Publikationen

Publikationen

A security architecture for accessing health records on mobile phones
Dmitrienko, A.; Hadzic, Z.; Löhr, H.; Winandy, M.; Sadeghi, A.-R.
International Conference on Health Informatics (HEALTHINF) 2011, Rome>
Sprache: English
[Conference Paper]


Secure digital chains of evidence
Kuntze, N.; Rudolph, C.
IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) 6, 2011, Oakland/Calif.>
Sprache: English
[Conference Paper]


Secure automotive on-board protocols: A case of over-the-air (OTA) firmware updates
Idrees, S.; Schweppe, H.; Roudier, Y.; Wolf, M.; Henniger, O.; Scheuermann, D.
International Workshop on Communication Technologies for Vehicles (Nets4Cars/Nets4Trains) 3, 2011, Oberpfaffenhofen>
Sprache: English
[Conference Paper, Electronic Publication]


Search-based application security testing: Towards a structured search space
Türpe, S.
International Conference on Software Testing, Verification, and Validation Workshop (ICSTW) 4, 2011, Berlin>
Sprache: English
[Conference Paper]


Rihamark: Perceptual image hash benchmarking
Zauner, C.; Steinebach, M.; Hermann, E.
Media Watermarking, Security, and Forensics Conference 2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]


Recyclable PUFs: Logically reconfigurable PUFs
Katzenbeisser, S.; Koçabas, Ü.; Leest, V. van der; Sadeghi, A.-R.; Schrijen, G.-J.; Schröder, H.; Wachsmann, C.
International Workshop on Cryptographic Hardware and Embedded Systems (CHES) 13, 2011, Nara>
Sprache: English
[Journal Article, Conference Paper]


Recyclable PUFs: Logically reconfigurable PUFs
Katzenbeisser, S.; Koçabas, Ü.; Leest, V. van der; Sadeghi, A.-R.; Schrijen, G.-J.; Schröder, H.; Wachsmann, C.
International Workshop on Cryptographic Hardware and Embedded Systems (CHES) 13, 2011, Nara>
Sprache: English
[Conference Paper]


Re-synchronizing audio watermarking after non-linear time stretching
Steinebach, M.; Zmudzinski, S.; Nürnberger, S.
Media Watermarking, Security, and Forensics Conference 2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]


A property based security risk analysis through weighted simulation
Winkelvos, T.; Rudolph, C.; Repp, J.
Annual Information Security South Africa Conference ( ISSA) 10, 2011, Johannesburg>
Sprache: English
[Conference Paper]


Privilege escalation attacks on android
Davi, L.; Dmitrienko, A.; Sadeghi, A.-R.; Winandy, M.
International Information Security Conference (ISC) 13, 2010, Boca Raton/Fla.>
Sprache: English
[Conference Paper]


Privacy-preserving ECG classification with branching programs and neural networks
Barni, M.; Failla, P.; Lazzeretti, R.; Sadeghi, A.R.; Schneider, T.
Sprache: English
[Journal Article]


Preface
Beres, Y.; Perrig, A.; Sadeghi, A.-R.; Sasse, A.
International Conference on Trust and Trustworthy Computing (TRUST) 4, 2011, Pittsburgh/Pa.>
Sprache: English
[Conference Paper]


Practical and lightweight domain isolation on android
Bugiel, S.; Davi, L.; Dmitrienko, A.; Heuser, S.; Sadeghi, A.-R.; Shastry, B.
Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) 1, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]


Performance evaluation in trust enhanced decentralised content distribution networks
Korn, R.; Kuntze, N.; Repp, J.
International Communications Quality and Reliability Workshop (CQR) 2011, Naples/Fla.>
Sprache: English
[Conference Paper]


On constructing homomorphic encryption schemes from coding theory
Armknecht, F.; Augot, D.; Perret, L.; Sadeghi, A.-R.
IMA International Conference on Cryptography and Coding (IMACC) 13, 2011, Oxford>
Sprache: English
[Conference Paper]


On biometric key generation from handwritten signatures
Scheuermann, D.; Wolfgruber, B.; Henniger, O.
Gesellschaft für Informatik, Special Interest Group on Biometrics and Electronic Signatures (BIOSIG Annual Conference) 9, 2011, Darmstadt>
Sprache: English
[Conference Paper, Electronic Publication]


A new metric for measuring the visual quality of video watermarks
Trick, D.; Thiemert, S.
Media Watermarking, Security, and Forensics Conference 2011, San Francisco/Calif.>
Sprache: English
[Conference Paper]


Modellgetriebener IT-Grundschutz: Erstellung und Analyse von IT-Sicherheitskonzeptionen in offenen Werkzeugketten
Eichler, J.
Deutscher IT-Sicherheitskongress 12, 2011, Bonn>
Sprache: German
[Conference Paper]


Model-based situational security analysis
Eichler, J.; Rieke, R.
Workshop on Models@run.time 6, 2011, Wellington>
Sprache: English
[Conference Paper]


Lost iPhone? Lost Passwords!: Practical consideration of iOS device encryption security
Heider, Jens; Boll, Matthias
Sprache: English
[Report, Electronic Publication]


Lightweight modeling and analysis of security concepts
Eichler, J.
International Symposium on Engineering Secure Software and Systems (ESSoS) 3, 2011, Madrid>
Sprache: English
[Conference Paper, Electronic Publication]


Interoperable device Identification in Smart-Grid Environments
Kuntze, N.; Rudolph, C.; Bente, I.; Vieweg, J.; Helden, J. von
IEEE Power and Energy Society (PES General Meeting) 2011, Detroit/Mich.>
Sprache: English
[Conference Paper]


How a symmetry metric assists side-channel evaluation: A novel model verification method for power analysis
Heuser, A.; Kasper, M.; Schindler, W.; Stöttinger, M.
Euromicro Conference on Digital System Design (DSD) 14, 2011, Oulu>
Sprache: English
[Conference Paper]


A generic public key infrastructure for securing Car-to-X communication
Bißmeyer, Norbert; Stübing, Hagen; Schoch, Elmar; Götz, Stefan; Stotz, Jan Peter; Lonc, Brigitte
World Congress on Intelligent Transport Systems (ITS) 18, 2011, Orlando/Fla.>
Sprache: English
[Conference Paper, Electronic Publication]


FPGA implementation of an improved attack against the DECT standard cipher
Weiner, M.; Tews, E.; Heinz, B.; Heyszl, J.
International Conference on Information Security and Cryptology (ICISC) 13, 2010, Soul>
Sprache: English
[Conference Paper]


Forschungsansätze zur Effizienzsteigerung heutiger IT-Frühwarnsysteme
Brunner, M.; Schoo, P.; Hofinger, H.; Roblee, C.; Todt, S.
Sprache: German
[Journal Article]


Formal Notions of Trust and Confidentiality - Enabling Reasoning about System Security
Fuchs, Andreas; Gürgens, Sigrid; Rudolph, Carsten
Sprache: English
[Journal Article, Electronic Publication]


A formal foundation for the security features of physical functions
Armknecht, F.; Maes, R.; Sadeghi, A.-R.; Standaert, F.-X.; Wachsmann, C.
Symposium on Security and Privacy (SP) 32, 2011, Berkeley/ Calif.>
Sprache: English
[Conference Paper]


A formal approach to distance-bounding RFID protocols
Dürholz, U.; Fischlin, M.; Kasper, M.; Onete, C.
Information Security Conference (ISC) 14, 2011, Xi'an>
Sprache: English
[Conference Paper]


Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes
Schäfer, Marcel; Berchtold, Waldemar; Steinebach, Martin
Workshop on Digital Rights Management (DRM) 11, 2011, Chicago/Ill.>
Sprache: English
[Conference Paper]