Publikationen

Publikationen

DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
Sprache: English
[Conference Proceedings]


Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
Sprache: English
[Journal Article]


Phishing detection on tor hidden services: Extended Abstract
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 8, 2021, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]


BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
Sprache: English
[Conference Proceedings]


Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
Sprache: English
[Journal Article]


Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
Sprache: English
[Conference Proceedings]


Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
Sprache: English
[Conference Proceedings]


FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
Crytography and Security
Sprache: English
[Journal Article]


Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 15, 2020, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]


Critical Traffic Analysis on the Tor Network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 15, 2020, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]


Cover-aware Steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
Sprache: English
[Journal Article, Electronic Publication]


Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Sprache: English
[Journal Article, Electronic Publication]


Cyber­sicher­heits­forschung als Teil der nationalen Sicherheitsarchitektur
Kreutzer, Michael; Schneider, Markus
Sprache: German
[Journal Article]


Detection of Fiber Defects Using Keypoints and Deep Learning
Siegmund, Dirk; Fu, Biying; José-García, Adán; Salahuddin, Ahmad Masood; Kuijper, Arjan
Sprache: English
[Journal Article]


Generalization of Fitness Exercise Recognition from Doppler Measurements by Domain-Adaption and Few-Shot Learning
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Pattern Recognition (ICPR) 25, 2021, Online>
Sprache: English
[Conference Paper]


Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
Sprache: English
[Journal Article]


Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
Sprache: English
[Conference Proceedings]


Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
Sprache: English
[Conference Proceedings]


Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
Sprache: English
[Journal Article]


Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
24th International Conference on Practice and Theory of Public-Key Cryptography
Sprache: English
[Conference Proceedings]


Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices
Wagner, Paul; Heid, Kris; Heider, Jens
International Conference on Information Systems Security and Privacy (ICISSP) 7, 2021, Online>
Sprache: English
[Conference Paper, Electronic Publication]


HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
Sprache: English
[Conference Proceedings]


Sustainable Solving: Reducing the Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection
Arzt, Steven
International Conference on Software Engineering (ICSE) 43, 2021, Online>
Sprache: English
[Conference Paper, Electronic Publication, Presentation]


RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
Sprache: English
[Journal Article]


Risiken für die Privatheit aufgrund von Maschinellem Lernen
Battis, Anna-Verena; Graner, Lukas
Gesellschaft für Informatik (GI Jahrestagung) 50, 2020, Online>
Sprache: German
[Conference Paper, Electronic Publication]


The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
Sprache: English
[Journal Article]


ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security'21)
Sprache: English
[Conference Proceedings]


All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
Sprache: English
[Conference Proceedings]


A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet
Schufrin, Marija; Reynolds, Steven Lamarr; Kuijper, Arjan; Kohlhammer, Jörn
Sprache: English
[Journal Article]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Conference Proceedings]