Publikationen

Publikationen

Digital audio authentication by robust feature embedding
Zmudzinski, S.; Munir, B.; Steinebach, M.
Conference "Media Watermarking, Security, and Forensics" 2012, Burlingame/Calif.>
Sprache: English
[Conference Paper]


CTL: A platform-independent crypto tools library based on dataflow programming paradigm
Ahmad, J.J.; Li, S.; Sadeghi, A.-R.; Schneider, T.
International Conference on Financial Cryptography and Data Security (FC) 16, 2012, Kralendijk, Bonaire>
Sprache: English
[Conference Paper]


Converse PUF-based authentication
Kocaba, Ü.; Peter, A.; Katzenbeisser, S.; Sadeghi, A.-R.
International Conference on Trust and Trustworthy Computing (TRUST) 5, 2012, Wien>
Sprache: English
[Conference Paper]


Como garantir a seguranca da informacao (Internet do Futuro)
Rieke, R.; Rudolph, C.
Sprache: Portuguese
[Journal Article]


Challenges for advanced security monitoring - The MASSIF project
Rieke, R.; Prieto, E.; Diaz, R.; Debar, H.; Hutchison, A.
International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 9, 2012, Vienna>
Sprache: English
[Conference Paper]


Central misbehavior evaluation for VANETs based on mobility data plausibility
Bißmeyer, Norbert; Njeukam, Joël; Petit, Jonathan; Bayarou, Kpatcha
International Workshop on VehiculAR Inter-NETworking, Systems, and Applications (VANET) 9, 2012, Low Wood Bay>
Sprache: English
[Conference Paper, Electronic Publication]


Carving and reorganizing fragmented MP3 files using syntactic and spectral information
Taneja, A.; Zmudzinski, S.; Steinebach, M.
Audio Engineering Society (AES International Conference) 46, 2012, Denver/Colo.>
Sprache: English
[Conference Paper]


Butterfly-attack on Skein's modular addition
Zohner, M.; Kasper, M.; Stöttinger, M.
International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE) 3, 2012, Darmstadt>
Sprache: English
[Conference Paper]


AWESOME - Automated web emulation for secure operation of a malware-analysis environment
Brunner, Martin; Fuchs, Christian; Todt, Sascha
International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 6, 2012, Rome>
Sprache: English
[Conference Paper]


Automatisches Erkennen mobiler Angriffe auf die IT-Infrastruktur
Detken, Kai-Oliver; Scheuermann, Dirk; Bente, Ingo; Westerkamp, Jürgen
Arbeitskonferenz D-A-CH Security 2012, Konstanz>
Sprache: German
[Conference Paper, Electronic Publication]


Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters
Bißmeyer, Norbert; Mauthofer, Sebastian; Bayarou, Kpatcha M.; Kargl, Frank
Vehicular Networking Conference (VNC) 2012, Seoul>
Sprache: English
[Conference Paper, Electronic Publication]


Architecting a security strategy measurement and management system
Rieke, R.; Schütte, J.; Hutchison, A.
Model-Driven Security Workshop (MDsec) 1, 2012, Innsbruck>
Sprache: English
[Conference Paper]


22. SIT-Smartcard Workshop 2012. Tagungsband: 8. und 9. Februar 2012, IHK Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informations­technologie -SIT-, Darmstadt
SmartCard Workshop 22, 2012, Darmstadt>
Sprache: German
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
Proceedings: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, p.933-939
Sprache: English
[Conference Proceedings]


An efficient mobile PACE implementation
Wiesmaier, A.; Horsch, M.; Braun, J.; Kiefer, F.; Hühnlein, D.; Strenzke, F.; Buchmann, J.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, p.176-185
[Conference Proceedings]


In-packet Bloom filters: Design and networking applications
Esteve, C.; Macapuna, C.; Magalhaes, M.; Verdi, F.; Wiesmaier, A.
Computer Networks (Journal), Vol.55, p.1364-1378
[Journal Article]


Mobile Authentisierung und Signatur
Braun, J.; Horsch, M.; Wiesmaier, A.; Hühnlein, D.
D-A-CH Security 2011: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, p.32-43
[Conference Proceedings]


AmazonIA: When Elasticity Snaps Back
Bugiel, Sven; Pöppelmann, Thomas; Nürnberger, Stefan; Sadeghi, Ahmad-Reza; Schneider, Thomas
18. ACM Conference on Computer and Communications Security (CCS'11), p.389-400
Sprache: English
[Conference Proceedings]


Towards a Trust Management System for Cloud Computing
Habib, Sheikh Mahbub; Ries, Sebastian; Mühlhäuser, Max
IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Sprache: English
[Conference Proceedings]


Werte schützen, Kosten senken, Erträge steigern: Beispiele für die Wirtschaftlichkeit von Informationssicherheit; White Paper
Stöwer, Mechthild
Sprache: German
[Report, Electronic Publication]


Ubiquitous personal information management
Heider, Jens
Sprache: English
[Dissertation, Electronic Publication]


TruWalletM: Secure web authentication on mobile platforms
Bugiel, S.; Dmitrienko, A.; Kostiainen, K.; Sadeghi, A.-R.; Winandy, M.
International Conference on Trusted Systems (INTRUST) 2, 2010, Beijing>
Sprache: English
[Conference Paper]


Trustworthiness in Peer-to-Peer Communication for Commercial Applications
Korn, Roman; Kuntze, Nicolai
Deutscher IT-Sicherheitskongress 12, 2011, Bonn>
Sprache: English
[Conference Paper]


Trusted virtual domains on OKL4: Secure information sharing on smartphones
Davi, L.; Dmitrienko, A.; Kowalski, C.; Winandy, M.
Workshop on Scalable Trusted Computing (STC) 6, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]


Trust and trustworthy computing. 4th inter­national conference, TRUST 2011. Proceedings: Pittsburgh, PA, USA, June 22-24, 2011
McCune, J.M.; Balacheff, B.; Perrig, A.; Sadeghi, A.-R.; Sasse, A.; Beres, Y.
International Conference on Trust and Trustworthy Computing (TRUST) 4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Proceedings]


Trends in eID security public sector view
Eckert, C.; Herfert, M.; Waldmann, U.
Sprache: English
[Book Article]


Towards permission-based attestation for the android platform. Short paper
Bente, I.; Dreo, G.; Hellmann, B.; Heuser, S.; Vieweg, J.; Helden, J. von; Westhuis, J.
International Conference on Trust and Trustworthy Computing (TRUST) 4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]


Towards a holistic privacy engineering approach for smart grid systems
Fhom, H.S.; Bayarou, K.M.
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 10, 2011, Changsha/China>
Sprache: English
[Conference Paper]


Structured derivation of semi-synchronous algorithms
Attiya, H.; Borran, F.; Hutle, M.; Milosevic, Z.; Schiper, A.
International Symposium on Distributed Computing (DISC) 25, 2011, Roma>
Sprache: English
[Conference Paper]


Special Issue on security and dependability assurance of software architectures. Editorial
Damiani, E.; Gürgens, S.; Mana, A.; Spanoudakis, G.; Ardagna, C.A.
Sprache: English
[Journal Article]