Publikationen
Publikationen
RAID-PIR: Practical Multi-Server PIR
Demmler, Daniel; Herzberg, Amir; Schneider, Thomas
6. ACM Cloud Computing Security Workshop (CCSW'14)
[Conference Proceedings]
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
Araujo, Frederico; Hamlen, Kevin; Biedermann, Sebastian; Katzenbeisser, Stefan
Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, p.942-953
[Conference Proceedings]
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Wachsmann, Christian; Sadeghi, Ahmad-Reza
[Book]
An efficient time-stamping solution for long-term digital archiving
Vigil, Martín; Weinert, Christian; Demirel, Denise; Buchmann, Johannes
IEEE 33rd International Performance Computing and Communications Conference (IPCCC), p.1-8
[Conference Proceedings]
Generation of entangled matter qubits in two opposing parabolic mirrors
Trautmann, N.; Bernad, J. Z.; Sondermann, M.; Alber, G.; Sanchez-Soto, L. L.; Leuchs, G.
Physical Review A
[Journal Article]
Authentication Schemes - Comparison and Effective Password Spaces
Mayer, Peter; Volkamer, Melanie; Kauer, Michaela
Information Systems Security, p.204--225
[Conference Proceedings]
Less is More: Cipher-Suite Negotiation for DNSSEC
Herzberg, Amir; Shulman, Haya; Crispo, Bruno
Computer Security Applications Conference (ACM ACSAC)
[Conference Proceedings]
DNS Authentication as a Service: Preventing Amplifikation Attacks
Herzberg, Amir; Shulman, Haya
30th Annual Computer Security Applications Conference, p.356-365
[Conference Proceedings]
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Günther, Felix; Manulis, Mark; Peter, Andreas
Cryptology and Network Security (13th International Conference, CANS 2014), p.321-336
[Conference Proceedings]
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Fischlin, Marc; Günther, Felix
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.12
[Conference Proceedings]
Positive but skeptical - A study of attitudes towards Internet voting in Sweden
Faraon, Montathar; Stenberg, Georg J. H.; Budurushi, Jurlind; Kaipainen, Mauri
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, p.191-205
[Conference Proceedings]
Fast, Expressive Top-k Matching
Culhane, William; Jayaram, K. R.; Eugster, Patrick
Proceedings of the 15th International Middleware Conference, p.73-84
[Conference Proceedings]
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Brzuska, Christina; Mittelbach, Arno
Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., p.142-161
[Conference Proceedings]
Hot-Hardening: Getting More Out of Your Security Settings
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Proceedings of the 30th Annual Computer Security Applications Conference, p.6-15
[Conference Proceedings]
Security framework — Guidelines for trust services providers — Part 1
Iglesias, Inigo Barreira; Gustavsson, Tomas; Wiesmaier, Alexander; Manso, Clara Galan; Gorniak, Slawomir
Risk assessment — Guidelines for trust services providers — Part 2
Iglesias, Inigo Barreira; Gustavsson, Tomas; Wiesmaier, Alexander; Manso, Clara Galan; Gorniak, Slawomir
Mitigating the impact of security incidents — Guidelines for trust services providers — Part 3
Iglesias, Inigo Barreira; Gustavsson, Tomas; Wiesmaier, Alexander; Manso, Clara Galan; Gorniak, Slawomir
Automatic Protocol Selection in Secure Two-Party Computations
Kerschbaum, Florian; Schneider, Thomas; Schröpfer, Axel
20th Network and Distributed System Security Symposium (NDSS'13)
[Conference Proceedings]
Instantiating Treeless Signature Schemes
Weiden, Patrick; Hülsing, Andreas; Cabarcas, Daniel; Buchmann, Johannes
Cryptology ePrint Archive, p.1-18
[Journal Article]
Provably Secure LWE-Encryption with Uniform Secret
Cabarcas, Daniel; Göpfert, Florian; Weiden, Patrick
Cryptology ePrint Archive, p.1-20
[Journal Article]
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor
Northrop, Erik; Lipford, Heather Richter; Bartsch, Steffen; Volkamer, Melanie
[Conference Proceedings]
Poster: On the Usability of Secure GUIs
Nas, Aysegül; Filyanov, Atanas; Volkamer, Melanie; Winandy, Marcel
[Conference Proceedings]
The use of linguistics in cryptography and its application to improve the HB protocol
Gutmann, Andreas; Matsuura, Kanta
Computer Security Symposium 2013, p.518-525
[Conference Proceedings]
How to Avoid the Breakdown of Public Key Infrastructures — Forward Secure Signatures for Certificate Authorities
Braun, J.; Hülsing, A.; Wiesmaier, A.; Vigil, M.; Buchmann, J.
9th European PKI Workshop: Research and Applications (EuroPKI 2012), p.53-58
[Conference Proceedings]
On the Security of Encrypted Secret Sharing
Braun, J.; Wiesmaier, A.; Buchmann, J.
46th Hawaii International Conference on System Sciences (HICSS-46), p.4966-4975
[Conference Proceedings]
Privacy for Smart Metering Ecosystems
Ebinger, P.; Ramos, J. L. Hernández; Kikiras, P.; Lischka, M.; Wiesmaier, A.
First Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec12), p.120-131
[Conference Proceedings]
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis
Horsch, M.; Hühnlein, D.; Breitenstrom, C.; Wieland, T.; Wiesmaier, A.; Biallowons, B.; Petrautzki, D.; Potzernheim, S.; Schmölz, J.; Wesner, A.; Wich, T.
Informationssicherheit stärken — Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.391-403
[Conference Proceedings]
Multi Domain Information Architecture and Modeling for Smart Grids
Chandra-Sekaran, Ashok-Kumar; Wiesmaier, Alexander; Hessler, Alban
Innovative Smart Grid Technologies —- Asia (ISGT Asia), 2013 IEEE, p.1-6
[Conference Proceedings]
A Comparison of American and German Folk Models of Home Computer Security
Kauer, Michaela; Günther, Sebastian; Storck, Daniel; Volkamer, Melanie
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, p.100-109
[Conference Proceedings]
Contextualized Web warnings, and how they cause distrust
Bartsch, Steffen; Volkamer, Melanie; Theuerling, Heike; Karayumak, Fatih
Trust and Trustworthy Computing (TRUST 2013), p.205-222
[Conference Proceedings]