On the Security of Encrypted Secret Sharing
Braun, Johannes; Wiesmaier, Alexander; Buchmann, Johannes
46th Hawaii International Conference on Systems Science (HICSS-46), p.4966-4976
[Conference Proceedings]

E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, Maina; Volkamer, Melanie

Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, Stephan; Kahlert, Anna; Henning, Maria; Jonker, Hugo; Volkamer, Melanie
Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), p.277-284
[Conference Proceedings]

Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Franz, M.; Deiseroth, B.; Hamacher, Kay; Jha, Somesh; Katzenbeisser, S.; Schröder, H.
Information Security Technical Report, p.117-128
[Journal Article]

Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer
Busold, Christoph; Dmitrienko, Alexandra; Seudié, Hervé; Taha, Ahmed; Sobhani, Majid; Wachsmann, Christian; Sadeghi, Ahmad-Reza
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, p.233-242
[Conference Proceedings]

Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments
Zöller, Sebastian; Reinhardt, Andreas; Wachtel, Markus; Steinmetz, Ralf
2013 IEEE International Conference on Pervasive Computing and Communications Workshops, p.652-657
[Conference Proceedings]

Smashing WEP in a Passive Attack
Sepehrdad, Pouyan; Susil, Petr; Vaudenay, Serge; Vuagnoux, Martin
20th International Workshop on Fast Software Encryption (FSE)
[Conference Proceedings]

Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions
Kocabas, Unal; Koeberl, Patrick; Sadeghi, Ahmad-Reza
Conference on Digital Automation and Test Europe (DATE)
[Conference Proceedings]

A Comparison of American and German Folk Models of Home Computer Security
Kauer, Michaela; Günther, Sebastian; Storck, Daniel; Volkamer, Melanie
Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, p.100-109
[Conference Proceedings]

User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data
Bauer, Gerald; Blanke, Ulf; Lukowicz, Paul; Schiele, Bernt
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), p.8-13
[Conference Proceedings]

Mouse mode of OnScreenDualScribe: three types of keyboard-driven mouse replacement
Felzer, Torsten; Rinderknecht, Stephan
CHI '13 Extended Abstracts on Human Factors in Computing Systems, p.1593-1598
[Conference Proceedings]

Contextualized Security Interventions in Password Transmission Scenarios
Volkamer, Melanie; Bartsch, Steffen; Kauer, Michaela
European Information Security Multi-Conference (EISMC 2013), p.12-22
[Conference Proceedings]

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award)
Snow, Kevin; Davi, Lucas; Dmitrienko, Alexandra; Liebchen, Christopher; Monrose, Fabian; Sadeghi, Ahmad-Reza
34th IEEE Symposium on Security and Privacy (Oakland 2013)
[Conference Proceedings]

Automatic testing of sequential and concurrent substitutability
Pradel, Michael; Gross, Thomas R.
Proceedings of the 2013 International Conference on Software Engineering, p.282-291
[Conference Proceedings]

Permulin: Personal In- and Output on Interactive Surfaces
Lissermann, Roman; Huber, Jochen; Steimle, Jürgen; Mühlhäuser, Max
CHI '13 Interactivity, p.3083-3086
[Conference Proceedings]

EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction
Lissermann, Roman; Huber, Jochen; Hadjakos, Aristotelis; Mühlhäuser, Max
CHI EA '13: Proceedings of the 2013 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, p.1323-1328
[Conference Proceedings]

Covert Computation: Hiding Code in Code for Obfuscation Purposes
Kieseberg, Peter; Huber, Markus; Leithner, Manuel; Mulazzani, Martin; Weippl, Edgar
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents, p.529-534
[Conference Proceedings]

Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren
Hülsing, Andreas; Braun, Johannes
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.565-576
[Conference Proceedings]

Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis
Horsch, Moritz; Hühnlein, Detlef; Breitenstrom, Christian; Wieland, Thomas; Wiesmaier, Alexander; Biallowons, Benedikt; Petrautzki, Dirk; Potzernheim, Simon; Schmölz, Johannes; Wesner, Alexander; Wich, Tobias
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.391-403
[Conference Proceedings]

HbbTV - I Know What You Are Watching
Ghiglieri, Marco; Oswald, Florian; Tews, Erik
13. Deutschen IT-Sicherheitskongresses
[Conference Proceedings]

Pseudorandom Signatures
Fleischhacker, N.; Günther, F.; Kiefer, F.; Poettering, B.
>8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Journal Article]

Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM
Davi, Lucas; Dmitrienko, Alexandra; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
[Conference Proceedings]

Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy
Buchmann, Johannes; Demirel, Denise; Graaf, Jeroen van de
Financial Cryptography and Data Security: 17th International Conference, 2013, p.197-204
[Conference Proceedings]

Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren
Braun, Johannes; Horsch, Moritz; Hülsing, Andreas
Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, p.347-359
[Conference Proceedings]

Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Armknecht, F.; Katzenbeisser, S.; Peter, A.
Designs, Codes and Cryptography, p.209-232
[Journal Article]

simFI: From Single to Simultaneous Software Fault Injections
Winter, Stefan; Tretter, Michael; Sattler, Benjamin; Suri, Neeraj
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.1-12
[Conference Proceedings]

Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, Melanie; Stockhardt, Simon; Bartsch, Steffen; Kauer, Michaela
3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, p.46-52
[Conference Proceedings]

Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems
Strenzke, Falko
Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, p.217-230
[Conference Proceedings]

Internet Privacy. Taking opportunities, assessing risks, building trust.
Simo-Fhom, Hervais
>Springer Vieweg; 2013
[Journal Article]

Client-controlled Cryptography-as-a-Service in the Cloud
Bleikertz, Sören; Bugiel, Sven; Ideler, Hugo; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
11th International Conference on Applied Cryptography and Network Security (ACNS 2013)
[Conference Proceedings]