Publikationen
Publikationen
DEMO: BTLEmap: Nmap for Bluetooth Low Energy
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20)
Sprache: English
[Conference Proceedings]
Linking loose ends: An interdisciplinary privacy and communication model
Bräunlich, Katharina; Dienlin, Tobias; Eichenhofer, Johannes; Helm, Paula; Trepte, Sabine; Grimm, Rüdiger; Seubert, Sandra; Gusy, Christoph
Sprache: English
[Journal Article]
Phishing detection on tor hidden services: Extended Abstract
Steinebach, Martin; Zenglein, Sascha; Brandl, Katharina
European Digital Forensics Research Workshop (DFRWS) 8, 2021, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature
Cremers, Cas; Düzlü, Samed; Fiedler, Rune; Fischlin, Marc; Janson, Christian
42nd IEEE Symposium on Security and Privacy
Sprache: English
[Conference Proceedings]
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems
Haase, Thorsten; Alber, Gernot; Stojanovic, Vladimir M.
Physical Review A
Sprache: English
[Journal Article]
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
Faust, Sebastian; Hazay, Carmit; Kretzler, David; Schlosser, Benjamin
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021)
Sprache: English
[Conference Proceedings]
Trusted Configuration in Cloud FPGAs
Zeitouni, Shaza; Vliegen, Jo; Frassetto, Tommaso; Koch, Dirk; Sadeghi, Ahmad-Reza; Mentens, Nele
29th IEEE International Symposium on Field-Programmable Custom Computing Machines
Sprache: English
[Conference Proceedings]
FLGUARD: Secure and Private Federated Learning
Nguyen, Thien Duc; Rieger, Phillip; Yalame, Mohammad Hossein; Möllering, Helen; Fereidooni, Hossein; Marchal, Samuel; Miettinen, Markus; Mirhoseini, Azalia; Sadeghi, Ahmad-Reza; Schneider, Thomas; Zeitouni, Shaza
Crytography and Security
Sprache: English
[Journal Article]
Privacy-Enhanced Robust Image Hashing with Bloom Filters
Breidenbach, Uwe; Steinebach, Martin; Liu, Huajian
International Conference on Availability, Reliability and Security (ARES) 15, 2020, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]
Critical Traffic Analysis on the Tor Network
Platzer, Florian; Schäfer, Marcel; Steinebach, Martin
International Conference on Availability, Reliability and Security (ARES) 15, 2020, Online>
Sprache: English
[Journal Article, Conference Paper, Electronic Publication]
Cover-aware Steganalysis
Bunzel, Niklas; Steinebach, Martin; Liu, Huajian
Sprache: English
[Journal Article, Electronic Publication]
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Sprache: English
[Journal Article, Electronic Publication]
Cybersicherheitsforschung als Teil der nationalen Sicherheitsarchitektur
Kreutzer, Michael; Schneider, Markus
Sprache: German
[Journal Article]
Detection of Fiber Defects Using Keypoints and Deep Learning
Siegmund, Dirk; Fu, Biying; José-García, Adán; Salahuddin, Ahmad Masood; Kuijper, Arjan
Sprache: English
[Journal Article]
Generalization of Fitness Exercise Recognition from Doppler Measurements by Domain-Adaption and Few-Shot Learning
Fu, Biying; Damer, Naser; Kirchbuchner, Florian; Kuijper, Arjan
International Conference on Pattern Recognition (ICPR) 25, 2021, Online>
Sprache: English
[Conference Paper]
Data Protection in AI Services: A Survey
Meurisch, Christian; Mühlhäuser, Max
ACM Computing Surveys
Sprache: English
[Journal Article]
Two-Party Adaptor Signatures From Identification Schemes
Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maitra, Monosij; Riahi, Siavash
24th International Conference on Practice and Theory of Public-Key Cryptography
Sprache: English
[Conference Proceedings]
Bitcoin-Compatible Virtual Channels
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash
42nd IEEE Symposium on Security and Privacy
Sprache: English
[Conference Proceedings]
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction
Stojanovic, Vladimir M.
Physical Review A
Sprache: English
[Journal Article]
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge
Fischlin, Marc; Rohrbach, Felix
24th International Conference on Practice and Theory of Public-Key Cryptography
Sprache: English
[Conference Proceedings]
Remote WebAuthn: FIDO2 Authentication for Less Accessible Devices
Wagner, Paul; Heid, Kris; Heider, Jens
International Conference on Information Systems Security and Privacy (ICISSP) 7, 2021, Online>
Sprache: English
[Conference Paper, Electronic Publication]
HERA: Hotpatching of Embedded Real-time Applications
Niesler, Christian; Surminski, Sebastian; Davi, Lucas
Proc. of 28th Network and Distributed System Security Symposium (NDSS 2021)
Sprache: English
[Conference Proceedings]
Sustainable Solving: Reducing the Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection
Arzt, Steven
International Conference on Software Engineering (ICSE) 43, 2021, Online>
Sprache: English
[Conference Paper, Electronic Publication, Presentation]
RNNIDS: Enhancing network intrusion detection systems through deep learning
Sohi, Soroush M.; Seifert, Jean-Pierre; Ganji, Fatemeh
Sprache: English
[Journal Article]
Risiken für die Privatheit aufgrund von Maschinellem Lernen
Battis, Anna-Verena; Graner, Lukas
Gesellschaft für Informatik (GI Jahrestagung) 50, 2020, Online>
Sprache: German
[Conference Paper, Electronic Publication]
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions
Zimmermann, Verena; Renaud, Karen
ACM Transactions on Computer-Human Interaction, p.7:1-7:45
Sprache: English
[Journal Article]
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
30th USENIX Security Symposium (USENIX Security'21)
Sprache: English
[Conference Proceedings]
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers
Hagen, Christoph; Weinert, Christian; Sendner, Christoph; Dmitrienko, Alexandra; Schneider, Thomas
28. Annual Network and Distributed System Security Symposium (NDSS'21)
Sprache: English
[Conference Proceedings]
A Visualization Interface to Improve the Transparency of Collected Personal Data on the Internet
Schufrin, Marija; Reynolds, Steven Lamarr; Kuijper, Arjan; Kohlhammer, Jörn
Sprache: English
[Journal Article]
Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Conference Proceedings]