Publikationen

Publikationen

Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy
Tse, Edward; Marentette, Lynn; Ahmed, Syed Ishtiaque; Thayer, Alex; Huber, Jochen; Kim, Si Jung; Brown, Quincy; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2691-2694
[Conference Proceedings]


Massively distributed authorship of academic papers
Ständer, Marcus
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.11-20
[Conference Proceedings]


EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Seudié, Hervé; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
ACM/IEEE Design Automation Conference (DAC)
[Conference Proceedings]


C4PS: colors for privacy settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Proceedings of the 21st international conference companion on World Wide Web, p.585--586
[Conference Proceedings]


Formal Treatment of Distributed Trust in Electronic Voting
Neumann, Stephan; Volkamer, Melanie
The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), Vol.ICIMP 2012, The Seventh I, p.30-39
[Conference Proceedings]


Interacting with Videos On Paper-like Displays
Lissermann, Roman; Olberding, Simon; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2579-2584
[Conference Proceedings]


Occlusion-aware Interaction Techniques for Tabletop Systems
Khalilbeigi, Mohammadreza; Schmittat, Patrik; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2531-2536
[Conference Proceedings]


LightBeam: Nomadic Pico Projector Interaction with Real World Objects
Huber, Jochen; Steimle, Jürgen; Liao, Chunyuan; Liu, Qiong; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2513-2518
[Conference Proceedings]


Toward a Theory of Interaction in Mobile Paper-Digital Ensembles
Heinrichs, Felix; Schreiber, Daniel; Huber, Jochen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.1897-1900
[Conference Proceedings]


Leveraging the Palm Surface as an Eyes-free TV Remote Control
Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Huber, Jochen; Müller, Florian; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2483-2488
[Conference Proceedings]


Perfect Confidentiality Network - A solution for information theoretically secure key agreement
Braun, Johannes; Buchmann, Johannes
5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, p.1-5
[Conference Proceedings]


How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization
Bartsch, Steffen; Sasse, Angela
[Report]


Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]


Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography
[Conference Proceedings]


Converse PUF-Based Authentication
Sadeghi, Ahmad-Reza; Kocabaş, Ünal; Katzenbeisser, Stefan
International Conference on Trust & Trustworthy Computing (TRUST)
[Conference Proceedings]


Statically checking API protocol conformance with mined multi-object specifications
Pradel, Michael; Jaspan, Ciera; Aldrich, Jonathan; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.925-935
[Conference Proceedings]


Leveraging test generation and specification mining for automated bug detection without false positives
Pradel, Michael; Gross, Thomas R.
Proceedings of the 34th International Conference on Software Engineering, p.288-298
[Conference Proceedings]


Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework
Piper, Thorsten; Winter, Stefan; Manns, Paul; Suri, Neeraj
Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.1-12
[Conference Proceedings]


Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information and Computer Security, p.75-85
[Journal Article]


Trust and Trustworthy Computing : 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012 ; proceedings
Katzenbeisser, Stefan; Weippl, Edgar; Camp, Jean; Volkamer, Melanie; Reiter, Mike; Zhang, Xinwen
[Book]


Semi-automatically extracting FAQs to improve accessibility of software development knowledge
Henß, Stefan; Monperrus, Martin; Mezini, Mira
Proceedings of the 34th International Conference on Software Engineering, p.793-803
[Conference Proceedings]


SmartTokens: Delegable Access Control with NFC-enabled Smartphones
Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza; Tamrakar, Sandeep; Wachsmann, Christian
International Conference on Trust & Trustworthy Computing (TRUST), p.219-238
[Conference Proceedings]


Partial Verifiability in POLYAS for the GI Elections
Olembo, Maina; Kahlert, Anna; Neumann, Stephan; Volkamer, Melanie
5th International Conference on Electronic Voting 2012 (EVOTE2012), p.95-109
[Conference Proceedings]


Practical Security in E-Mail Applications
Kiefer, Franziskus; Wiesmaier, Alexander; Fritz, Christian
The 2012 International Conference on Security and Management (SAM’12)
[Conference Proceedings]


A Grid security architecture for AliEn
Schreiner, Steffen; Grigoras, Costin; Grigoras, Alina; Betev, Latchezar; Buchmann, Johannes
Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012
[Conference Proceedings]


The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version)
Sadeghi, Ahmad-Reza; Schulz, Steffen; Varadharajan, Vijay
[Report]


Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, Stephan; Volkamer, Melanie
7th International Conference on Availability, Reliability and Security (ARES), p.180-185
[Conference Proceedings]


Forward Secure Signatures on Smart Cards
Hülsing, Andreas; Busold, Christoph; Buchmann, Johannes
SAC2012 - Conference on Selected Areas in Cryptography, p.66-80
[Conference Proceedings]


Improving Helios with Everlasting Privacy Towards the Public
Demirel, Denise; Graaf, Jeroen van de; Araújo, Roberto
Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012
[Conference Proceedings]


XIFER: A Software Diversity Tool Against Code-Reuse Attacks
Davi, Lucas; Dmitrienko, Alexandra; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012)
[Conference Proceedings]