6, 2012, Rome>
Sprache: English
[Conference Paper]

Automatisches Erkennen mobiler Angriffe auf die IT-Infrastruktur

Detken, Kai-Oliver; Scheuermann, Dirk; Bente, Ingo; Westerkamp, Jürgen
Arbeitskonferenz D-A-CH Security <2012, Konstanz>
Sprache: German
[Conference Paper, Electronic Publication]

Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters

Bißmeyer, Norbert; Mauthofer, Sebastian; Bayarou, Kpatcha M.; Kargl, Frank
Vehicular Networking Conference (VNC) <2012, Seoul>
Sprache: English
[Conference Paper, Electronic Publication]

Architecting a security strategy measurement and management system

Rieke, R.; Schütte, J.; Hutchison, A.
Model-Driven Security Workshop (MDsec) <1, 2012, Innsbruck>
Sprache: English
[Conference Paper]

22. SIT-Smartcard Workshop 2012. Tagungsband: 8. und 9. Februar 2012, IHK Darmstadt

Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
SmartCard Workshop <22, 2012, Darmstadt>
Sprache: German
[Conference Proceedings]

Towards a Trust Management System for Cloud Computing

Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
Sprache: English
[Conference Proceedings]

An efficient mobile PACE implementation

Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]

In-packet Bloom filters: Design and networking applications

Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]

Mobile Authentisierung und Signatur

Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]

AmazonIA: When Elasticity Snaps Back

Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
18. ACM Conference on Computer and Communications Security (CCS'11), p.389-400
Sprache: English
[Conference Proceedings]

Towards a Trust Management System for Cloud Computing

Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Sprache: English
[Conference Proceedings]

Werte schützen, Kosten senken, Erträge steigern: Beispiele für die Wirtschaftlichkeit von Informationssicherheit; White Paper

Stöwer, Mechthild
Sprache: German
[Report, Electronic Publication]

Ubiquitous personal information management

Heider, Jens
Sprache: English
[Dissertation, Electronic Publication]

TruWalletM: Secure web authentication on mobile platforms

Bugiel, S.; Dmitrienko, A.; Kostiainen, K.; Sadeghi, A.-R.; Winandy, M.
International Conference on Trusted Systems (INTRUST) <2, 2010, Beijing>
Sprache: English
[Conference Paper]

Trustworthiness in Peer-to-Peer Communication for Commercial Applications

Korn, Roman; Kuntze, Nicolai
Deutscher IT-Sicherheitskongress <12, 2011, Bonn>
Sprache: English
[Conference Paper]

Trusted virtual domains on OKL4: Secure information sharing on smartphones

Davi, L.; Dmitrienko, A.; Kowalski, C.; Winandy, M.
Workshop on Scalable Trusted Computing (STC) <6, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]

Trust and trustworthy computing. 4th inter­national conference, TRUST 2011. Proceedings: Pittsburgh, PA, USA, June 22-24, 2011

McCune, J.M.; Balacheff, B.; Perrig, A.; Sadeghi, A.-R.; Sasse, A.; Beres, Y.
International Conference on Trust and Trustworthy Computing (TRUST) <4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Proceedings]

Trends in eID security public sector view

Eckert, C.; Herfert, M.; Waldmann, U.
Sprache: English
[Book Article]

Towards permission-based attestation for the android platform. Short paper

Bente, I.; Dreo, G.; Hellmann, B.; Heuser, S.; Vieweg, J.; Helden, J. von; Westhuis, J.
International Conference on Trust and Trustworthy Computing (TRUST) <4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]

Towards a holistic privacy engineering approach for smart grid systems

Fhom, H.S.; Bayarou, K.M.
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) <10, 2011, Changsha/China>
Sprache: English
[Conference Paper]

Structured derivation of semi-synchronous algorithms

Attiya, H.; Borran, F.; Hutle, M.; Milosevic, Z.; Schiper, A.
International Symposium on Distributed Computing (DISC) <25, 2011, Roma>
Sprache: English
[Conference Paper]

Special Issue on security and dependability assurance of software architectures. Editorial

Damiani, E.; Gürgens, S.; Mana, A.; Spanoudakis, G.; Ardagna, C.A.
Sprache: English
[Journal Article]

Si­mu­la­tion of attacks and corresponding driver behavior in vehicular ad hoc networks with VSimRTI

Bißmeyer, Norbert; Schünemann, Björn; Radusch, Ilja; Schmidt, Christian
International Conference on Si­mu­la­tion Tools and Techniques (SIMUTools) <4, 2011, Barcelona>
Sprache: English
[Conference Paper]

Side-channel analysis of PUFs and fuzzy extractors

Merli, D.; Schuster, D.; Stumpf, F.; Sigl, G.
International Conference on Trust and Trustworthy Computing (TRUST) <4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Paper, Electronic Publication]

Sicherheitsverwalter. Management-Werkzeuge für die Informationssicherheit

Eichler, J.; Bona-Stecki, M.; Wiezcorek, T.
Sprache: German
[Journal Article]

Short paper: Lightweight remote attestation using physical functions

Sadeghi, A.-R.; Schulz, S.; Wachsmann, C.
Conference on Wireless Network Security (WiSec) <4, 11, Hamburg>
Sprache: English
[Conference Paper]

Sender scorecards

Schmidt, A.; Leicher, A.; Shah, Y.; Cha, I.; Guccione, L.
Sprache: English
[Journal Article]

Security properties of self-similar uniformly parameterised systems of cooperations

Ochsenschläger, P.; Rieke, R.
International Euromicro Conference on Parallel, Distributed, and Network-Based Processing (PDP) <19, 2011, Ayia Napa>
Sprache: English
[Conference Paper]

A security architecture for accessing health records on mobile phones

Dmitrienko, A.; Hadzic, Z.; Löhr, H.; Winandy, M.; Sadeghi, A.-R.
International Conference on Health Informatics (HEALTHINF) <2011, Rome>
Sprache: English
[Conference Paper]

Secure digital chains of evidence

Kuntze, N.; Rudolph, C.
IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) <6, 2011, Oakland/Calif.>
Sprache: English
[Conference Paper]