Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption
Armknecht, F.; Katzenbeisser, S.; Peter, A.
International Conference on Cryptology in Africa (AFRICACRYPT 2012), p.234-251
[Conference Proceedings]

Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt
[Conference Proceedings]

Internet Privacy - Eine multidisziplinäre Bestandsaufnahme - A multidisciplinary analysis

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
Herrewege, Anthony van; Katzenbeisser, Stefan; Maes, Roel; Peeters, Roel; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Financial Cryptography (FC) 2012, p.374-389
[Conference Proceedings]

Softer Smartcards: Usable Cryptographic Tokens with Secure Execution
Schulz, Steffen; Brasser, Ferdinand; Filyanov, Atanas
Financial Cryptography and Data Security (FC)
[Conference Proceedings]

Post-Quantum Signaturverfahren Heute
Hülsing, Andreas; Petzoldt, Albrecht; Schneider, Michael; Yousfi Alaoui, Sidi Mohamed el
22. SIT-Smartcard Workshop 2012
[Conference Proceedings]

Technical Aspects of Online Privacy
Ghiglieri, Marco; Simo, Hervais; Waidner, Michael

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Davi, Lucas; Dmitrienko, Alexandra; Egele, Manuel; Fischer, Thomas; Holz, Thorsten; Hund, Ralf; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]

Towards Taming Privilege-Escalation Attacks on Android
Bugiel, Sven; Davi, Lucas; Dmitrienko, Alexandra; Fischer, Thomas; Sadeghi, Ahmad-Reza; Shastry, Bhargava
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]

It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, Michaela; Pfeiffer, Thomas; Volkamer, Melanie; Theuerling, Heike; Bruder, Ralph
Sicherheit, p.187-198
[Conference Proceedings]

POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC
Das, Amitabh; Kocabaş, Ünal; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid
Conference on Digital Automation and Test Europe (DATE)
[Conference Proceedings]

TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures
Bessani, Alysson; Abbadi, Imad M.; Bugiel, Sven; Cesena, Emanuele; Deng, Mina; Gröne, Michael; Marnau, Ninja; Nürnberger, Stefan; Pasin, Marcelo; Schirmer, Norbert
European research activities in cloud computing, p.151-177

Sicherheitskern(e) für Smartphones: Ansätze und Lösungen
Alkassar, Ammar; Schulz, Steffen; Stüble, Christian
Datenschutz und Datensicherheit (DuD), p.175-179
[Journal Article]

Physical Security Primitives: A Survey on Physically Unclonable Functions (PUFs) and PUF-based Security Solutions
Wachsmann, Christian; Sadeghi, Ahmad-Reza; Schulz, Steffen
Secure Smart Embedded Devices, Platforms and Applications, p.429-449

Tetherway: A Framework for Tethering Camouflage
Schulz, Steffen; Sadeghi, Ahmad-Reza; Zhdanova, Maria; Xu, Wenyuan; Mustafa, Hossen; Varadharajan, Vijay
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]

Unsafe Exposure Analysis of Mobile In-App Advertisements
Jiang, Xuxian; Grace, Michael; Sadeghi, Ahmad-Reza; Zhou, Wu
to appear at WiSec
[Conference Proceedings]

Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy
Tse, Edward; Marentette, Lynn; Ahmed, Syed Ishtiaque; Thayer, Alex; Huber, Jochen; Kim, Si Jung; Brown, Quincy; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2691-2694
[Conference Proceedings]

Massively distributed authorship of academic papers
Ständer, Marcus
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.11-20
[Conference Proceedings]

EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Seudié, Hervé; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
ACM/IEEE Design Automation Conference (DAC)
[Conference Proceedings]

C4PS: colors for privacy settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Proceedings of the 21st international conference companion on World Wide Web, p.585--586
[Conference Proceedings]

Formal Treatment of Distributed Trust in Electronic Voting
Neumann, Stephan; Volkamer, Melanie
The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), Vol.ICIMP 2012, The Seventh I, p.30-39
[Conference Proceedings]

Interacting with Videos On Paper-like Displays
Lissermann, Roman; Olberding, Simon; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2579-2584
[Conference Proceedings]

Occlusion-aware Interaction Techniques for Tabletop Systems
Khalilbeigi, Mohammadreza; Schmittat, Patrik; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2531-2536
[Conference Proceedings]

LightBeam: Nomadic Pico Projector Interaction with Real World Objects
Huber, Jochen; Steimle, Jürgen; Liao, Chunyuan; Liu, Qiong; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2513-2518
[Conference Proceedings]

Toward a Theory of Interaction in Mobile Paper-Digital Ensembles
Heinrichs, Felix; Schreiber, Daniel; Huber, Jochen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.1897-1900
[Conference Proceedings]

Leveraging the Palm Surface as an Eyes-free TV Remote Control
Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Huber, Jochen; Müller, Florian; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2483-2488
[Conference Proceedings]

Perfect Confidentiality Network - A solution for information theoretically secure key agreement
Braun, Johannes; Buchmann, Johannes
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, p.1-5
[Conference Proceedings]

How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization
Bartsch, Steffen; Sasse, Angela

Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]

Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography
[Conference Proceedings]