Publications

Publications

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
  • TU Darmstadt (88615)
Group by: Date | Creator(s) | Item type
Jump to: 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011
Number of items at this level: 1207.

2020

Zimmermann, Verena ; Gerber, Nina (2020):
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes.
In: International Journal of Human-Computer Studies, Elsevier, S. 26-44, 133, DOI: 10.1016/j.ijhcs.2019.08.006,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S107158191...],
[Article]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security, k.A., USENIX Association, In: 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Conference item]

2019

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Conference item]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December, 8-12, [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Conference item]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference item]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
In: ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Conference item]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, In: 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Conference item]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference item]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference item]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference item]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Conference item]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference item]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Conference item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019, k.A., Springer, [Conference item]

Spielhofer, Thomas ; Hahne, Anna Sophie ; Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/thomasspielhofer2/2019/1748_Thom...],
[Conference item]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, The Open Journal, 4, (40), ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Article]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
In: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3293882&picked=prox],
[Conference item]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Conference item]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference item]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference item]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
In: Quantum Information Processing, S. 1-25, 18, (259), DOI: 10.1007/s11128-019-2372-9,
[Article]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, In: 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Conference item]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Conference item]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, 2, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Article]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference item]

Schneider, Thomas ; Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Online-Edition: https://encrypto.de/papers/ST19ASIACCS.pdf],
[Conference item]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Conference item]

Olt, Christian M. ; Mesbah, Neda (2019):
Weary of Watching Out? - Cause and Effect of Security Fatigue.
In: European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Conference item]

Wagner, Amina ; Mesbah, Neda (2019):
Too Confident to Care: Investigating Overconfidence in Privacy Decision Making.
In: European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Conference item]

Zimmermann, Verena ; Gerber, Nina ; Mayer, Peter ; Kleboth, Marius ; von Preuschen, Alexandra ; Schmidt, Konstantin (2019):
Keep on rating – on the systematic rating and comparison of authentication schemes.
In: Information & Computer Security, Emerald Publishing, ISSN 2056-4961,
DOI: 10.1108/ICS-01-2019-0020,
[Online-Edition: https://www.emerald.com/insight/content/doi/10.1108/ICS-01-2...],
[Article]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[PhD thesis]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8762],
[PhD thesis]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, In: Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Conference item]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Conference item]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: Proceeding of the INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2019, Springer, [Conference item]

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference item]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Conference item]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Conference item]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Online-Edition: https://encrypto.de/papers/NJTKHMAATMGPCESBRTB19.pdf],
[Article]

Zimmermann, Verena ; Dickhaut, Ernestine ; Gerber, Paul ; Vogt, Joachim (2019):
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Los Alamos, California, IEEE, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Conference item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[PhD thesis]

Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Conference item]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Conference item]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, Springer, S. 276-280, 43, (5), ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: Proceedings of the 16th International Conference on Mining Software Repositories, k.A., IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, In: MSR, [Online-Edition: https://conf.researchr.org/home/msr-2019],
[Conference item]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Conference item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019, Darmstadt, IACR, In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Online-Edition: https://eurocrypt.iacr.org/2019/],
[Conference item]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Conference item]

Schabhüser, Lucas (2019):
Information-Theoretic Privacy in Verifiable Outsourced Computation.
TU Darmstadt, [PhD thesis]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: 10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Article]

Speth, Jonathan (2019):
How secure are business applications? An in-depth study on the security of business applications.
Darmstadt, TU Darmstadt, [Bachelor thesis]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelor thesis]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: COSADE 2019, Springer, Darmstadt, [Online-Edition: https://www.cosade.org/index.html],
[Conference item]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Master thesis]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), [Conference item]

Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Conference item]

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., In: IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Conference item]

Schulz, Philipp (2019):
Developing Secure Distributed Systems with Modular Tierless Programming.
TU Darmstadt, [Master thesis]

Srivatsa, Jeevan Karanam (2019):
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
TU Darmstadt, [Master thesis]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813,
ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Conference item]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Article]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
In: 23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Conference item]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Online-Edition: https://eprint.iacr.org/2019/154],
[Report]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, Springer, San Francisco, CA, USA, March 4–8, 2019, [Online-Edition: https://www.rsaconference.com/events/us19/speakers/cryptogra...],
[Conference item]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS), In: 26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Conference item]

Surminski, Sebastian ; Rodler, Michael ; Davi, Lucas (2019):
Poster: Automated Evaluation of Fuzzers.
Internet Society, In: NDSS 2019 : 26th Annual Network and Distributed System Security Symposium, San Diego, California, 24 – 27 February 2019, [Online-Edition: https://www.ndss-symposium.org/wp-content/uploads/2019/02/nd...],
[Conference item]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Wegert, Leonard (2019):
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
TU Darmstadt, [Bachelor thesis]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
In: Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Online-Edition: http://hicss.hawaii.edu],
[Conference item]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Urheber) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Book section]

Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
In: Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Online-Edition: https://wi2019.de/],
[Conference item]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master thesis]

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Conference item]

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Conference item]

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna, Austria:, 18.-19.2.2019, [Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Conference item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1014.pdf],
[Article]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
In: The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Conference item]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8605],
[PhD thesis]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
IEEE Computer Society, In: 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Online-Edition: https://www.ieee-security.org/TC/SP2018/],
[Conference item]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, In: The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Conference item]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1053.pdf],
[Article]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
Springer, In: International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, In: LNCS, [Online-Edition: http://www.c2si-conference.org/],
[Conference item]

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (Hrsg.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
Hamburg, Germany, ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8. bis 11. September 2019, [Conference item]

Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTwe...],
[Conference item]

Hartwig, Katrin ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference item]

Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian (2019):
Resilience in Security and Crises through Adaptions and Transitions.
Kassel, Germany, Gesellschaft für Informatik e. V., In: Informatik 2019, Lecture Notes in Informatics (LNI), Kassel, Germany, 23.-26. September, [Conference item]

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Conference item]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Kaufhold, Marc-André ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference item]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, S. 1-11, [Online-Edition: https://arxiv.org/pdf/1907.07725.pdf],
[Article]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38, [Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference item]

Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/amandalanger1/2019/1757_AmandaLa...],
[Conference item]

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Vienna. Austria, 18.-19. Februar 2019, [Online-Edition: http://gil-net.de/Publikationen/139_119.pdf],
[Conference item]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, In: Design Automation Conference (DAC), 2019, [Conference item]

Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, In: Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Conference item]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Reinhold, Thomas ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Reuter, Christian (2019):
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Wiesbaden, Germany, Springer Vieweg, [Book]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Book]

Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Reuter, Christian
Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (Hrsg.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, S. accepted, [Book section]

Reuter, Christian
Ückert, Sandra (Hrsg.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Book section]

Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André
Reuter, Christian (Hrsg.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker
Reuter, Christian (Hrsg.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, DOI: 10.1007/978-3-658-25652-4_19,
[Online-Edition: https://www.springer.com/de/book/9783658256517],
[Book section]

Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Conference item]

Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska
Alt, Florian ; Bulling, Andreas ; Döring, Tanja (Hrsg.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Conference item]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference item]

Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas
Werkner, Ines-Jacqueline (Hrsg.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, Springer VS, S. akzeptiert, [Book section]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Online-Edition: https://www.gil-net.de/tagungen.php],
[Conference item]

Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Book]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38, DOI: 10.1080/0144929X.2019.1629025.,
[Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Article]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Special Issue on Social Media in Conflicts and Crises.
accepted, [Book]

Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference item]

Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference item]

Riebe, Thea ; Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, S. 46-48, (1), [Online-Edition: http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF...],
[Article]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference item]

Riebe, Thea ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Book section]

Saeed, Saqib ; Pipek, Volkmar ; Rohde, Markus ; Reuter, Christian ; Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, S. 63564-63577, 7, (1), DOI: 10.1109/ACCESS.2019.2916903,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=871...],
[Article]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, In: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Online-Edition: https://acisp19.canterbury.ac.nz/],
[Conference item]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Conference item]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian
Reuter, Christian (Hrsg.) (2019):
Privacy vs. Security: Privacy Enhancing Technologies in Social Media in Security relevant Situations.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Conference item]

Schneider, Thomas ; Treiber, Amos (2019):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, [Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, In: 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Online-Edition: https://www.usenix.org/conference/usenixsecurity19/presentat...],
[Conference item]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Zimmermann, Verena ; Renaud, Karen (2019):
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005,
[Article]

Álvarez, Flor ; Almon, Lars ; Radtki, Hauke ; Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
In: 9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Conference item]

2018

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: International Conference on Information Security and Cryptology (ICISC) 2018, Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, In: LNCS, [Online-Edition: http://www.wikicfp.com/cfp/program?id=1397&s=ICISC&f=Interna...],
[Conference item]

Heidt, Margareta ; Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, In: International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Online-Edition: https://icis2018.aisconferences.org/],
[Conference item]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Master thesis]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[PhD thesis]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelor thesis]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor thesis]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, In: LNCS, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Conference item]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3267716],
[Conference item]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Article]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3241566],
[Conference item]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference item]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: Advances in Cryptology – ASIACRYPT 2018, Springer, In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, In: LNCS, [Online-Edition: https://asiacrypt.iacr.org/2018/index.html],
[Conference item]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Conference item]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference item]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference item]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Master thesis]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
In: IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Conference item]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference item]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Conference item]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Master thesis]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Master thesis]

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Master thesis]

Schneider, Thomas ; Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268956,
[Online-Edition: https://encrypto.de/papers/TS18.pdf],
[Conference item]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelor thesis]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Article]

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Conference item]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Conference item]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference item]

El Bansarkhani, Rachid (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference item]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, ACM, In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Online-Edition: https://sigmobile.org/mobicom/2018/],
[Conference item]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference item]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelor thesis]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ACM, In: ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226],
[Conference item]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelor thesis]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Conference item]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Conference item]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Conference item]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: 28th Crypto-Day, München, Deutschland, In: GI, [Conference item]

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: 28th Crypto-Day, In: GI, [Conference item]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Article]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Master thesis]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Master thesis]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Master thesis]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, In: 27th USENIX Security Symposium, Baltimore, MD, USA, 15.-17.08.2018, [Conference item]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
In: International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Conference item]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Other]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Master thesis]

Zimmermann, Verena ; Gerber, Nina ; Kleboth, Marius ; von Preuschen, Alexandra ; Schmidt, Konstantin ; Mayer, Peter
Clarke, Nathan L. ; Furnell, Steven M. (Hrsg.) (2018):
The Quest to Replace Passwords Revisited – Rating Authentication Schemes.
In: Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Plymouth, UK, University of Plymouth, In: Twelth International Symposium on Human Aspects of Information Security & Assurance (HAISA), Dundee, UK, 29. - 31.08.2018, [Conference item]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Master thesis]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Master thesis]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelor thesis]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Master thesis]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Master thesis]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Master thesis]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Master thesis]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Conference item]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelor thesis]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Conference item]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Conference item]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Other]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference item]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, In: LNCS, [Online-Edition: http://scn.di.unisa.it/],
[Conference item]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, New York, NY, USA, ACM, Budapest, HU, 20-25 August 2018, [Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Conference item]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, MDPI, Volume 2, (7), DOI: 10.3390/cryptography2020007,
[Article]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Article]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Applied Cryptography and Network Security - ACNS 2018, In: 16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, In: Springer International Publishing, LNCS 10892, [Online-Edition: https://www.springer.com/us/book/9783319933863],
[Conference item]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), In: ACM, [Conference item]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: COSADE2018, Singapore, In: COSADE: International Workshop on Constructive Side-Channel Analysis and Secure Design, In: LNCS, 10815, [Conference item]

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, In: LNCS, [Online-Edition: http://isc2018.sccs.surrey.ac.uk/],
[Conference item]

Wunderer, Thomas ; Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: ISPEC 2018, Tokyo, Japan, In: 14th International Conference on Information Security Practice and Experience (ISPEC 2018), In: Springer LNCS, [Conference item]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, In: Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Conference item]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Conference item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Conference item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Conference item]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 159-178, DOI: 10.1515/popets-2018-0037,
[Article]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509],
[Conference item]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Master thesis]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Schloss Dagstuhl-Leibniz-Zentrum für Informatik, In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Online-Edition: https://2018.ecoop.org/],
[Conference item]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Master thesis]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelor thesis]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236503],
[Conference item]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelor thesis]

Senker, Matthias (2018):
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master thesis]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, MDPI, 2, (3), ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Article]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Article]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, k.A., SciTePress, In: Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Conference item]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Online-Edition: https://encrypto.de/papers/RYTLJSL18.pdf],
[Conference item]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Master thesis]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: 13th ASIA Conference on Information, Computer and Communications Security, In: AsiaCCS, [Conference item]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelor thesis]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), ACM, In: 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Conference item]

Renaud, Karen ; Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), S. 102-118, 109, (2), [Article]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196522,
[Online-Edition: https://encrypto.de/papers/RWTSSK18.pdf],
[Conference item]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Conference item]

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196541,
[Online-Edition: https://encrypto.de/papers/TWSH18.pdf],
[Conference item]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Master thesis]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018, [Conference item]

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Master thesis]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Master thesis]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master thesis]

Wolf, Yannic (2018):
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt, [Bachelor thesis]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Conference item]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, Springer, S. 1348-1369, 18, Issue 9, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Online-Edition: https://link.springer.com/journal/11714],
[Article]

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE, ACM, [Conference item]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Master thesis]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Master thesis]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelor thesis]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Conference item]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Conference item]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master thesis]

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), IEEE, Taipei, Taiwan., DOI: 10.1109/NOMS.2018.8406119,
[Conference item]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, S. 117-118, [Book section]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Master thesis]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelor thesis]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master thesis]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Conference item]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Master thesis]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Master thesis]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Trautmann, Nils ; Hauke, Philipp (2018):
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, S. 023606, 97, [Article]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Master thesis]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764, [Online-Edition: http://arxiv.org/abs/1801.05764],
[Article]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, S. 83-98, [Book section]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), S. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],
[Article]

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop, In: 3rd NSF Millimeter-Wave RCN Workshop, [Conference item]

Reuter, Christian (Hrsg.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
Wiesbaden, Springer Vieweg (Lehrbuch/Fachbuch), ISBN 978-3-658-19522-9,
DOI: 10.1007/978-3-658-19523-6,
[Online-Edition: http://www.springer.com/de/book/9783658195229],
[Book]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (Hrsg.) (2018):
Social Media in Crisis Management - Special Issue.
Taylor & Francis Online, 34, ISSN 1532-7590,
[Online-Edition: https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList],
[Zeitschriftenheft, -band oder -jahrgang]

Reuter, Christian ; Mentler, Tilo (Hrsg.) (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems - Special Issue.
Wiley, 26, (1), ISSN 0966-0879,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issu...],
[Zeitschriftenheft, -band oder -jahrgang]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Article]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, S. 1, ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Article]

Asokan, N. ; Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Article]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, In: CASES '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Conference item]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Online-Edition: http://arxiv.org/abs/1812.00197],
[Article]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8094],
[PhD thesis]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), S. 680-685, 42, (11), [Article]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Conference item]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
New York, NY, USA, ACM, In: Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, In: MobiSys PhD Forum '18, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Online-Edition: http://doi.acm.org/10.1145/3212711.3212712],
[Conference item]

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa
Ojendal, Joakim ; Swain, Ashok (Hrsg.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Book section]

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), S. 1-16, DOI: 10.1111/1468-5973.12249,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...],
[Article]

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Conference item]

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar
Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Conference item]

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), S. 1-19, 10, (1), DOI: 10.4018/IJISCRAM.2018010101,
[Article]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
Portsmouth, UK, In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, [Conference item]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, Elsevier, S. 45-67, 94, ISSN 2352-2216,
[Article]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Conference item]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
Piscataway, NJ, USA, IEEE Press, In: International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, In: EMSOFT '18, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283535.3283551],
[Conference item]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474, [Online-Edition: http://arxiv.org/abs/1804.07474],
[Article]

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, hrsg. von Josef Wiemeyer, Darmstadt, S. 71-89, [Online-Edition: http://www.peasec.de/paper/2019/2019_LedererNordmannReuter_I...],
[Book section]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
Call Graph Construction for Java Libraries.
Bonn, Gesellschaft für Informatik, In: Software Engineering und Software Management 2018, Bonn, [Conference item]

Renaud, Karen ; Zimmermann, Verena (2018):
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), Elsevier, S. 22-35, 120, DOI: 10.1016/j.ijhcs.2018.05.011,
[Article]

Renaud, Karen ; Zimmermann, Verena (2018):
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP), Cambridge University Press, S. 1-31, DOI: 10.1017/bpp.2018.3,
[Article]

Reuter, Christian
Reuter, Christian (Hrsg.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 3-14, DOI: 10.1007/978-3-658-19523-6_1,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker
Reuter, Christian (Hrsg.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570_Christ...],
[Conference item]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), S. 277-279, 34, (4), DOI: 10.1080/10447318.2018.1427833,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranP...],
[Article]

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), S. 280-294, 34, (4), DOI: 10.1080/10447318.2018.1427832,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_So...],
[Article]

Reuter, Christian ; Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, S. 41-57, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenY...],
[Article]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (Hrsg.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 573-595, DOI: 10.1007/978-3-658-19523-6_28,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (Hrsg.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Springer Vieweg, S. 379-402, DOI: 10.1007/978-3-658-19523-6_19,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André
Reuter, Christian (Hrsg.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 17-40, DOI: 10.1007/978-3-658-19523-6_2,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, S. 22-24, 2, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian ; Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, S. in press, 2, (1), [Article]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, S. 64-66, 1, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...],
[Article]

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), accepted, [Article]

Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar
Reuter, Christian (Hrsg.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 443-465, DOI: 10.1007/978-3-658-19523-6_22,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Book section]

Reuter, Christian ; Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), Wiley, S. 2-3, 26, (1), ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...],
[Article]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens
Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...],
[Conference item]

Reuter, Christian ; Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), S. v-viii, 10, (1), [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterPottebaum_Editori...],
[Article]

Reuter, Christian ; Pottebaum, Jens (2018):
Special Issue on IT Support for Crisis and Continuity Management.
10, [Book]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal
Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...],
[Conference item]

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, S. 60-61, [Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312],
[Article]

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian
Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...],
[Conference item]

Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...],
[Conference item]

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, IEEE Computer Society, In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Online-Edition: https://pstnet.ca/pst2018/],
[Conference item]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8082],
[PhD thesis]

Zimmermann, Verena ; Bennighof, Merve ; Edel, Miriam ; Hofmann, Oliver ; Jung, Judith ; von Wick, Melina
Dachselt, R. ; Weber, G. (Hrsg.) (2018):
‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes.
In: Mensch und Computer 2018 - Workshopband, Gesellschaft für Informatik e.V., In: Mensch und Computer, Dresden, Germany, 02.-05.09.2018, DOI: 10.18420/muc2018-ws08-0539,
[Conference item]

2017

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelor thesis]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelor thesis]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelor thesis]

Schürl, Stefan (2017):
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt, [Master thesis]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Conference item]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference item]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
TU Darmstadt, [Master thesis]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Conference item]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference item]

Cordero, Carlos Garcia ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
London, UK, [Online-Edition: https://www.blackhat.com/eu-17/],
[Other]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Conference item]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
TU Darmstadt, [Master thesis]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
TU Darmstadt, [Master thesis]

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.33800.52483,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Conference item]

Singh, Govind (2017):
o Static Bug Finders Identify API Misuses?
TU Darmstadt, [Master thesis]

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,
[Conference item]

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe, London, UK, [Conference item]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
TU Darmstadt, [Master thesis]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Master thesis]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
TU Darmstadt, [Master thesis]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Conference item]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Conference item]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
TU Darmstadt, [Master thesis]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference item]

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. (2017):
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security, DOI: 10.1145/3133956.3134056,
[Conference item]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
TU Darmstadt, [Master thesis]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
TU Darmstadt, [Master thesis]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17), Irvine, California, US, [Conference item]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
In: Critical Information Infrastructures Security (CRITIS), Cham, CH, Springer, Lucca, Italy, 8-13 October 2018, In: Lecture Notes in Computer Science, 10707, [Conference item]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Conference item]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Conference item]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
TU Darmstadt, [Master thesis]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
TU Darmstadt, [Master thesis]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Conference item]

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017, Karlstad, Sweden, [Conference item]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
TU Darmstadt, [Master thesis]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
TU Darmstadt, [Master thesis]

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. (2017):
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
In: The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), 66, DOI: 10.1109/TC.2017.2703808,
[Conference item]

Renaud, Karen ; Maguire, Joseph ; Zimmermann, Verena ; Draper, Steve (2017):
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, Usenix Associaton, In: Learning from Authoritative Security Experiment Results (LASER), Arlington, VA, USA, 18.-19.10.2017, [Conference item]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
TU Darmstadt, [Master thesis]

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2017):
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
In: Proceedings of the 11th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (WiNTECH 2017), [Conference item]

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
TU Darmstadt, [Master thesis]

Späth, Johannes ; Ali, Karim ; Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, [Conference item]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Conference item]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305],
[Conference item]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Conference item]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, S. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Book section]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Conference item]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, S. 1, PP, DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, DOI: 10.1145/3098954.3098968,
[Conference item]

Gerber, Nina ; Zimmermann, Verena
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (Hrsg.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, Gesellschaft für Informatik, Regensburg, Germany, DOI: 10.18420/muc2017-ws05-0405,
[Conference item]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, In: Lecture Notes in Computer Science, 10547, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Conference item]

Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias (2017):
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
In: International Conference on Availability, Reliability and Security (ARES), New York, USA, ACM, Reggio Calabria, Italy, DOI: 10.1145/3098954.3098991,
[Conference item]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, Springer, Oslo, Norway, [Conference item]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master thesis]

Whitefield, Jorden ; Chen, Liqun ; Kargl, Frank ; Paverd, Andrew ; Schneider, Steve ; Treharne, Helen ; Wesemeyer, Stephan (2017):
Formal Analysis of V2X Revocation Protocols.
In: Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings, ISBN 9783319680620,
DOI: 10.1007/978-3-319-68063-7_10,
[Conference item]

Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias
Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (Hrsg.) (2017):
Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, Norderstedt, Gesellschaft für Informatik, S. 269-277, DOI: 10.18420/muc2017-ws05-0404,
[Book section]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelor thesis]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Conference item]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],
[Conference item]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
In: USENIX Security Symposium Poster Session, Vancouver, Canada, [Other]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, DOI: 10.1145/3098954.3098990,
[Conference item]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: 26th USENIX Security Symposium, In: USENIX Security '17, [Conference item]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: 11th USENIX Workshop on Offensive Technologies, In: WOOT, [Conference item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (Hrsg.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference item]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, S. 12-13, 15, [Article]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, S. 37-43, 15, (4), DOI: 10.1109/MSP.2017.3151334,
[Article]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Conference item]

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy, [Conference item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Conference item]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security, DOI: 10.1145/3098954.3098986,
[Conference item]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, S. 14-21, 15, (4), DOI: 10.1109/MSP.2017.3151325,
[Article]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelor thesis]

Traverso, Giulia ; Cordero, Carlos Garcia ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, CA, 28.-30.8. 2017, [Online-Edition: https://www.ucalgary.ca/pst2017/],
[Conference item]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Book]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Conference item]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, S. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Online-Edition: https://encrypto.de/papers/ALSZ17.pdf],
[Article]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
TU Darmstadt, [Master thesis]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, In: LNCS, [Conference item]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, 2017, DOI: 10.1515/popets-2017-0030,
[Conference item]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference item]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, ACM, Santa Barbara, California, United States, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Conference item]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017, [Conference item]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Conference item]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, 10292, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Conference item]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference item]

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Auckland, New Zealand, [Conference item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, [Conference item]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Article]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, [Conference item]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
In: International Conference on Human-Computer Interaction (HCII), Springer, 10292, DOI: 10.1007/978-3-319-58460-7_46,
[Conference item]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelor thesis]

Schulz, Matthias ; Gringoli, Francesco ; Koch, Michael ; Steinmetzer, Daniel ; Hollick, Matthias (2017):
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3098253,
[Conference item]

Schulz, Matthias ; Hollick, Matthias ; Gringoli, Francesco ; Deligeorgopoulos, Efstathios (2017):
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), ACM, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3106022,
[Conference item]

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17), Springer, [Conference item]

Zimmermann, Verena ; Gerber, Nina
Tryfonas, Theo (Hrsg.) (2017):
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
In: Human Aspects of Information Security, Privacy and Trust, Springer, In: 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS), Vancouver, BC, Canada, 09.07.-4.07.2017, [Conference item]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
[Other]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference item]

Billes, Marina ; Møller, Anders ; Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM New York, NY, USA, Barcelona, Spain, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Conference item]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Conference item]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Conference item]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17), [Conference item]

Funke, Sebastian
Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, [Conference item]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference item]

Göpfert, Florian ; van Vredendaal, Christine ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, [Conference item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Conference item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, S. 24-29, 15, (3), DOI: 10.1109/MSP.2017.70,
[Article]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), DOI: 10.1109/ICDCS.2017.283,
[Conference item]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Conference item]

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: International Conference on Trust Management (IFIPTM), Springer International Publishing, Gothenburg, Sweden, In: Trust Management XI, 505, ISSN 1868-4238,
ISBN 978-3-319-59171-1,
DOI: 10.1007/978-3-319-59171-1,
[Online-Edition: https://doi.org/10.1007/978-3-319-59171-1_8],
[Conference item]

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max
Steghöfer, Jan-Philipp ; Esfandiari, Babak (Hrsg.) (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: Trust Management XI, Springer International Publishing, In: 11th IFIP Trust Management Conference, Gothenbug, Sweden, 12/06/17-16/06/2017, DOI: 10.1007/978-3-319-59171-1_8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-59171-1_...],
[Conference item]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Conference item]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2, (2), DOI: 10.1088/2058-9565/aa69cd,
[Article]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Curran Associates, Inc., Buenos Aires, Argentina, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Conference item]

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, ACM, Denver, CO, USA, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Conference item]

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
In: 2017 IEEE Symposium on Security and Privacy (SP 2017), Curran Associates, Inc, San Jose, CA, USA, 2, ISBN 978-1-5090-5534-0,
[Conference item]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Conference item]

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, 502, DOI: 10.1007/978-3-319-58469-0_25,
[Conference item]

Schmitz, Martin ; Steimle, Jürgen ; Huber, Jochen ; Dezfuli, Niloofar ; Mühlhäuser, Max (2017):
Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens.
In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, Denver, Colorado, USA, In: CHI '17, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025663,
[Online-Edition: https://doi.org/10.1145/3025453.3025663],
[Conference item]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Conference item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIACCS 2017 - ACM Asia Conference on Computer and Communications Security, Springer, Abu Dhabi, UAE, In: LNCS, [Conference item]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, In: LNCS, ISBN 978-3-319-55589-8,
[Conference item]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), IEEE, Paris, France, [Conference item]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques, Springer, [Conference item]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Master thesis]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, [Conference item]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, S. 405-426, 2017, (Volume 2017 Issue 1), DOI: 10.13154/tosc.v2017.i1.405-426,
[Article]

Mayer, Peter ; Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters, [Conference item]

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017, Malta, [Conference item]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Conference item]

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, DOI: 10.1145/3052973.3053006,
[Conference item]

Trautmann, Nils ; Ferenczi, Gergely ; Croke, Sarah ; Barnett, Stephen (2017):
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, IOP Publishing, 19, (5), [Online-Edition: http://iopscience.iop.org/article/10.1088/2040-8986/aa67b6],
[Article]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference item]

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, S. 308-313, 41, [Article]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), IEEE, In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Online-Edition: https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber...],
[Conference item]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems, Uppsala, Sweden, [Conference item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Conference item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor thesis]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, Springer, S. 281-297, 16, (3), ISSN 1615-5270,
[Article]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, Springer, [Conference item]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
TU Darmstadt, [Master thesis]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI), Boston, MA, USA, [Conference item]

Toteva, Iva (2017):
Advancing Tool Support for the Detection of Side-Channel.
TU Darmstadt, [Master thesis]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS), San Diego, CA, USA, [Conference item]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference item]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Conference item]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Conference item]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
TU Darmstadt, [Master thesis]

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen (2017):
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, [Article]

Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Porto, Portugal, [Conference item]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, S. 100-113, 71, DOI: 10.1016/j.cose.2017.02.004,
[Article]

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Conference item]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
TU Darmstadt, [Master thesis]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Conference item]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Article]

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Article]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Online-Edition: https://encrypto.de/papers/RSSSK17.pdf],
[Article]

Pottebaum, Jens ; Reuter, Christian (Hrsg.) (2017):
Special Issue on IT-Support for Critical Infrastructure Protection.
Hershey, Pa., IGI Global, 9, (4), ISSN 1937-9420,
[Zeitschriftenheft, -band oder -jahrgang]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference item]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Conference item]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Conference item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Conference item]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Conference item]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Conference item]

Kaufhold, Marc-André ; Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", S. 78-88, 7, (1), [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Article]

Kaufhold, Marc-André ; Reuter, Christian
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (Hrsg.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), Albi, France, In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, [Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...],
[Conference item]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon
Eibl, Maximilian ; Gaedke, Martin (Hrsg.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Conference item]

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Conference item]

Leopold, Inken ; Reuter, Christian
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0350,
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...],
[Conference item]

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), [Conference item]

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), S. 103-121, 102, (C), DOI: 10.1016/j.ijhcs.2016.09.008,
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...],
[Article]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Conference item]

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, S. 137-151, 25, (2), DOI: 10.1108/ICS-03-2017-0014,
[Article]

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), S. 959-1003, 26, (4-6), DOI: 10.1007/s10606-017-9291-z,
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z],
[Article]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Online-Edition: http://arxiv.org/abs/1705.10295],
[Article]

Pinatti de Carvalho, Aparecido Fabiano ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
Sheffield, UK, In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, [Online-Edition: https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-...],
[Conference item]

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian
Eibl, Maximilian ; Gaedke, Martin (Hrsg.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...],
[Conference item]

Pottebaum, Jens ; Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), IGI Global, S. iv-vii, 9, (4), ISSN 1937-9420,
[Online-Edition: http://www.peasec.de/paper/2017/2017_PottebaumReuter_Editori...],
[Article]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...],
[Article]

Reinhold, Thomas ; Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...],
[Other]

Renaud, Karen ; Zimmermann, Verena (2017):
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, IEEE, In: Information Security for South Africa (ISSA), Johannesburg, South Africa, 16.-17.08.2017, [Conference item]

Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws01-0384,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214],
[Conference item]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
Guimar\~es, Portugal, In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal, [Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKn...],
[Conference item]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah
Klafft, Michael (Hrsg.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, Wilhelmshaven, epubli, S. 31-41, [Online-Edition: http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-45272...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas
Paterno, Fabio ; Wulf, Volker (Hrsg.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, Springer, S. 307-332, DOI: 10.1007/978-3-319-60291-2_12,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EU...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker
Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (Hrsg.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), Göttingen, Vandenhoeck & Ruprecht, S. 207-224, DOI: 10.14220/digo.2017.38.1.207,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...],
[Book section]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, S. 1-19, 1, (Issue CSCW), DOI: 10.1145/3134725,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhofe...],
[Article]

Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René
Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (Hrsg.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
Albi, France, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, [Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492_Christ...],
[Conference item]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian
Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (Hrsg.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, Berlin, Germany, Springer, S. 75-88, DOI: 10.1007/978-3-319-44711-7_7,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_...],
[Book section]

Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., DOI: 10.18420/muc2017-ws01-0380,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...],
[Conference item]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, S. 181-195, 16, (2), DOI: 10.1515/icom-2017-0013,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITfo...],
[Article]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena
Leimeister, J. M. ; Brenner, W. (Hrsg.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
St. Gallen, Switzerland, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, [Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/],
[Conference item]

Reuter, Christian ; Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Journal Technological Forecasting and Social Change (TFSC), S. 168-180, 121, DOI: 10.1016/j.techfore.2016.07.038,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2016/2016_reuterspiel...],
[Article]

Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, DOI: 10.18420/muc2017-mci-0352,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...],
[Conference item]

Riebe, Thea ; Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...],
[Other]

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: ESORICS 2017 - European Symposium on Research in Computer Security, Springer, Oslo, Norway, In: LNCS, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Conference item]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Conference item]

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698, [Online-Edition: http://arxiv.org/abs/1703.02698],
[Article]

Tundis, Andrea ; Cordero, Carlos Garcia ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
In: ICCPS 2017: 19th International Conference on Cyber-Physical Systems, WASET, [Conference item]

Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia
Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, DOI: 10.18420/muc2017-ws17-0416,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243],
[Conference item]

von Drachenfels, Magdalena ; Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de, Frankfurt a.M., [Other]

2016

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference item]

Cordero, Carlos Garcia ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Conference item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference, Auckland, New Zealand, [Conference item]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, S. 8-26, 34, (1), DOI: 10.1016/j.jisa.2016.10.003,
[Article]

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords, Springer LNCS, [Conference item]

Sang, Bo ; Petri, Gustavo ; Ardekani, Masoud Saeida ; Ravi, Srivatsan ; Eugster, Patrick (2016):
Programming Scalable Cloud Services with AEON.
In: Middleware '16 Proceedings of the 17th International Middleware Conference, ACM, Trento, Italy, ISBN 978-1-4503-4300-8,
DOI: 10.1145/2988336.2988352,
[Conference item]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Conference item]

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
[Other]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor thesis]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Conference item]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, In: vol 10052, [Conference item]

El Bansarkhani, Rachid ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016, Milan, Italy, [Conference item]

Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori (2016):
FIB efficiency in distributed platforms.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7784452,
[Conference item]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
TU Darmstadt, [Master thesis]

Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David (2016):
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, ISBN 978-1-5090-3281-5/16,
DOI: 10.1109/ICNP.2016.7784459,
[Conference item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Conference item]

Wang, Lin ; Jiao, Lei ; Kliazovich, Dzmitry ; Bouvry, Pascal (2016):
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, DOI: 10.1109/ICNP.2016.7785317,
[Conference item]

Wang, Weihang ; Zheng, Yunhui ; Xing, Xinyu ; Kwon, Yonghwi ; Zhang, Xiangyu ; Eugster, Patrick (2016):
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
In: FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ACM, Seattle, WA, USA, ISBN 978-1-4503-4218-6,
DOI: 10.1145/2950290.2950352,
[Conference item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, ACM, Vienna, Austria, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Conference item]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor thesis]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Article]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Fojtik, Roman (2016):
Salt Synchronization Service.
TU Darmstadt, [Master thesis]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala, ACM, [Conference item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Conference item]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor thesis]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
TU Darmstadt, [Master thesis]

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, S. 64-75, 3, (5), [Article]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, In: CCS '16, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Conference item]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
New York, NY, USA, ACM, In: 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, In: SPSM '16, DOI: 10.1145/2994459.2994463,
[Online-Edition: http://doi.acm.org/10.1145/2994459.2994463],
[Conference item]

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, S. 400-415, 24, (4), DOI: 10.1108/ICS-06-2015-0024,
[Article]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Conference item]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), Philadelphia, PA USA, [Conference item]

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Cordero, Carlos Garcia ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Conference item]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Conference item]

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference item]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Conference item]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, Austria, [Conference item]

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Conference item]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Conference item]

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Conference item]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, DOI: 10.1109/ARES.2016.38,
[Conference item]

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Mohamed, Mohamed Saied Emam ; El Bansarkhani, Rachid ; Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, Springer LNCS, Honolulu, Hi, USA, [Conference item]

Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Conference item]

Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd (2016):
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, American Physical Society, S. 8, [Article]

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, S. 372-385, 24, (4), DOI: 10.1108/ICS-07-2015-0032,
[Article]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Conference item]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
[Other]

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), IEEE, Salzburg, Austria, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Conference item]

El Bansarkhani, Rachid ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
[Other]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Conference item]

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, ACM, Florianopolis, Brazil, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Conference item]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
TU Darmstadt, [Master thesis]

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Conference item]

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (Hrsg.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Cryptographic Hardware and Embedded Systems (CHES 2016), Springer, Santa Barbara, California, USA, In: Lecture Notes in Computer Science (LNCS), 9813, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Conference item]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016, Springer, Tacoma, Washington, USA, [Conference item]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
TU Darmstadt, [Master thesis]

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (Hrsg.) (2016):
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
Springer, Darmstadt, Germany, IFIP AICT 473, [Conference item]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Conference item]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), ACM, DOI: 10.1145/2959424.2959427,
[Online-Edition: https://encrypto.de/papers/CDCSS16.pdf],
[Conference item]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Conference item]

Ermuth, Markus ; Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Conference item]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Conference item]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: Advances in Cryptology – CRYPTO 2016, Springer, In: LNCS, DOI: 10.1007/978-3-662-53015-3_3,
[Conference item]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, 10., [Conference item]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference item]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Conference item]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Conference item]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, [Conference item]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, [Conference item]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Conference item]

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16), [Conference item]

Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Conference item]

Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias (2016):
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942418,
[Conference item]

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2016):
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942419,
[Conference item]

Späth, Johannes ; Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: 30th European Conference on Object-Oriented Programming (ECOOP 2016), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Rome, Italy, ISBN 978-3-95977-014-9,
DOI: 10.4230/LIPIcs.ECOOP.2016.22,
[Conference item]

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: European Conference on Object-Oriented Programming, Dagstuhl, Rome, Italy, [Conference item]

Wang, Weihang ; Zheng, Yunhui ; Liu, Peng ; Xu, Lei ; Zhang, Xiangyu ; Eugster, Patrick (2016):
ARROW: automated repair of races on client-side web pages.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931052,
[Conference item]

Yu, Tingting ; Pradel, Michael (2016):
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931070,
[Conference item]

Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias (2016):
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2939933,
[Conference item]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Conference item]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference item]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Conference item]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
TU Darmstadt, [Master thesis]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Conference item]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, [Conference item]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Conference item]

Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science, Porto, Portugal, [Conference item]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, S. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Article]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
TU Darmstadt, [Master thesis]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016, [Article]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, DOI: 10.1145/2897937.2898027,
[Online-Edition: https://encrypto.de/papers/SZDSSK16.pdf],
[Conference item]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference item]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Conference item]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
Springer, In: SpringerBriefs in Computer Science, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Book]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, [Conference item]

Arzt, Steven ; Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Conference item]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
[Other]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Conference item]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Conference item]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, Springer Fachmedien Wiesbaden, S. 300-304, 40, (5), DOI: 10.1007/s11623-016-0600-3,
[Article]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, San Jose, California, USA, [Conference item]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, S. pp. 61-67, vol. 14, no., (IEEE 14/3), [Article]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Conference item]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Conference item]

Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue (2016):
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884841,
[Conference item]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering, ACM, Austin, Texas, USA, [Conference item]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
Jumping through hoops: why do Java developers struggle with cryptography APIs?
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884790,
[Conference item]

Salvaneschi, Guido ; Mezini, Mira (2016):
Debugging for reactive programming.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, TX, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884815,
[Conference item]

Schmitz, Martin ; Leister, Andreas ; Dezfuli, Niloofar ; Riemann, Jan ; Müller, Florian ; Mühlhäuser, Max (2016):
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
In: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, ACM, San Jose, CA, USA, In: CHI EA'16, ISBN 978-1-4503-4082-3,
DOI: 10.1145/2851581.2892275,
[Online-Edition: https://doi.org/10.1145/2851581.2892275],
[Conference item]

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
In: Datenschutz und Datensicherheit, 5/2016, DOI: 10.1007/s11623-016-0599-5,
[Conference item]

Selakovic, Marija ; Pradel, Michael (2016):
Performance issues and optimizations in JavaScript: an empirical study.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM Association for Computing Machinery, Austin, Texas, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884829,
[Conference item]

Taha, Ahmed ; Metzler, Patrick ; Trapero, Ruben ; Luna, Jesus ; Suri, Neeraj (2016):
Identifying and Utilizing Dependencies Across Cloud Security Services.
In: ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ACM, Xi'an, China, ISBN 978-1-4503-4233-9,
DOI: 10.1145/2897845.2897911,
[Conference item]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference item]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, [Article]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Book]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Conference item]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, Springer Paris, S. 309–322, 71, (7), DOI: 10.1007/s12243-016-0510-2,
[Article]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Other]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, 1575, [Conference item]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Master thesis]

Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max (2016):
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
In: CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, ACM New York, NY, USA, DOI: 10.1145/2851581.2892450,
[Conference item]

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference item]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA), Louvain La Neuve, Belgium, [Conference item]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Conference item]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Article]

Strenzke, Falko (2016):
An Analysis of OpenSSL's Random Number Generator.
In: Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Vienna, Austria, In: Lecture Notes in Computer Science 9665, ISBN 978-3-662-49889-7,
DOI: 10.1007/978-3-662-49890-3 25,
[Conference item]

Trautmann, Nils ; Hauke, Philipp (2016):
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, S. 043029, (18), [Article]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, In: LNCS, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Conference item]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference item]

Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick (2016):
BASEL (Buffer mAnagement SpEcification Language).
In: ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, ACM, Santa Clara, CA, ISBN 978-1-4503-4183-7,
DOI: 10.1145/2881025.2881027,
[Conference item]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP, (99), DOI: 10.1109/JPROC.2015.2512235,
[Article]

Waidner, Michael ; Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe), Dresden, Germany, [Conference item]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Article]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Heraklion, Crete, Greece, [Conference item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, Springer, S. 637-657, 15, (6), ISSN 1615-5270,
[Article]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
[Other]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
TU Darmstadt, [Master thesis]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Conference item]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, [Conference item]

Mariano, Artur ; Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016, Conference Publishing Services (CPS), Heraklion Crete, Greece, [Conference item]

Rasthofer, Siegfried ; Arzt, Steven ; Miltenberger, Marc ; Bodden, Eric (2016):
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
In: Network and Distributed System Security Symposium 2016, Internet Society, San Diego, CA, ISBN 1-891562-41-X,
DOI: 10.14722/ndss.2016.23066,
[Conference item]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Master thesis]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, In: LNCS, 9540, [Conference item]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
TU Darmstadt, [Master thesis]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Conference item]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, [Conference item]

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario
Curry, Edward ; Wahlster, Wolfgang (Hrsg.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, S. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Book section]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Computational Security of Quantum Encryption - QCRYPT 2016, Springer, Wahington, D.C., USA, In: Lecture Notes in Computer Science - ICITS, [Other]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: Proceedings of the 53nd Annual Design Automation Conference, ACM, In: DAC '16, [Conference item]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Conference item]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[PhD thesis]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
TU Darmstadt, [Master thesis]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5850],
[PhD thesis]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Conference item]

Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2016):
Call graph construction for Java libraries.
In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, DOI: 10.1145/2950290.2950312,
[Conference item]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference, [Conference item]

Trautmann, Nils ; Alber, Gernot (2016):
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, S. 9, DOI: 10.1103/PhysRevA.93.053807,
[Article]

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Conference item]

2015

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: Using Channel State Information for Tamper Detection in the Internet of Things, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Conference item]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Conference item]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Other]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Book]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society, S. 10, (92), [Article]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Book]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: Proceedings of the 31st Annual Computer Security Applications Conference, ACM, Los Angeles, CA, USA, In: ACSAC 2015, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Conference item]

Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian
Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (Hrsg.) (2015):
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., Springer Cham, Kyoto, Japan, In: Lecture Notes in Computer Science 9404, ISBN 978-3-319-26361-8,
DOI: 10.1007/978-3-319-26362-5,
[Conference item]

Schlipf, Mario (2015):
Password Policy Crawler.
TU Darmstadt, [Master thesis]

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015):
Certification of ICTs in Elections.
nternational Institute for Democracy and Electoral Assistance, 1, [Book]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), S. 749-762, 31, (6), [Article]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, In: LNCS, [Conference item]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference item]

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), Washington, DC, USA, IEEE Computer Society, In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Online-Edition: https://dl.acm.org/citation.cfm?id=2916135&picked=prox],
[Conference item]

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, In: LNCS, [Conference item]

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,
[Conference item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Conference item]

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R.
Andy, Gill (Hrsg.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, ACM, Pittsburgh, PA, USA, In: OOPSLA 2015, 50, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Conference item]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, DOI: 10.1145/2810103.2813678,
[Online-Edition: https://encrypto.de/papers/DDKSSZ15.pdf],
[Conference item]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), ACM, Denver, Colorado, USA, [Conference item]

Fischlin, Marc ; Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ACM, Denver, Colorado, USA, In: WPES '15, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Conference item]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, S. 747-752, 11/2015, DOI: 10.1007/s11623-015-0512-7,
[Article]

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, 92, 062335, DOI: 10.1103/PhysRevA.92.062335,
[Article]

Saissi, Habib ; Bokor, Peter ; Suri, Neeraj (2015):
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, [Conference item]

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), Denver, Colorado, USA, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Conference item]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, S. 14, (16), [Article]

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: Annual Privacy Forum (APF2015), Springer, Luxembourg, In: LNCS, [Conference item]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Conference item]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, Paris, France, [Conference item]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, [Conference item]

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), poster proceedings, IEEE, Florence, Italy, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Conference item]

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Conference item]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie
Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (Hrsg.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, [Conference item]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, Springer, Vienna, Austria, In: LNCS, [Conference item]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015):
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP.
In: ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing, in press, Beijing, China, [Conference item]

Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, [Conference item]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS, Vienna, Austria, [Conference item]

Shulman, Haya ; Waidner, Michael
Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (Hrsg.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, Springer-Verlag New York, Inc., Vienna, Austria, In: Lecture Notes in Computer Science 9326, 1, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Conference item]

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS), Florence, DOI: 10.1109/CNS.2015.7346844,
[Conference item]

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, S. 352-368, (35), [Article]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem
Foresti, Sara (Hrsg.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, [Conference item]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference item]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Conference item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Conference item]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, Springer, Santa Barbara, CA, USA, [Conference item]

Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ACM, Bergamo, Italy, In: ESEC/FSE 2015, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Conference item]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Conference item]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Conference item]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Conference item]

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Conference item]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
[Other]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, DOI: 10.1109/ARES.2015.75,
[Conference item]

Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri (2015):
Private Membership Test for Bloom Filters.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Conference item]

Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu (2015):
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Conference item]

Nyman, Thomas ; McGillion, Brian ; Asokan, N. (2015):
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: 8th International Conference on Trust & Trustworthy Computing, Springer International Publishing, Heraklion, Crete, Greece, In: Lecture Notes in Computer Science, 9229, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_4,
[Conference item]

Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, [Conference item]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Online-Edition: https://encrypto.de/papers/PSSZ15.pdf],
[Conference item]

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), [Conference item]

Tamrakar, Sandeep ; Ekberg, Jan-Erik ; Laitinen, Pekka (2015):
On Rehoming the Electronic Id to TEEs.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Conference item]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin
Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (Hrsg.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, In: Trust and Trustworthy Computing, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Conference item]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
[Other]

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society, Verona, Italy, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Conference item]

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Article]

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, S. 13-28, 20, DOI: 10.1016/j.pmcj.2014.09.001,
[Article]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, In: Weiterdenken, [Conference item]

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, ACM, Baltimore, MD, USA, In: ISSTA 2015, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Conference item]

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
TU Darmstadt, [Master thesis]

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Article]

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York, [Conference item]

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, Prague, Czech Republic, [Conference item]

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Conference item]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC), [Conference item]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Conference item]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, DOI: 10.1109/ICCW.2015.7247581,
[Conference item]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, 4, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Conference item]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Conference item]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (Hrsg.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, S. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Book section]

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), ACM, Vancouver, Canada, DOI: 10.4108/icst.tridentcom.2015.259694,
[Conference item]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Conference item]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Conference item]

Schäfer, Marcel ; Mair, Sebastian ; Berchtold, Waldemar ; Steinebach, Martin (2015):
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
In: IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, Portland, Oregon, ISBN 978-1-4503-3587-4,
DOI: 10.1145/2756601.2756611,
[Conference item]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Conference item]

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Conference item]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Master thesis]

Wilk, Stefan ; Schönherr, Sophie ; Stohr, Denny ; Effelsberg, Wolfgang (2015):
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
In: Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, ACM, Brussels, Belgium, In: TVX '15, ISBN 978-1-4503-3526-3,
DOI: 10.1145/2745197.2745205,
[Conference item]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
TU Darmstadt, [Master thesis]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
TU Darmstadt, [Master thesis]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
SecuMedia Verlag, TU Darmstadt, In: Tagungsband zum Deutschen IT-Sicherheitskonkress, 14, [Master thesis]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, In: IFIP Advances in Information and Communication Technology, DOI: 10.1007/978-3-319-18500-2_8,
[Conference item]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference item]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Conference item]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Conference item]

Pradel, Michael ; Schuh, Parker ; Sen, Koushik (2015):
TypeDevil: dynamic type inconsistency analysis for JavaScript.
In: Proceedings of the 37th International Conference on Software Engineering, IEEE Press, Florence, Italy, 1, ISBN 978-1-4799-1934-5,
DOI: 10.1109/ICSE.2015.51,
[Conference item]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Conference item]

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, IEEE, FAIRMONT, SAN JOSE, CA, [Conference item]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, DOI: 10.1109/SP.2015.32,
[Online-Edition: https://encrypto.de/papers/SHSSK15.pdf],
[Conference item]

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, S. 16-32, 50, [Article]

Winter, Stefan ; Piper, Thorsten ; Schwahn, Oliver ; Natella, Roberto ; Suri, Neeraj ; Cotroneo, Domenico (2015):
GRINDER: On Reusability of Fault Injection Tools.
In: Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz, [Conference item]

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah (2015):
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
In: 3rd International Workshop on Release Engineering, Florence, Italy, [Conference item]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Conference item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Conference item]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, S. 025501, IOP Publishing, [Article]

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015):
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
[Report]

Tancreti, Matthew ; Sundaram, Vinaitheerthan ; Bagchi, Saurabh ; Eugster, Patrick (2015):
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks.
In: Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM, Seattle, WA, USA, In: IPSN '15, ISBN 978-1-4503-3475-4,
DOI: 10.1145/2737095.2737096,
[Conference item]

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. (2015):
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: PHYSICAL REVIEW LETTERS, S. 173601, APS, [Article]

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Evaluation of User Feedback in Smart Home for Situational Context Identification.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8426-8,
DOI: 10.1109/PERCOMW.2015.7133987,
[Conference item]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Dodis, Yevgeniy ; Nielsen, Arno Buus (Hrsg.) (2015):
Random-Oracle Uninstantiability from Indistinguishability Obfuscation.
In: Theory of Cryptography. TCC 2015., Springer, Warsaw, Poland, In: Lecture Notes in Computer Science 9015, ISBN 978-3-662-46497-7,
DOI: 10.1007/978-3-662-46497-7_17,
[Conference item]

Burgstahler, D. ; Pelzer, Matthias ; Lotz, Andreas ; Knapp, Fabian ; Pu, Hongjun ; Rueckelt, Tobias ; Steinmetz, Ralf (2015):
A Concept for a C2X-based Crossroad Assistant.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, St. Louis, MO, USA, ISBN 978-1-4799-8425-1,
DOI: 10.1109/PERCOMW.2015.7134063,
[Conference item]

Dogan, Ferit (2015):
Design and Implementation of Plug-ins for JCrypTool.
TU Darmstadt, [Master thesis]

Nguyen, The An Binh ; Englert, Frank ; Farr, Simon ; Gottron, Christian ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case.
In: International Workshop on Pervasive Networks for Emergency Management (PerNEM), IEEE, [Conference item]

Shannon, Greg ; Waidner, Michael ; Sonalker, Anuja (2015):
Ask The Experts: Cybersecurity.
[Report]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Reinheimer, Benjamin (2015):
NoPhish App Evaluation: Lab and Retention Study.
In: NDSS Workshop on Usable Security 2015, Internet Society, San Diego, [Conference item]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS), [Conference item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Online-Edition: https://encrypto.de/papers/DSZ15.pdf],
[Conference item]

Gerber, Paul ; Volkamer, Melanie (2015):
Usability und Privacy im Android Ökosystem.
In: Datenschutz und Datensicherheit, S. 108 - 113, 2/2015, DOI: 10.1007/s11623-015-0375-y,
[Article]

Gerber, Paul ; Volkamer, Melanie ; Renaud, Karen (2015):
Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy.
In: ACM SIGCAS Computers and Society, S. 16-21, 45, (1), DOI: 10.1145/2738210.2738214,
[Article]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, S. 80-84, (19), [Article]

Waidner, Michael (2015):
Wir müssen die Airbus-Idee für die europäische IT-Sicherheit wiederbeleben.
[Report]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, S. 5-13, [Article]

Busold, Christoph ; Heuser, Stephan ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Asokan, Nadarajah (2015):
Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
In: Financial Cryptography and Data Security, [Conference item]

Dmitrienko, Alexandra ; Heuser, Stephan ; Nguyen, Thien Duc ; da Silva Ramos, Marcos ; Rein, Andre ; Sadeghi, Ahmad-Reza (2015):
Market-driven Code Provisioning to Mobile Secure Hardware.
In: Financial Cryptography and Data Security, [Conference item]

El Bansarkhani, Rachid ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, S. 20, [Article]

El Bansarkhani, Rachid ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, Springer, Isla Verde, Puerto Rico, [Conference item]

Ghiglieri, Marco (2015):
PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices.
In: IEEE CCNC, Las Vegas, NV, [Conference item]

Maseberg, Sönke ; Bodden, Eric ; Kus, Mehmet ; Brucker, Achim ; Rasthofer, Siegfried ; Berger, Bernhard ; Huber, Stephan ; Sohr, Karsten ; Gerber, Paul ; Volkamer, Melanie (2015):
Zertifizierte Apps.
In: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, SecuMedia, Bad-Godesberg in Bonn Gau-Algesheim, ISBN 978-3-922746-94-2,
[Conference item]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS), [Conference item]

Butin, Denis ; Gazdag, Stefan-Lukas ; Buchmann, Johannes (2015):
Real-World Post-Quantum Digital Signatures.
In: Cybersecurity & Privacy Innovation Forum (CSP Forum 2015), Springer CCIS, Brussels, Belgium, [Conference item]

Butin, Denis ; Métayer, Daniel Le (2015):
A Guide to End-to-End Privacy Accountability.
In: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015), IEEE, Florence, Italy, [Conference item]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium), Helsinki, Finland, [Conference item]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, S. 765, 2015, [Article]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, US, [Conference item]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security, Springer, Mohammed V University, Rabat, Morocco, [Conference item]

Krauß, Christoph ; Waidner, Michael (2015):
IT-Sicherheit und Datenschutz im vernetzten Fahrzeug.
In: >Datenschutz und Datensicherheit DuD, S. 383-387, 39(6), [Article]

Miettinen, Markus ; Asokan, N. ; Koushanfar, Farinaz ; Nguyen, Thien Duc ; Rios, Jon ; Sadeghi, Ahmad-Reza ; Sobhani, Majid ; Yellapantula, Sudha (2015):
I know where you are: Proofs of Presence resilient to malicious provers.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

Sadeghi, Ahmad-Reza ; Davi, Lucas ; Larsen, Per (2015):
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Conference item]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie (2015):
Über die Wirksamkeit von Anti-Phishing-Training.
In: Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, A. Weisbecker, M. Burmester & A. Schmidt, Stuttgart, [Conference item]

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015, Sofia, Bulgaria, [Conference item]

2014

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2014):
Hot-Hardening: Getting More Out of Your Security Settings.
In: Proceedings of the 30th Annual Computer Security Applications Conference, ACM, New Orleans, Louisiana, USA, In: ACSAC '14, ISBN 978-1-4503-3005-3,
DOI: 10.1145/2664243.2664246,
[Conference item]

Brzuska, Christina ; Mittelbach, Arno
Sarkar, Palash ; Iwata, Tetsu (Hrsg.) (2014):
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., Berlin, Heidelberg, Springer, S. 142-161, DOI: 10.1007/978-3-662-45608-8_8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-662-45608-8_...],
[Book section]

Charfi, Ahmed (2014):
SAT-solving in Algebraic cryptanalysis.
TU Darmstadt, [Master thesis]

Culhane, William ; Jayaram, K. R. ; Eugster, Patrick (2014):
Fast, Expressive Top-k Matching.
In: Proceedings of the 15th International Middleware Conference, ACM, Bordeaux, France, In: Middleware '14, ISBN 978-1-4503-2785-5,
DOI: 10.1145/2663165.2663326,
[Conference item]

Faraon, Montathar ; Stenberg, Georg J. H. ; Budurushi, Jurlind ; Kaipainen, Mauri
Parycek, Peter ; Sachs, Michael ; Skoric, Marko (Hrsg.) (2014):
Positive but skeptical - A study of attitudes towards Internet voting in Sweden.
In: CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, Münster: Edition Donau-Universität Krems, Hong Kong, ISBN 978-3-902505-71-2,
[Conference item]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, USA, [Conference item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (Hrsg.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: Cryptology and Network Security (13th International Conference, CANS 2014), Springer, Heraklion, Crete, Greece, In: LNCS, ISBN 978-3-319-12280-9,
[Conference item]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, In: ACSAC, [Conference item]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC), ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference item]

Mayer, Peter ; Volkamer, Melanie ; Kauer, Michaela
Prakash, Atul ; Shyamasundar, Rudrapatna (Hrsg.) (2014):
Authentication Schemes - Comparison and Effective Password Spaces.
In: Information Systems Security : International Conference on Information Systems Security (ICISS), Berlin, Cham, Springer International Publishing, In: International Conference on Information Systems Security (ICISS), Hyderabad, India, 16-20.12.2014, In: Lecture notes in computer science, 8880, ISBN 978-3-319-13840-4,
DOI: 10.1007/978-3-319-13841-1_12,
[Conference item]

Müller, Jan (2014):
PriSEMD - A Privacy-Friendly Approach to Analyze and Measure Smart Entertainment Devices.
TU Darmstadt, [Master thesis]

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. (2014):
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: PHYSICAL REVIEW A 90, S. 063814, [Article]

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Conference item]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
Morgan & Claypool Publishers, In: Synthesis Lectures on Information Security, Privacy, and Trust, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Book]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, Scottsdale, AZ, USA, In: ACM, [Conference item]

Canova, Gamze ; Volkamer, Melanie ; Weiler, Simon (2014):
Poster: Password Entering and Transmission Security.
Scottsdale, Arizona, [Other]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
ACM, In: 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Online-Edition: https://encrypto.de/papers/DHS14.pdf],
[Conference item]

Ghiglieri, Marco
Schiele, Otto ; Schön, Willi (Hrsg.) (2014):
HbbTV – aktueller Stand 2014.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 11/2014, [Conference item]

Habib, Sheikh Mahbub ; Ries, Sebastian ; Varikkattu, Prabhu ; Mühlhäuser, Max (2014):
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
In: Security and Communication Networks, S. 2185-2200, 7, (11), DOI: 10.1002/sec.748,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.748],
[Article]

Horsch, Moritz ; Tuengerthal, Max ; Wich, Tobias (2014):
SAML Privacy-Enhancing Profile.
In: Open Identity Summit 2014, GI, Stuttgart, Germany, In: LNI, P-237, [Conference item]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, Scottsdale, AZ, USA, In: ACM, DOI: 10.1145/2665943.2665962,
[Conference item]

Miettinen, Markus ; Asokan, N. ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Sobhani, Majid (2014):
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
In: Proc. ACM Conference on Computer and Communications Security, ACM, DOI: 10.1145/2660267.2660334,
[Conference item]

Sadeghi, Ahmad-Reza ; Brasser, Ferdinand (2014):
Swap and Play: Live Updating Hypervisors and Its Application to Xen.
In: CCSW 2014: The ACM Cloud Computing Security Workshop Proceedings, DOI: http://dl.acm.org/citation.cfm?doid=2664168.2664173,
[Conference item]

Shirazi, Fatemeh ; Volkamer, Melanie (2014):
What Deters Jane from Preventing Identification and Tracking on the Web?
In: 13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), ACM, Scottsdale, Arizona, USA, ISBN 978-1-4503-3148-7,
DOI: 10.1145/2665943.2665963,
[Conference item]

Shulman, Haya ; Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS), ACM, Scottsdale, Arizona, USA, [Conference item]

Vieten, Jannik (2014):
Evaluierung des U-LP Verschlüsselungsverfahrens in der Praxis.
TU Darmstadt, [Master thesis]

Dessouky, Ghada ; Klaiber, Michael J. ; Bailey, Donald G. ; Simon, Svenja (2014):
Adaptive Dynamic On-chip Memory Management for FPGA-based Reconfigurable Architectures.
In: 24th International Conference on Field Programmable Logic and Applications (FPL), München, Deutschland, 2014, [Conference item]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session), San Francisco, USA, [Conference item]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014, Istanbul, Turkey, [Conference item]

Budurushi, Jurlind ; Renaud, Karen ; Volkamer, Melanie ; Woide, Marcel
Krimmer, Robert ; Volkamer, Melanie (Hrsg.) (2014):
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
In: 6th International Conference on Electronic Voting (EVOTE), IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001140,
[Conference item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations.
In: BalkancryptSec 2014 - International Conference on Cryptography and Information security, Springer, Istanbul, Turkey, In: LNCS, ISBN 978-3-319-21356-9,
DOI: 10.1007/978-3-319-21356-9_11,
[Conference item]

Ding, Jintai ; Petzoldt, Albrecht ; Wang, Lih-Chung (2014):
The Cubic Simple Matrix Encryption Scheme.
In: PQCrypto 2014, Springer, Waterloo, Canada, In: LNCS, [Conference item]

Kulyk, Oksana ; Feier, Christian ; Köster, Thorben (2014):
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
In: 6th International Conference on Electronic Voting - EVOTE 2014, IEEE, Lochau, ISBN 978-3-200-03697-0,
DOI: 10.1109/EVOTE.2014.7001142,
[Conference item]

Mitschke, Ralf ; Erdweg, Sebastian ; Köhler, Mirko ; Mezini, Mira ; Salvaneschi, Guido (2014):
i3QL: Language-Integrated Live Data Views.
In: Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, ACM, Portland, Oregon, USA, In: OOPSLA '14, ISBN 978-1-4503-2585-1,
DOI: 10.1145/2714064.2660242,
[Conference item]

Neumann, Stephan ; Feier, Christian ; Sahin, Perihan ; Fach, Sebastian (2014):
Pretty Understandable Democracy 2.0.
In: 6th International Conference on Electronic Voting (EVOTE), TUT Press, Lochau, [Conference item]

Pradel, Michael ; Schuh, Parker ; Necula, George ; Sen, Koushik (2014):
EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation.
In: Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, ACM, Portland, OR, USA, In: OOPSLA '14, 49, ISBN 978-1-4503-2585-1,
DOI: 10.1145/2714064.2660233,
[Conference item]

Schlipf, Mario (2014):
Passwort-Richtlinien.
TU Darmstadt, [Master thesis]

Stopczynski, Martin ; Zugelder, Michael (2014):
Reducing User Tracking through Automatic Web Site State Isolations.
In: Information Security, Springer, In: Lecture Notes in Computer Science, 8783, ISBN 978-3-319-13256-3,
DOI: 10.1007/978-3-319-13257-0_18,
[Conference item]

Suri, Neeraj ; Germanus, Daniel ; Roos, Stefanie ; Strufe, Thorsten (2014):
Mitigating Eclipse Attacks in Peer-to-Peer Networks.
In: In Proceedings of IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, USA, [Conference item]

Ambrosin, Moreno ; Busold, Christoph ; Conti, Mauro ; Sadeghi, Ahmad-Reza ; Schunter, Matthias
Kutylowski, Miroslaw ; Vaidya, Jaideep (Hrsg.) (2014):
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution Over Untrusted Cache-enabled Networks.
In: Computer Security - ESORICS 2014, Springer International Publishing, S. 76-93, DOI: 10.1007/978-3-319-11203-9_5,
[Book section]

Bartsch, Steffen ; Boos, Carina ; Canova, Gamze ; Dyck, Dominic ; Henhapl, Birgit ; Schultheis, Michael ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (Hrsg.) (2014):
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
In: Workshop RiskKom der GI-FGn SECMGT & ECOM auf der Informatik 2014, Gesellschaft für Informatik, Bonn, [Conference item]

Buchmann, Johannes ; El Bansarkhani, Rachid ; Hauke, Sascha
Brunetti, Gino ; Feld, Thomas ; Heuser, Lutz ; Schnittner, Joachim ; Webel, Christian (Hrsg.) (2014):
Towards Security Solutions for Emergent Business Software.
In: Future Business Software Conference 2012, Springer, St. Leon-Rot, Germany, [Conference item]

Budurushi, Jurlind ; Neumann, Stephan ; Shala, Genc ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (Hrsg.) (2014):
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference item]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland
Mauw, Sjouke ; Jensen, Christian Damsgaard (Hrsg.) (2014):
NoPhish: An Anti-Phishing Education App.
In: 10th International Workshop on Security and Trust Management in conjunction with ESORICS 2014, Springer International Publishing, Wroclaw, Poland, In: Lecture Notes in Computer Science, 8743, [Conference item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
In: 7th International Conference on Security of Information and Networks (SIN 2014), Glasgow, UK, [Conference item]

Dagdelen, Özgür ; El Bansarkhani, Rachid ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014, Florianópolis, Brazil, [Conference item]

Feier, Christian ; Neumann, Stephan ; Volkamer, Melanie
Plödereder, Erhard ; Grunske, Lars ; Schneider, Eric ; Ull, Dominik (Hrsg.) (2014):
Coercion-Resistant Internet Voting in Practice.
In: INF14 - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Köllen Druck+Verlag GmbH, Bonn, Stuttgart, In: Lecture Notes in Informatics (LNI), 232, ISBN 978-3-88579-626-8,
[Conference item]

Geihs, Matthias ; Cabarcas, Daniel
Aranha, Diego F. ; Menezes, Alfred (Hrsg.) (2014):
Efficient Integer Encoding for Homomorphic Encryption via Ring Isomorphisms.
In: 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, Springer, Florianópolis, Brazil, In: LNCS, ISBN 978-3-319-16295-9,
[Conference item]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014, Berlin, Germany, [Conference item]

Lillack, Max ; Kästner, Christian ; Bodden, Eric (2014):
Tracking Load-time Configuration Option.
In: Proceedings of the 29th ACM/IEEE international conference on Automated software engineering, ACM, Vasteras, Sweden, In: ASE '14, ISBN 978-1-4503-3013-8,
DOI: 10.1145/2642937.2643001,
[Conference item]

Neumann, Stephan ; Kulyk, Oksana ; Volkamer, Melanie (2014):
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
In: 9th International Workshop on Frontiers in Availability, Reliability and Security - FARES 2014, IEEE, Fribourg, Switzerland, [Conference item]

Neumann, Stephan ; Olembo, Maina ; Renaud, Karen ; Volkamer, Melanie
Kö, Andrea ; Francesconi, Enrico (Hrsg.) (2014):
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
In: 3rd International Conference on Electronic Government and the Information Systems Perspective, Springer, München, In: Lecture Notes in Computer Science, 8650, ISBN 978-3-319-10177-4,
[Conference item]

Riecker, Michael ; Yuan, Dingwen ; El Bansarkhani, Rachid ; Hollick, Matthias (2014):
Patrolling wireless sensor networks: Randomized intrusion detection.
In: 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet ’14, Montreal, QC, Canada, [Conference item]

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar (2014):
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and Security Pages, IEEE Computer Society, Fribourg, Switzerland, In: ARES '14, ISBN 978-1-4799-4223-7,
DOI: 10.1109/ARES.2014.32,
[Conference item]

Wiesmaier, Alexander ; Braun, Johannes ; Horsch, Moritz (2014):
EP 2639997 - Method and system for secure access of a first computer to a second computer.
[Norm, Patent, Standard]

Asokan, N. ; Ekberg, Jan-Erik ; Kostiainen, Kari ; Rajan, Anand ; Rozas, Carlos ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2014):
Mobile Trusted Computing.
In: Proceedings of the IEEE, S. 1189-1206, 102, (8), [Article]

Brzuska, Christina ; Farshim, Pooya ; Mittelbach, Arno
Garay, Arno A. ; Gennaro, Rosario (Hrsg.) (2014):
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources.
In: Advances in Cryptology – CRYPTO 2014. 34th Annual Cryptology Conference. Santa Barbara, CA, USA. August 17-21, 2014. Proceedings., Springer, Santa Barbara, CA, USA, In: Lecture Notes in Computer Science 8616, 1, ISBN 978-3-662-44370-5,
DOI: 10.1007/978-3-662-44371-2_11,
[Conference item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza (2014):
The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques.
In: BlackHat USA, [Conference item]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
In: 23rd USENIX Security Symposium, [Conference item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/DSZ14.pdf],
[Conference item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
In: 23rd USENIX Security Symposium, [Conference item]

Kogan, Kirill ; Nikolenko, Sergey I. ; Rottenstreich, Ori ; Culhane, William ; Eugster, Patrick (2014):
SAX-PAC (Scalable And eXpressive PAcket Classification).
In: Proceedings of the 2014 ACM conference on SIGCOMM, ACM, Chicago, Illinois, USA, In: SIGCOMM '14, ISBN 978-1-4503-2836-4,
DOI: 10.1145/2619239.2626294,
[Conference item]

Meyer, Christopher ; Somorovsky, Juraj ; Weiss, Eugen ; Schwenk, Jörg ; Schinzel, Sebastian ; Tews, Erik (2014):
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
In: Proceedings of the 23rd USENIX conference on Security Symposium, USENIX Association, San Diego, CA, USA, In: SEC'14, ISBN 978 -1- 931971-15 -7,
[Conference item]

Oswald, Florian (2014):
Secure Session Protocol - Concept and Implementation of a Protocol to Securely Operate Web Applications.
TU Darmstadt, [Master thesis]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/PSZ14.pdf],
[Conference item]

Suri, Neeraj ; Vateva-Gurova, Tsvetoslava ; Luna, Jesus ; Pellegrino, Giancarlo (2014):
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
In: Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, [Conference item]

Conrad, Bernd ; Shirazi, Fatemeh (2014):
A Survey on Tor and I2P.
In: Ninth International Conference on Internet Monitoring and Protection (ICIMP2014), Paris, France, [Conference item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
Security Analysis of Mobile Two-Factor Authentication Schemes.
In: Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition, 18, (4), [Article]

Ekberg, Jan-Erik ; Kostiainen, Kari ; Asokan, N. (2014):
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, S. 29-37, 12, (4), DOI: 10.1109/MSP.2014.38,
[Article]

Nyman, Thomas ; Ekberg, Jan-Erik ; Asokan, N. (2014):
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023, [Article]

Renkema-Padmos, Arne ; Baum, Jerome ; Renaud, Karen ; Volkamer, Melanie (2014):
Shake hands to bedevil: Securing email with wearable technology.
In: Proceedings of the eighth international symposium on human aspects of information security and assurance, Lulu Press, Raleigh, [Conference item]

Suri, Neeraj ; Lanzaro, Anna ; Natella, Roberto ; Winter, Stefan ; Cotroneo, Domenico (2014):
An Empirical Study of Injected versus Actual Interface Errors.
In: Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA), San Jose, CA, USA, [Conference item]

Volkamer, Melanie ; Renaud, Karen ; Renkema-Padmos, Arne (2014):
Why doesn't Jane protect her privacy?
In: Privacy Enhancing Technologies - 14th International Symposium, PETS, Springer, Amsterdam, The Netherlands, In: Lecture Notes in Computer Science, ISBN 978-3-319-08505-0,
DOI: 10.1007/978-3-319-08506-7_13,
[Conference item]

Arzt, Steven ; Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: International Conference on Software Engineering(ICSE) 2014, DOI: 10.1145/2568225.2568243,
[Conference item]

Braun, Johannes ; Buchmann, Johannes ; Mullan, Ciaran ; Wiesmaier, Alexander (2014):
Long Term Confidentiality: a Survey.
In: Designs, Codes and Cryptography, S. 459-478, 71, (3), DOI: 10.1007/s10623-012-9747-6,
[Article]

Braun, Johannes ; Volk, Florian ; Classen, Jiska ; Buchmann, Johannes ; Mühlhäuser, Max (2014):
CA Trust Management for the Web PKI.
In: IOS Press: Journal of Computer Security, 22(6), 2014, S. 913-959 (2014), [Article]

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Online-Edition: https://encrypto.de/papers/BCFPSZ14.pdf],
[Conference item]

Budurushi, Jurlind ; Stockhardt, Simon ; Woide, Marcel ; Volkamer, Melanie
Tryfonas, Theo ; Askoxylakis, Ioannis (Hrsg.) (2014):
Paper Audit Trails and Voters' Privacy Concerns.
In: Human Aspects of Information Security, Privacy and Trust, Springer International Publishing Switzerland, Heraklion, Greece, In: LNCS, 8533, [Conference item]

Davi, Lucas ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2014):
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
In: 51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing, [Conference item]

Kolb, Nina ; Bartsch, Steffen ; Volkamer, Melanie ; Vogt, Joachim (2014):
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
In: Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science, Springer, Cham, Heraklion, Greece, 8533, ISBN 978-3-319-07620-1,
DOI: 10.1007/978-3-319-07620-1_16,
[Conference item]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, ACM Press, [Conference item]

Lagerspetz, E. ; Truong, Hien Thi Thu ; Tarkoma, S. ; Asokan, N. (2014):
MDoctor: A Mobile Malware Prognosis Application.
In: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, DOI: 10.1109/ICDCSW.2014.36,
[Conference item]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2014):
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, DOI: 10.1145/2590296.2590337,
[Conference item]

Mustafa, Hossen ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Xu, Wenyuan (2014):
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks.
In: 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), [Conference item]

Renaud, Karen ; Volkamer, Melanie ; Maguire, Joseph (2014):
ACCESS: Describing and Contrasting Authentication Mechanisms.
In: Human Aspects of Information Security, Privacy, and Trust, Springer, Heraklion, Crete, In: 8533, ISBN 978-3-319-07619-5,
DOI: 10.1007/978-3-319-07620-1_17,
[Conference item]

Schmachtenberg, Max ; Strufe, Thorsten ; Paulheim, Heiko (2014):
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web.
In: Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), [Conference item]

Schneider, Matthias ; Schneider, Thomas (2014):
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, DOI: 10.1145/2600918.2600927,
[Online-Edition: https://encrypto.de/papers/SS14.pdf],
[Conference item]

Bartsch, Steffen ; Volkamer, Melanie (2014):
Expert Knowledge for Contextualized Warnings.
[Report]

Brzuska, Christina ; Mittelbach, Arno (2014):
Using Indistinguishability Obfuscation via UCEs.
In: Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., Berlin, Heidelberg, Springer, S. 22-141, DOI: 10.1007/978-3-662-45608-8,
[Book section]

Budurushi, Jurlind ; Volkamer, Melanie
Parycek, Peter ; Edelmann, Noella (Hrsg.) (2014):
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
In: International Conference for E-Democracy and Open Government 2014, Edition Donau-Universität Krems, Danube University Krems, ISBN 978-3-902505-35-4,
[Conference item]

Ghiglieri, Marco (2014):
I Know What You Watched Last Sunday - A New Survey Of Privacy In HbbTV.
San Jose, California, [Other]

Ghiglieri, Marco (2014):
Incorrect HTTPS Certificate Validation in Samsung Smart TVs.
(TUD-CS-2014-0802), [Report]

Kremer, Steve ; Künnemann, Robert (2014):
Automated analysis of security protocols with global state.
In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, IEEE Computer Society, San Jose, CA, USA, In: SP '14, ISBN 978-1-4799-4686-0,
DOI: 10.1109/SP.2014.18,
[Conference item]

Mittelbach, Arno
Oswald, Elisabeth ; Nguyen, Arno Q. (Hrsg.) (2014):
Salvaging Indifferentiability in a Multi-stage Setting.
In: Advances in Cryptology – EUROCRYPT 2014. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings., Springer, Copenhagen, Denmark, In: LNCS 8441, ISBN 978-3-642-55219-9,
DOI: 10.1007/978-3-642-55220-5_33,
[Conference item]

Budurushi, Jurlind ; Jöris, Roman ; Volkamer, Melanie (2014):
Implementing and evaluating a software-independent voting system for polling station elections.
In: Journal of Information Security and Applications, S. 1-10, 19, (2), DOI: 10.1016/j.jisa.2014.03.001,
[Article]

Christin, Delphine ; Pons-Sorolla, Daniel Rodriguez ; Hollick, Matthias ; Kanhere, Salil (2014):
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications.
In: International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), S. 1-6, [Book section]

Classen, Jiska (2014):
Reputation Systems for Trust Management in the Web PKI.
TU Darmstadt, [Master thesis]

Conrad, Bernd (2014):
Analyzing the Effectiveness of DoS Attacks on Tor.
TU Darmstadt, [Master thesis]

Davi, Lucas ; Lehmann, Daniel ; Sadeghi, Ahmad-Reza ; Monrose, Fabian (2014):
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
[Report]

Franke, Daniel (2014):
Risk Simulations for the Web PKI.
Darmstadt, TU Darmstadt, [Master thesis]

Koeberl, Patrick ; Schulz, Steffen ; Sadeghi, Ahmad-Reza ; Varadharajan, Vijay (2014):
TrustLite: A Security Architecture for Tiny Embedded Devices.
In: European Conference on Computer Systems (EuroSys), ACM, Amsterdam, Netherlands, DOI: 10.1145/2592798.2592824,
[Conference item]

Renkema-Padmos, Arne ; Volkamer, Melanie ; Renaud, Karen (2014):
Building Castles in Quicksand: Blueprints of a Crowdsourced Study.
In: Extended abstracts of the 32nd CHI conference on human factors in computing systems, ACM Digital Library, New York, [Conference item]

Diaconita, Irina ; Reinhardt, Andreas ; Englert, Frank ; Christin, Delphine ; Steinmetz, Ralf (2014):
Do You Hear What I Hear? Using Acoustic Probing to Detect Smartphone Locations.
In: 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), IEEE, Budapest, Hungary, In: PerCom Workshops 2014, ISBN 978-1-4799-2737-1,
DOI: 10.1109/PerComW.2014.6815157,
[Conference item]

Dmitrienko, Alexandra ; Liebchen, Christopher ; Rossow, Christian ; Sadeghi, Ahmad-Reza (2014):
On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference item]

Dmitrienko, Alexandra ; Noack, David ; Sadeghi, Ahmad-Reza ; Yung, Moti (2014):
POSTER: On Offline Payments with Bitcoin.
In: FC'2014: Financial Cryptography and Data Security Conference, [Conference item]

Ghiglieri, Marco ; Stopczynski, Martin ; Waidner, Michael (2014):
Personal DLP for Facebook.
In: Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, Budapest, Hungary, In: 6, DOI: 10.1109/PerComW.2014.6815279,
[Conference item]

Heuser, Stephan ; Nadkarni, Adwait ; Enck, William ; Sadeghi, Ahmad-Reza (2014):
ASM: A Programmable Interface for Extending Android Security.
(TUD-CS-2014-0063), [Report]

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza (2014):
MoP-2-MoP - Mobile private microblogging.
In: Financial Cryptography and Data Security (FC'14), Springer, [Conference item]

Sohr, Karsten ; Bartsch, Steffen ; Volkamer, Melanie ; Berger, Bernhard ; Bodden, Eric ; Brucker, Achim ; Maseberg, Sönke ; Kus, Mehmet ; Heider, Jens (2014):
Zertifizierte Datensicherheit für mobile Anwendungen.
In: GI Sicherheit 2014, Gesellschaft für Informatik e.V., Wien, In: Lecture Notes in Informatics, 228, ISBN 978-3-88579-622-0,
[Conference item]

Bartsch, Steffen ; Boos, Carina ; Dyck, Dominic ; Schwarz, Christopher ; Theuerling, Heike ; Henhapl, Birgit ; Volkamer, Melanie (2014):
Unterstützung für ein risikobewusstes Verhalten im Internet.
In: Vielfalt der Informatik, Bremen, [Conference item]

Boos, Carina ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
In: Computer und Recht, S. 119-127, (2), DOI: 10.9785/ovs-cr-2014-119,
[Article]

Budurushi, Jurlind ; Woide, Marcel ; Volkamer, Melanie (2014):
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23037,
[Conference item]

Busold, Christoph ; Dmitrienko, Alexandra ; Wachsmann, Christian (2014):
Key2Share for Authentication Services.
In: SmartCard Workshop, [Conference item]

Inel, Miray (2014):
Entwurf und Implementierung von Plug-ins für JCrypTool.
TU Darmstadt, [Master thesis]

Olembo, Maina ; Renaud, Karen ; Bartsch, Steffen ; Volkamer, Melanie (2014):
Voter, What Message Will Motivate You to Verify Your Vote?
In: Workshop on Usable Security (USEC), Internet Society, San Diego, ISBN 1-891562-37-1,
DOI: 10.14722/usec.2014.23038,
[Conference item]

Schneider, Markus ; Enzmann, Matthias ; Stopczynski, Martin (2014):
Web-Tracking-Report 2014.
(SIT-TR-2014-01), ISBN 978-3-8396-0700-8,
[Report]

Ghiglieri, Marco ; Tews, Erik (2014):
A Privacy Protection System for HbbTV in Smart TVs.
In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), IEEE, Las Vegas, NV, ISBN 978-1-4799-2356-4,
DOI: 10.1109/CCNC.2014.6866595,
[Conference item]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Öffentlichkeitsgrundsatz und Stimmzettelbelege.
[Report]

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Public-Key Cryptography PKC 2014, In: Lecture Notes in Computer Science, 8383, [Conference item]

Basin, David ; Caronni, Germano ; Ereth, Sarah ; Harvan, Matus ; Klaedtke, Felix ; Mantel, Heiko (2014):
Scalable Offline Monitoring.
Heidelberg, Germany, Springer, In: Proceedings of the 14th International Conference on Runtime Verification (RV), Heidelberg, Germany, [Conference item]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, S. 114-125, 8327, [Article]

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014, [Conference item]

Buchner, Karolina ; Lissermann, Roman ; Holmquist, Lars Erik (2014):
Interaction Techniques for Co-located Collaborative TV.
In: CHI 2014, ACM, [Conference item]

Catuogno, Luigi ; Löhr, Hans ; Winandy, Marcel ; Sadeghi, Ahmad-Reza (2014):
A trusted versioning file system for passive mobile storage devices.
In: J. Network and Computer Applications, 38, [Conference item]

Christin, Delphine ; Engelmann, Franziska ; Hollick, Matthias (2014):
Usable Privacy for Mobile Sensing Applications.
In: Proceedings of the 8th Workshop on Information Security Theory and Practice (WISTP), S. 92-107, [Article]

Dagdelen, Özgür ; Fischlin, Marc (2014):
Intercepting Tokens in Cryptographic Protocols: The Empire Strikes Back in the Clone Wars.
In: ISIT 2014 - IEEE International Symposium on Information Theory, Honolulu HI USA, [Conference item]

Dagdelen, Özgür ; Venturi, Daniele (2014):
A Second Look at Fischlin’s Transformation.
In: Africacrypt 2014, Marrakech, Morocco, [Conference item]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (Hrsg.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), Cham, Springer, S. 1-25, [Book section]

El Bansarkhani, Rachid ; Buchmann, Johannes (2014):
LCPR: High Performance Compression Algorithm for Lattice-Based Signatures and Schnorr-like Constructions.
In: IACR Cryptology ePrint Archive 2014: 334, [Conference item]

El Bansarkhani, Rachid ; Buchmann, Johannes
Pointcheval, David ; Vergnaud, Damien (Hrsg.) (2014):
Towards Lattice Based Sequential Aggregate Signatures.
In: Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Springer, Marrakesh, Morocco, In: LNCS, ISBN 978-3-319-06733-9,
[Conference item]

Fischlin, Marc ; Lehmann, Anja ; Pietrzak, Krzysztof (2014):
Robust Multi-Property Combiners for Hash Functions.
In: J. Cryptology, 27, DOI: 10.1007/s00145-013-9148-7,
[Conference item]

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut (2014):
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
In: Compiler Construction (CC)2014, Lecture Notes in Computer Science, 8409, [Conference item]

Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014, [Conference item]

Henning, Maria ; Budurushi, Jurlind ; Volkamer, Melanie (2014):
Elektronsiche Wahlen durch Stimmzettelbelege? Untersuchung möglicher Umsetzungen des Öffentlichkeitsgrundsatzes bei elektronischen Wahlen.
In: MultiMedia und Recht (MMR), S. 154-158, [Article]

Horsch, Moritz ; Derler, David ; Rath, Christof ; Haase, Hans-Martin ; Wich, Tobias (2014):
Open Source für europäische Signaturen.
In: >Datenschutz und Datensicherheit, S. 237-241, 38, (4), DOI: 10.1007/s11623-014-0098-5,
[Article]

Mohamed, Mohamed Saied Emam ; Buchmann, Johannes (2014):
Mutant Differential Fault Analysis of Trivium MDFA.
In: the 17th Annual International Conference on Information Security and Cryptology, ICISC2014, Springer, [Conference item]

Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (Hrsg.) (2014):
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
IGI Global, S. 27-61, [Book section]

Neumann, Stephan ; Volkamer, Melanie
Zissis, Dimitrios ; Lekkas, Dimitrios (Hrsg.) (2014):
A Holistic Framework for the Evaluation of Internet Voting Systems.
IGI Global, S. 76-91, [Book section]

Riecker, Michael ; Biedermann, Sebastian ; El Bansarkhani, Rachid ; Hollick, Matthias (2014):
Lightweight Energy Consumption Based Intrusion Detection System for Wireless Sensor Networks.
In: International Journal of Information Security, Springer, S. 155-167, 14, (2), ISSN 1615-5270,
[Article]

Roos, Stefanie ; Strufe, Thorsten (2014):
NextBestOnce: Achieving Polylog Routing despite Non-greedy Embeddings.
In: CoRR, abs/1401.2165, [Article]

Sahami Shirazi, Alireza ; Abdelrahman, Yomna ; Henze, Niels ; Schneegass, Stefan ; Khalilbeigi, Mohammadreza ; Schmidt, Albrecht (2014):
Exploiting thermal reflection for interactive systems.
In: Proceedings of the 32nd annual ACM conference on Human factors in computing systems, [Conference item]

Schaller, André ; Arul, Tolga ; van der Leest, Vincent ; Katzenbeisser, Stefan (2014):
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
In: International Conference on Trust & Trustworthy Computing ( TRUST), [Conference item]

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar (2014):
Covert Computation - Hiding code in code through compile-time obfuscation.
In: Computers & Security, [Conference item]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, Scottsdale, Arizona, USA, [Conference item]

Shulman, Haya ; Waidner, Michael (2014):
Fragmentation Considered Leaking: Port Inference for DNS Poisoning.
In: International Conference on Applied Cryptography and Network Security (ACNS 2014), [Conference item]

Suri, Neeraj ; Taha, Ahmed ; Trapero, Ruben ; Luna, Jesus (2014):
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security.
In: Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, China, [Conference item]

Vigil, Martín ; Weinert, Christian ; Braden, Kjell ; Demirel, Denise ; Buchmann, Johannes (2014):
A performance analysis of long-term archiving techniques.
In: IEEE - High Performace Computing and Communications (HPCC 2014), Paris, France, [Conference item]

2013

Asokan, N. ; Davi, Lucas ; Dmitrienko, Alexandra ; Heuser, Stephan ; Kostiainen, Kari ; Reshetova, Elena ; Sadeghi, Ahmad-Reza (2013):
Mobile Platform Security.
Morgan & Claypool, In: Synthesis Lectures on Information Security, Privacy, and Trust, 4, DOI: 10.2200/S00555ED1V01Y201312SPT009,
[Book]

Buchmann, Johannes ; Karatsiolis, Evangelos ; Wiesmaier, Alexander (2013):
Introduction to Public Key Infrastructures.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-40656-0,
[Book]

Jayalath, Chamikara ; Stephen, Julian James ; Eugster, Patrick (2013):
Atmosphere: A Universal Cross-Cloud Communication Infrastructure.
In: Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Beijing, China. December 2013. Proceedings., Springer, Beijing, China, In: Lecture Notes in Computer Science, ISBN 978-3-642-45064-8,
DOI: 10.1007/978-3-642-45065-5_9,
[Conference item]

Klos, Christian (2013):
Design and deployment of a public key infrastructure.
TU Darmstadt, [Master thesis]

Laurila, Juha ; Gatica-Perez, Daniel ; Aad, Imad ; Blom, Jan ; Bornet, Olivier ; Do, Trinh Minh Tri ; Dousse, Olivier ; Eberle, Julien ; Miettinen, Markus (2013):
From big smartphone data to worldwide research: The Mobile Data Challenge.
In: Pervasive and Mobile Computing, S. 752-771, 9, DOI: 10.1016/j.pmcj.2013.07.014,
[Article]

Nagy, Marcin ; Cristofaro, Emiliano De ; Dmitrienko, Alexandra ; Asokan, N. ; Sadeghi, Ahmad-Reza (2013):
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
In: Annual Computer Security Applications Conference (ACSAC 2013), New Orleans, Loouisiana, USA, [Conference item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto (2013):
Towards A Practical JCJ / Civitas Implementation.
In: In: Cryptology ePrint Archive: Report 2013/464, 2013., Koblenz, [Conference item]

Neumann, Stephan ; Feier, Christian ; Volkamer, Melanie ; Koenig, Reto
Horbach, Matthias (Hrsg.) (2013):
Towards A Practical JCJ / Civitas Implementation.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference item]

Stephen, Julian James ; Eugster, Patrick
Eyers, David ; Schwan, Karsten (Hrsg.) (2013):
Assured Cloud-Based Data Analysis with ClusterBFT.
In: Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Proceedings, Berlin, Heidelberg, Springer, S. 82-102, DOI: 10.1007/978-3-642-45065-5_5,
[Book section]

Albrecht, Martin ; Fitzpatrick, Robert ; Göpfert, Florian (2013):
On the Efficacy of Solving LWE by Reduction to Unique-SVP.
In: ICISC 2013, Seoul, Korea, [Conference item]

Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Wachsmann, Christian (2013):
A Security Framework for Analysis and Design of Software Attestation.
In: ACM Conference on Computer and Communications Security (CCS), ACM Press, [Conference item]

Bodden, Eric ; Rasthofer, Siegfried ; Richter, Philipp ; Roßnagel, Alexander (2013):
Schutzmaßnahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglichkeiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps.
In: Datenschutz und Datensicherheit, S. 720 - 725, 11/2013, DOI: 10.1007/s11623-013-0300-1,
[Article]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference item]

Dobre, Dan ; Karame, Ghassan O. ; Li, Wenting ; Majuntke, Matthias ; Suri, Neeraj ; Vukolic, Marko (2013):
PoWerStore: Proofs of Writing for Efficient and Robust Storage.
In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM, Berlin, Germany, In: CCS '13, ISBN 978-1-4503-2477-9,
DOI: 10.1145/2508859.2516750,
[Conference item]

Tasharofi, Samira ; Pradel, Michael ; Lin, Yu ; Johnson, Ralph (2013):
Bita: Coverage-Guided, Automatic Testing of Actor Programs.
In: 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), IEEE Computer Society, Palo Alto, CA, USA, ISBN 978-1-4799-0215-6/13,
DOI: 10.1109/ASE.2013.6693072,
[Conference item]

Tews, Erik ; Weiner, M. ; Massar, M. ; Giese, D. ; Wieser, W. (2013):
Security analysis of a widely deployed locking system.
Proceedings of the 2013 A, [Article]

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (Hrsg.) (2013):
Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography, Springer Berlin Heidelberg, S. 255-280, DOI: 10.1007/978-3-642-42001-6_18,
[Book section]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik
Schiele, Otto ; Schön, Willi (Hrsg.) (2013):
HbbTV: Neue Funktionen mit möglichen Nebenwirkungen.
In: FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, 10/2013, [Conference item]

Gutmann, Andreas ; Matsuura, Kanta (2013):
The use of linguistics in cryptography and its application to improve the HB protocol.
Kagawa, Japan, [Other]

Stancill, Blaine ; Snow, Kevin ; Otterness, Nathan ; Monrose, Fabian ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2013):
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
In: 16th Research in Attacks, Intrusions and Defenses (RAID) Symposium, [Conference item]

Weinert, Christian (2013):
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
TU Darmstadt, [Bachelor thesis]

Alaoui, Sidi Mohamed El Yousfi ; El Bansarkhani, Rachid ; Cayrel, Pierre-Louis ; Hoffmann, Gerhard (2013):
Code based Identification and Signature Schemes in Software.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, University of Regensburg, Regensburg, Germany, [Conference item]

Bartsch, Steffen ; Volkamer, Melanie (2013):
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
In: RiskKom-Workshop, INFORMATIK 2013, Gesellschaft für Informatik, Koblenz, [Conference item]

Baumann, Paul ; Kleiminger, Wilhelm ; Santini, Silvia (2013):
How Long Are You Staying? Predicting Residence Time from Human Mobility Traces.
In: The 19th Annual International Conference on Mobile Computing and Networking, ACM, Miami, FL, USA, In: MobiCom'13, ISBN 978-1-4503-1999-7/13/09,
DOI: 10.1145/2500423.2504583,
[Conference item]

Braun, Johannes ; Kiefer, Franziskus ; Hülsing, Andreas
Katsikas, Sokratis ; Agudo, Isaac (Hrsg.) (2013):
Revocation & Non-Repudiation: When the first destroys the latter.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2013, Springer Berlin Heidelberg, RHUL, Egham, UK, In: LNCS, ISBN 978-3-642-53996-1,
DOI: 10.1007/978-3-642-53997-8_3,
[Conference item]

Buchmann, Johannes ; Nebel, Maxi ; Roßnagel, Alexander ; Shirazi, Fatemeh ; Simo, Hervais ; Waidner, Michael (2013):
Personal Information Dashboard: Putting the Individual Back in Control.
Iso Press, ISBN 978-1-61499-294-3 (print) | 978-1-61499-295-0 (online),
DOI: 10.3233/978-1-61499-295-0-139,
[Book]

Herzberg, Amir ; Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: 2013 International Conference on Availability, Reliability and Security, IEEE Computer Society, Regensburg, Germany, In: ARES 2013, DOI: 10.1109/ARES.2013.138,
[Conference item]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Richter, Philipp ; Jonker, Hugo ; Volkamer, Melanie
Wimmer, Maria ; Tambouris, Efthimios ; Macintosh, Ann (Hrsg.) (2013):
Modeling the German Legal Latitude Principles.
In: 5th International Conference on eParticipation (ePart 2013), Springer, Koblenz, Germany, In: Lecture Notes in Computer Science, 8075, [Conference item]

Renaud, Karen ; Mayer, Peter ; Volkamer, Melanie ; Maguire, Joseph (2013):
Are Graphical Authentication Mechanisms As Strong As Passwords?
In: Federated Conference on Computer Science and Information Systems 2013, Krakow, [Conference item]

Wachsmann, Christian (2013):
Trusted and Privacy-Preserving Embedded Systems.
Technische Universität Darmstadt, [PhD thesis]

Braden, Kjell (2013):
XML Advanced Electronic Signatures and XML Evidence Record Syntax for Long-Term Protection of Data objects.
TU Darmstadt, [Master thesis]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2013):
Flexible and Fine-Grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
In: 22nd USENIX Security Symposium (USENIX Security '13), USENIX, [Conference item]

El Bansarkhani, Rachid ; Buchmann, Johannes
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (Hrsg.) (2013):
Improvement and Efficient Implementation of a Lattice-based Signature Scheme.
In: Selected Areas in Cryptography 2013 (SAC'13), Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference item]

Gleser, Michael (2013):
Policy-basierter Vergleich von Zertifizierungspraktiken innerhalb der Web-PKI.
TU Darmstadt, [Master thesis]

Kalabis, Lukas ; Wolf, Ruben ; Kunz, Thomas (2013):
Sichere Nutzung von Cloud-Speicherdiensten.
In: Datenschutz und Datensicherheit, S. 512-516, 37, (8), DOI: 10.1007/s11623-013-0209-8,
[Article]

Miettinen, Markus ; Heuser, Stephan ; Kronz, Wiebke ; Sadeghi, Ahmad-Reza ; Asokan, N. (2013):
ConXsense – Context Sensing for Adaptive Usable Access Control.
[Report]

Octeau, Damien ; McDaniel, Patrick ; Jha, Somesh ; Bartel, Alexandre ; Bodden, Eric ; Klein, Jacques ; Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security, Berkeley, Calif, USENIX Association, S. 543-558, [Book section]

Oren, Yossef ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2013):
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes on Computer Science (LNCS), 8068, [Conference item]

Rynkowski, Gregor (2013):
Individuell angepasstes Vertrauen in die Web-PKI: Eine Analyse des Einsparungspotentials an vertrauenswürdigen CAs.
TU Darmstadt, [Master thesis]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same.
In: BlackHat USA, [Conference item]

Tews, Erik (2013):
How to enable Live Cloning of Virtual Machines using the Xen Hypervisor.
[Report]

Bartsch, Steffen ; Berger, Bernhard ; Bunke, Michaela ; Sohr, Karsten
Pernul, Günther ; Sandhu, Ravi (Hrsg.) (2013):
The Transitivity-of-Trust Problem in Android Application Interaction.
In: 8th International Conference on Availability, Reliability and Security (ARES 2013), IEEE, University of Surrey, Guildford, UK, [Conference item]

Bernhard, David ; Neumann, Stephan ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference item]

Braun, Kristoffer ; Budurushi, Jurlind ; Volkamer, Melanie
Horbach, Matthias (Hrsg.) (2013):
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
In: INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, Koblenz, [Conference item]

Budurushi, Jurlind ; Henning, Maria ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Vote Casting in Any Preferred Constituency: A New Voting Channel.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference item]

Budurushi, Jurlind ; Neumann, Stephan ; Olembo, Maina ; Volkamer, Melanie
Pernul, Günther ; Sandhu, Ravi (Hrsg.) (2013):
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
In: 8th International Conference on Availability, Reliability and Security (AReS 2013), IEEE, University of Regensburg, Germany, [Conference item]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces.
In: Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, IEEE, Melbourne, Australia, ISBN 978-0-7695-5022-0,
DOI: 10.1109/TrustCom.2013.58,
[Conference item]

Hamann, Tobias (2013):
The BKZ Simulation Algorithm.
Tu Darmstadt, [Master thesis]

Nas, Aysegül ; Filyanov, Atanas ; Volkamer, Melanie ; Winandy, Marcel (2013):
Poster: On the Usability of Secure GUIs.
Menlo Park, California, [Other]

Neumann, Stephan ; Kulyk, Oksana ; Murati, Lulzim ; Volkamer, Melanie (2013):
Towards a Practical Mobile Application for Election Authorities (Demo).
In: 4th International Conference on e-Voting and Identity (VoteID13), [Conference item]

Northrop, Erik ; Lipford, Heather Richter ; Bartsch, Steffen ; Volkamer, Melanie (2013):
Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor.
Menlo Park, California, [Other]

Olembo, Maina ; Bartsch, Steffen ; Volkamer, Melanie
Schneider, Steve ; Heather, James ; Teague, Vanessa (Hrsg.) (2013):
Mental Models of Verifiability in Voting.
In: 4th International Conference on e-Voting and Identity (VoteID13), Springer, University of Surrey, Guildford, UK, In: Lecture Notes in Computer Science, 7985, [Conference item]

Vigil, Martín ; Cabarcas, Daniel ; Huang, Jingwei ; Buchmann, Johannes (2013):
Assessing Trust in the Long-Term Protection of Documents.
In: 18th IEEE Symposium on Computers and Communications (IEEE ISCC 2013), Split, Croatia, [Conference item]

Buchmann, Johannes (Hrsg.) (2013):
Internet Privacy: Options for adequate realization.
Springer Vieweg; 2013 edition, ISBN 978-3642379123,
[Book]

Bartsch, Steffen ; Volkamer, Melanie ; Theuerling, Heike ; Karayumak, Fatih
Huth, Michael (Hrsg.) (2013):
Contextualized Web warnings, and how they cause distrust.
In: Trust and Trustworthy Computing (TRUST 2013), Springer, In: TRUST 2013, London, UK, 17. - 19. Juni 2013, [Conference item]

Bleikertz, Sören ; Bugiel, Sven ; Ideler, Hugo ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Client-controlled Cryptography-as-a-Service in the Cloud.
In: 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), [Conference item]

Geihs, Matthias (2013):
Evaluation of homomorphic encryption for machine learning.
TU Darmstadt, [Master thesis]

Simo-Fhom, Hervais (2013):
Internet Privacy. Taking opportunities, assessing risks, building trust.
In: >Springer Vieweg; 2013, [Article]

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference item]

Volkamer, Melanie ; Stockhardt, Simon ; Bartsch, Steffen ; Kauer, Michaela (2013):
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
In: 3rd Workshop on Socio-Technical Aspects in Security and Trust (STAST), 2013, IEEE Digital Library, New Orleans, LA, USA, DOI: 10.1109/STAST.2013.12,
[Conference item]

Winter, Stefan ; Tretter, Michael ; Sattler, Benjamin ; Suri, Neeraj (2013):
simFI: From Single to Simultaneous Software Fault Injections.
In: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE Computer Society, Budapest, Hungary, ISBN 978-1-4673-6471-3,
DOI: 10.1109/DSN.2013.6575310,
[Conference item]

Alkassar, Ammar ; Heuser, Stephan ; Stüble, Christian (2013):
Vertrauenswürdige Smartphones: Technologien und Lösungen.
In: 13. Deutscher IT-Sicherheitskongress, [Conference item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, S. 209-232, 67, (2), [Article]

Baumöller, Claas ; Schaaf, Joachim ; Horsch, Moritz ; Wiesmaier, Alexander ; Braun, Johannes (2013):
EP 2600270 Identification element-based authentication and identification with decentralised service use.
[Norm, Patent, Standard]

Braun, Johannes ; Horsch, Moritz ; Hülsing, Andreas (2013):
Effiziente Umsetzung des Kettenmodells unter Verwendung vorwärtssicherer Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference item]

Buchmann, Johannes ; Demirel, Denise ; van de Graaf, Jeroen
Sadeghi, Ahmad-Reza (Hrsg.) (2013):
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.
In: Financial Cryptography and Data Security: 17th International Conference, 2013, Springer, In: LNCS, ISBN 978-3-642-39883-4,
[Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2013):
Gadge Me If You Can - Secure and Efficient Ad-hoc Instruction-Level Randomization for x86 and ARM.
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference item]

Fleischhacker, N. ; Günther, F. ; Kiefer, F. ; Poettering, B. (2013):
Pseudorandom Signatures.
In: >8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China, [Article]

Ghiglieri, Marco ; Oswald, Florian ; Tews, Erik (2013):
HbbTV - I Know What You Are Watching.
In: 13. Deutschen IT-Sicherheitskongresses, SecuMedia Verlags-GmbH, [Conference item]

Horsch, Moritz ; Hühnlein, Detlef ; Breitenstrom, Christian ; Wieland, Thomas ; Wiesmaier, Alexander ; Biallowons, Benedikt ; Petrautzki, Dirk ; Potzernheim, Simon ; Schmölz, Johannes ; Wesner, Alexander ; Wich, Tobias (2013):
Die Open eCard App für mehr Transparenz, Vertrauen und Benutzerfreundlichkeit beim elektronischen Identitätsnachweis.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, ISBN 978-3-922746-95-9,
[Conference item]

Hülsing, Andreas ; Braun, Johannes (2013):
Langzeitsichere Signaturen durch den Einsatz hashbasierter Signaturverfahren.
In: Informationssicherheit stärken - Vertrauen in die Zukunft schaffen. Tagungsband zum 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, Bonn, ISBN 978-3-922746-95-9,
[Conference item]

Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar (2013):
Covert Computation: Hiding Code in Code for Obfuscation Purposes.
In: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security table of contents, ACM, Hangzhou, China, In: ASIA CCS '13, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484384,
[Conference item]

Lissermann, Roman ; Huber, Jochen ; Hadjakos, Aristotelis ; Mühlhäuser, Max (2013):
EarPut: Augmenting Behind-the-Ear Devices for Ear-based Interaction.
In: CHI EA '13: Proceedings of the 2013 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1952-2,
DOI: 10.1145/2468356.2468592,
[Conference item]

Lissermann, Roman ; Huber, Jochen ; Steimle, Jürgen ; Mühlhäuser, Max (2013):
Permulin: Personal In- and Output on Interactive Surfaces.
In: CHI '13 Interactivity, ACM, ISBN 978-1-4503-1952-2,
[Conference item]

Pradel, Michael ; Gross, Thomas R. (2013):
Automatic testing of sequential and concurrent substitutability.
In: Proceedings of the 2013 International Conference on Software Engineering, IEEE Press, San Francisco, CA, USA, In: ICSE '13, ISBN 978-1-4673-3076-3,
DOI: 10.1109/ICSE.2013.6606574,
[Conference item]

Snow, Kevin ; Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Monrose, Fabian ; Sadeghi, Ahmad-Reza (2013):
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (Best Student Paper Award).
In: 34th IEEE Symposium on Security and Privacy (Oakland 2013), [Conference item]

Volkamer, Melanie ; Bartsch, Steffen ; Kauer, Michaela
University, Plymouth (Hrsg.) (2013):
Contextualized Security Interventions in Password Transmission Scenarios.
In: European Information Security Multi-Conference (EISMC 2013), Lisbon, Spain, [Conference item]

Felzer, Torsten ; Rinderknecht, Stephan (2013):
Mouse mode of OnScreenDualScribe: Three types of keyboard-driven mouse replacement.
In: CHI '13 Extended Abstracts on Human Factors in Computing Systems, ACM Press, S. 1593-1598, DOI: 10.1145/2468356.2468641,
[Book section]

Funke, Sebastian (2013):
Benutzerstudie zur Visualisierung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master thesis]

Bauer, Gerald ; Blanke, Ulf ; Lukowicz, Paul ; Schiele, Bernt (2013):
User Independent, Multi-Modal Spotting of Subtle Arm Actions with Minimal Training Data.
In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE Computer Society, San Diego, CA, USA, ISBN 978-1-4673-5075-4,
DOI: 10.1109/PerComW.2013.6529448,
[Conference item]

Kauer, Michaela ; Günther, Sebastian ; Storck, Daniel ; Volkamer, Melanie
Marinos, Louis ; Askoxylakis, Ioannis (Hrsg.) (2013):
A Comparison of American and German Folk Models of Home Computer Security.
In: Human Aspects of Information Security, Privacy, and Trust - First International Conference, HAS 2013, Held as Part of HCI International 2013, Springer, In: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, USA, 21.07.2013 - 26.07.2013, In: Lecture Notes in Computer Science, 8030, ISBN ISBN 978-3-642-39345-7,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39345-7_11],
[Conference item]

Kocabas, Unal ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2013):
Memristor PUFs: A New Generation of Memory-based Physically Unclonable Functions.
In: Conference on Digital Automation and Test Europe (DATE), Interactive Presentation, [Conference item]

Sepehrdad, Pouyan ; Susil, Petr ; Vaudenay, Serge ; Vuagnoux, Martin (2013):
Smashing WEP in a Passive Attack.
In: 20th International Workshop on Fast Software Encryption (FSE), [Conference item]

Zöller, Sebastian ; Reinhardt, Andreas ; Wachtel, Markus ; Steinmetz, Ralf (2013):
Integrating Wireless Sensor Nodes and Smartphones for Energy - Efficient Data Exchange in Smart Environments.
In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, IEEE Computer Society, San Diego, CA, USA, In: PERCOM Workshops, ISBN 978-1-4673-5075-4,
DOI: 10.1109/PerComW.2013.6529574,
[Conference item]

Busold, Christoph ; Dmitrienko, Alexandra ; Seudié, Hervé ; Taha, Ahmed ; Sobhani, Majid ; Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2013):
Smart Keys for Cyber-Cars: Secure Smartphone-based NFC-enabled Car Immobilizer.
In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ACM Press, San Antonio, Texas, USA, In: CODASPY '13, ISBN 978-1-4503-1890-7,
DOI: 10.1145/2435349.2435382,
[Conference item]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, S. 117-128, 17, (3), [Article]

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Neumann, Stephan ; Kahlert, Anna ; Henning, Maria ; Jonker, Hugo ; Volkamer, Melanie (2013):
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
In: Abstraction and Application: Proceedings of the 16th International Legal Informatics Symposium (IRIS 2013), Salzburg, Austria, [Conference item]

Olembo, Maina ; Volkamer, Melanie
Saeed, Saqib ; Reddick, Christopher (Hrsg.) (2013):
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
IGI Global, S. 172 - 201, DOI: 10.4018/978-1-4666-3640-8.ch011,
[Book section]

Braun, Johannes ; Wiesmaier, Alexander ; Buchmann, Johannes
Sprague, Ralph H. (Hrsg.) (2013):
On the Security of Encrypted Secret Sharing.
In: 46th Hawaii International Conference on Systems Science (HICSS-46), IEEE Computer Society, Grand Wailea, Maui, Hawaii, ISBN 978-0-7695-4892-0,
DOI: 10.1109/HICSS.2013.426,
[Conference item]

Moecke, Cristian Thiago ; Volkamer, Melanie (2013):
Usable secure email communications: criteria and evaluation of existing approaches.
In: Information Management & Computer Security, S. 41-52, 21, DOI: 10.1108/09685221311314419,
[Article]

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013, [Article]

Wälde, Julian (2013):
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
TU Darmstadt, [Master thesis]

Braun, Johannes ; Rynkowski, Gregor (2013):
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI.
In: Social Computing (SocialCom) - PASSAT2013, Washington D.C., USA, DOI: 10.1109/SocialCom.2013.90,
[Conference item]

Buchmann, Johannes ; Cabarcas, Daniel ; Göpfert, Florian ; Hülsing, Andreas ; Weiden, Patrick
Lange, Tanja ; Lauter, Kristin ; Lisonek, Petr (Hrsg.) (2013):
Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers.
In: Selected Areas in Cryptography 2013 (SAC'13), Springer, Simon Fraser University, Burnaby, British Columbia, Canada, In: LNCS, [Conference item]

Buchmann, Johannes ; Dahmen, Erik ; Ereth, Sarah ; Hülsing, Andreas ; Rückert, Markus (2013):
On the security of the Winternitz one-time signature scheme.
In: International Journal of Applied Cryptography, S. 84-96, 3, (1), [Article]

Cabarcas, Daniel ; Göpfert, Florian ; Weiden, Patrick (2013):
Provably Secure LWE-Encryption with Uniform Secret.
[Other]

Clauß, Sebastian ; Schiffner, Stefan ; Kerschbaum, Florian (2013):
k-anonymous reputation.
In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, ACM, Hangzhou, China, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484361,
[Conference item]

Dagdelen, Özgür ; Fischlin, Marc ; Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in the Quantum World.
In: ASIACRYPT 2013, Bangalore, India, [Conference item]

Demirel, Denise ; Henning, Maria ; van de Graaf, Jeroen ; Ryan, Peter Y. A. ; Buchmann, Johannes
Heather, James ; Schneider, Steve ; Teague, Vanessa (Hrsg.) (2013):
Prêt à Voter Providing Everlasting Privacy.
In: VoteID 2013: The 4th International Conference on e-Voting and Identity, 2013, Springer, University of Surrey, Guildford, UK, In: LNCS, [Conference item]

Egert, Rolf (2013):
Lattice-based Signatures.
TU Darmstadt, [Master thesis]

Fontein, Felix ; Schneider, Michael ; Wagner, Urs (2013):
A Polynomial Time Version of LLL With Deep Insertions.
In: International Workshop on Coding and Cryptography - WCC 2013, Bergen (Norway), [Conference item]

Ghiglieri, Marco ; Kalabis, Lukas ; Kelm, David (2013):
Events Around Me - Ein datenschutzfreundlicher Veranstaltungskompass.
In: 13. Deutschen IT-Sicherheitskongress, SecuMedia Verlags-GmbH, [Conference item]

Guo, Sheng (2013):
Integration von vorwärtssicheren Signaturverfahren in die CA Infrastruktur.
[Report]

Habib, Sheikh Mahbub ; Varadharajan, Vijay ; Mühlhäuser, Max (2013):
A Framework for Evaluating Trust of Service Providers in Cloud Marketplaces.
In: Proceedings of 28th ACM SAC 2013, New York, NY, USA, ACM, S. 1963-1965, DOI: 10.1145/2480362.2480727,
[Online-Edition: http://doi.acm.org/10.1145/2480362.2480727],
[Book section]

Hülsing, Andreas (2013):
WOTS+ - Shorter Signatures for Hash-Based Signature Schemes.
In: Africa Crypt 2013, Cairo, Egypt, [Conference item]

Hülsing, Andreas ; Rausch, Lea ; Buchmann, Johannes (2013):
Optimal Parameters for XMSS^MT.
In: MoCrySEn 2013, Springer, S. 194-208, [Book section]

Jeutter, Bennet (2013):
Implementierung einer Browser-Erweiterung zur Visualisierung und Erkennung von privatsphärenkritischen Nachrichten in sozialen Netzwerken.
TU Darmstadt, [Master thesis]

Nie, Xuyun ; Petzoldt, Albrecht ; Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, In: LNCS, [Conference item]

Nie, Xuyun ; Xu, Zhaohu ; Buchmann, Johannes
Gaborit, Philippe (Hrsg.) (2013):
Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference item]

Olembo, Maina ; Stockhardt, Simon ; Hülsing, Andreas ; Volkamer, Melanie
University, Plymouth (Hrsg.) (2013):
Developing and Testing a Visual Hash Scheme.
In: European Information Security Multi-Conference (EISMC 2013), [Conference item]

Schneider, Michael (2013):
Sieving for Shortest Vectors in Ideal Lattices.
In: Africa Crypt 2013, Cairo, Egypt, [Conference item]

Shirazi, Fatemeh ; Diaz, Claudia ; Mullan, Ciaran ; Wright, Joss ; Buchmann, Johannes (2013):
Towards Measuring Resilience in Anonymous Communication Networks.
In: HotPETs 2013, [Article]

Simić-Draws, Daniela ; Neumann, Stephan ; Kahlert, Anna ; Richter, Philipp ; Grimm, Rüdiger ; Volkamer, Melanie ; Roßnagel, Alexander (2013):
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
In: International Journal of Information Security and Privacy (IJISP), S. 16-35, 7, (3), DOI: 10.4018/jisp.2013070102,
[Article]

Tschofenig, Hannes ; Volkamer, Melanie ; Jentzsch, Nicola ; Fischer-Hübner, Simone ; Schiffner, Stefan ; Tirtea, Rodica (2013):
On the security, privacy and usability of online seals.
[Report]

Weiden, Patrick ; Hülsing, Andreas ; Cabarcas, Daniel ; Buchmann, Johannes (2013):
Instantiating Treeless Signature Schemes.
[Other]

Werlang, Felipe ; Vigil, Martín ; Custódio, Ricardo Felipe (2013):
A User-Centric Digital Signature Scheme.
In: EuroPKI 2013, [Conference item]

Werthmann, Tim ; Hund, Ralf ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2013):
PSiOS: Bring Your Own Privacy & Security to iOS Devices (Distinguished Paper Award).
In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), [Conference item]

2012

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander (2012):
Schlanke Infrastrukturen für den digitalen Rechtsverkehr - Vorwärtssichere Verfahren für qualifizierte elektronische Signaturen.
[Report]

Davi, Lucas ; Dmitrienko, Alexandra ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2012):
Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication.
In: BlackHat Abu Dhabi, [Conference item]

El Bansarkhani, Rachid ; Cabarcas, Daniel ; Kuo, Po-Chun ; Schmidt, Patrick ; Schneider, Michael (2012):
A Selection of Recent lattice-Based Signature and Encryption Schemes.
In: Tatra Mountains Mathematical Publications, S. 81-102, 53, [Article]

Katzenbeisser, Stefan ; Schaller, André (2012):
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit, S. 881-885, [Article]

Oswald, Florian (2012):
SmartTV - Eine Sicherheitsund Datenschutzanalyse von internetfähigen TVs.
Technische Universität Darmstadt, [Master thesis]

Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), IEEE, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference item]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware.
(TUD-CS-2012-0231), [Report]

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Kreutzer, Michael ; Waidner, Michael ; Buchmann, Johannes (2012):
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung.
In: Praxis der Informationsverarbeitung und Kommunikation, S. 305-308, 35, (4), [Article]

Stopczynski, Martin ; Ghiglieri, Marco (2012):
Smart Home Dashboard – Das intelligente Energiemanagement.
In: VDE KONGRESS 2012 Smart Grid, VDE Verlag GmbH, ISBN 978-3-8007-3446-7,
[Conference item]

Vigil, Martín ; Custódio, Ricardo Felipe (2012):
Cleaning up the PKI for Long-term Signatures.
In: 12th SBSeg 2012, Brazilian Symposium on Information and Computer System Security, Brazilian Computer Society, Curitiba PR, Brazil, [Conference item]

Braun, Johannes ; Horsch, Moritz ; Wiesmaier, Alexander
Ryan, Mark ; Smyth, Ben ; Wang, Guilin (Hrsg.) (2012):
iPIN and mTAN for secure eID applications.
In: 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Springer, Hangzhou, China, In: LNCS, ISBN 978-3-642-29100-5,
DOI: 10.1007/978-3-642-29101-2_18,
[Conference item]

Heinrich, Markus (2012):
Security Analysis of HTML5 Features.
Technische Universität Darmstadt, [Bachelor thesis]

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut (2012):
Secure Two-Party Computations in ANSI C.
In: Conference on Computer and Communications Security (CCS 2012), ACM Press, DOI: 10.1145/2382196.2382278,
[Conference item]

Horsch, Moritz ; Braun, Johannes ; Wiesmaier, Alexander (2012):
Decoupling Authentication from the Usage of Services.
[Report]

Mühlbach, Sascha ; Koch, Andreas (2012):
Malacoda: towards high-level compilation of network security applications on reconfigurable hardware.
In: Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, ACM, Austin, Texas, USA, In: ANCS '12, ISBN 978-1-4503-1685-9,
DOI: 10.1145/2396556.2396604,
[Conference item]

Olembo, Maina ; Volkamer, Melanie (2012):
Recommendations For E-Voting System Usability: Lessons From Literature For Interface Design, User Studies, and Usability Criteria.
[Report]

Schläpfer, Michael ; Volkamer, Melanie (2012):
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, Albany, NY, USA, In: ACM, ISBN 978-1-4503-1200-4,
DOI: 10.1145/2463728.2463807,
[Conference item]

Bartsch, Steffen ; Volkamer, Melanie (2012):
Towards the Systematic Development of Contextualized Security Interventions.
In: Designing Interactive Secure Systems (DISS), BCS HCI 2012, Birmingham, UK, [Conference item]

Braun, Johannes ; Hülsing, Andreas ; Wiesmaier, Alexander ; Vigil, Martín ; Buchmann, Johannes
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (Hrsg.) (2012):
How to avoid the Breakdown of Public Key Infrastructures - Forward Secure Signatures for Certificate Authorities.
In: Public Key Infrastructures, Services and Applications - EuroPKI 2012, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference item]

Demirel, Denise ; Henning, Maria (2012):
Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems.
In: Jusletter IT - Die Zeitschrift für IT und Recht, Editions Weblaw, [Online-Edition: https://jusletter-it.weblaw.ch/redaktion.html],
[Article]

Gupta, Aditi ; Miettinen, Markus ; Asokan, N. ; Nagy, Marcin (2012):
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
In: 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), IEEE, Amsterdam, The Netherlands, ISBN 978-1-4673-5638-1,
DOI: 10.1109/SocialCom-PASSAT.2012.60,
[Conference item]

Göttert, Norman ; Feller, Thomas ; Schneider, Michael ; Huss, Sorin ; Buchmann, Johannes
Prouff, Emmanuel ; Schaumont, Patrick (Hrsg.) (2012):
On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2012), Springer, Leuven, Belgium, In: LNCS, ISBN 978-3-642-33026-1,
[Conference item]

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian (2012):
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Workshop on Cryptographic Hardware and Embedded Systems (CHES), Springer, In: Lecture Notes in Computer Science (LNCS), 7428, [Conference item]

Kelbert, Florian ; Shirazi, Fatemeh ; Simo, Hervais ; Wüchner, Tobias ; Buchmann, Johannes ; Pretschner, Alexander ; Waidner, Michael
Buchmann, Johannes (Hrsg.) (2012):
State of Online Privacy: A Technical Perspective.
In: Internet Privacy. Eine multidisziplinäre Bestandsaufnahme/ A multidisciplinary analysis (acatech STUDIE), Springer Verlag Heidelberg, S. 189-279, [Book section]

Kirchbuchner, Florian (2012):
Detection of Category Breaches in E-Mail Threads Using RSS Data Feeds.
Technische Universität Darmstadt, [Master thesis]

Rodenhausen, Thomas ; Anjorin, Mojisola ; Dominguez Garcia, Renato ; Rensing, Christoph (2012):
Context determines content: an approach to resource recommendation in folksonomies.
In: Proceedings of the 4th ACM RecSys workshop on Recommender systems and the social web, ACM, S. 17-24, DOI: 10.1145/2365934.2365938,
[Online-Edition: ftp://ftp.kom.tu-darmstadt.de/papers/RADR12.pdf],
[Book section]

Vigil, Martín ; Moecke, Cristian Thiago ; Custódio, Ricardo Felipe ; Volkamer, Melanie
De Capitani di Vimercati, Sabrina ; Mitchell, Chris (Hrsg.) (2012):
The Notary Based PKI -- A Lightweight PKI for Long-term Signatures on Documents.
In: EuroPKI 2012, September 13-14, Springer, Pisa, Italy, In: LNCS, ISBN 978-3-642-40011-7,
[Conference item]

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference item]

Demirel, Denise ; van de Graaf, Jeroen ; Araújo, Roberto (2012):
Improving Helios with Everlasting Privacy Towards the Public.
In: Electronic Voting Technology Workshop / Workshop on Trustworthy Elections - EVT/WOTE 2012, Bellevue, WA, [Conference item]

Hülsing, Andreas ; Busold, Christoph ; Buchmann, Johannes
Knudsen, Lars ; Wu, Huapeng (Hrsg.) (2012):
Forward Secure Signatures on Smart Cards.
In: SAC2012 - Conference on Selected Areas in Cryptography, Springer Berlin Heidelberg, Windsor, Canada, In: LNCS, ISBN 978-3-642-35998-9,
DOI: 10.1007/978-3-642-35999-6_5,
[Conference item]

Neumann, Stephan ; Volkamer, Melanie (2012):
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
In: 7th International Conference on Availability, Reliability and Security (ARES), IEEE, Prague, Czech Republic, ISBN 978-1-4673-2244-7,
DOI: 10.1109/ARES.2012.75,
[Conference item]

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Schreiner, Steffen ; Grigoras, Costin ; Grigoras, Alina ; Betev, Latchezar ; Buchmann, Johannes (2012):
A Grid security architecture for AliEn.
In: Proceedings of Science (PoS), ISGC2012:027, International Symposium on Grids & Clouds (ISGC) 2012, Taipei, Taiwan, [Conference item]

Wilhelmi, Klaus (2012):
CloudRaid - Ein sicherer Raid-Manager für freie Cloud Storages.
TU Darmstadt, [Master thesis]

Engels, Heinrich-Alexander (2012):
Detection, Visualization and Prevention of Social Engineering Attacks on E-Mails by Using Machine Learning Techniques.
TU Darmstadt, [Master thesis]

Kelm, David (2012):
Events Around Me - Ein Mobiler Datenschutzfreundlicher Veranstaltungskompass.
TU Darmstadt, [Master thesis]

Kiefer, Franziskus ; Wiesmaier, Alexander ; Fritz, Christian (2012):
Practical Security in E-Mail Applications.
In: The 2012 International Conference on Security and Management (SAM’12), Las Vegas, USA, [Conference item]

Olembo, Maina ; Kahlert, Anna ; Neumann, Stephan ; Volkamer, Melanie
Kripp, Melanie J ; Volkamer, Melanie ; Grimm, Rüdiger (Hrsg.) (2012):
Partial Verifiability in POLYAS for the GI Elections.
In: 5th International Conference on Electronic Voting 2012 (EVOTE2012), Gesellschaft für Informatik, Castle Hofen, Bregenz, Austria, In: LNI - Lecture Notes in Informatics, 205, ISBN 978-3-88579-299-4,
[Conference item]

Dmitrienko, Alexandra ; Sadeghi, Ahmad-Reza ; Tamrakar, Sandeep ; Wachsmann, Christian (2012):
SmartTokens: Delegable Access Control with NFC-enabled Smartphones.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, In: Lecture Notes in Computer Science (LNCS), 7344, [Conference item]

Henß, Stefan ; Monperrus, Martin ; Mezini, Mira (2012):
Semi-automatically extracting FAQs to improve accessibility of software development knowledge.
In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, Zurich, Switzerland, In: ICSE '12, ISBN 978-1-4673-1067-3,
[Conference item]

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen (2012):
Trust and Trustworthy Computing.
Springer, ISBN 978-3-642-30921-2,
DOI: 10.1007/978-3-642-30921-2,
[Book]

Moecke, Cristian Thiago ; Volkamer, Melanie (2012):
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
In: Information and Computer Security, S. 75-85, DOI: 10.1108/09685221311314419,
[Article]

Piper, Thorsten ; Winter, Stefan ; Manns, Paul ; Suri, Neeraj (2012):
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework.
In: Proceedings of the 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE Computer Society, Boston, MA, USA, In: DSN '12, ISBN 978-1-4673-1624-8,
DOI: 10.1109/DSN.2012.6263913,
[Conference item]

Pradel, Michael ; Gross, Thomas R. (2012):
Leveraging test generation and specification mining for automated bug detection without false positives.
In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, Zurich, Switzerland, In: ICSE '12, ISBN 978-1-4673-1067-3,
DOI: 10.1109/ICSE.2012.6227185,
[Conference item]

Pradel, Michael ; Jaspan, Ciera ; Aldrich, Jonathan ; Gross, Thomas R. (2012):
Statically checking API protocol conformance with mined multi-object specifications.
In: Proceedings of the 34th International Conference on Software Engineering, IEEE Press, Zurich, Switzerland, In: ICSE '12, ISBN 978-1-4673-1067-3,
DOI: 10.1109/ICSE.2012.6227127,
[Conference item]

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST), Springer, [Conference item]

Fischlin, Marc ; Buchmann, Johannes ; Manulis, Mark (Hrsg.) (2012):
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography.
Springer, ISBN 978-3-642-30056-1,
DOI: 10.1007/978-3-642-30057-8,
[Conference item]

Bartsch, Steffen (2012):
Policy Override in Practice: Model, Evaluation, and Decision Support.
In: Security and Communication Networks, DOI: 10.1002/sec.547,
[Article]

Bartsch, Steffen ; Sasse, Angela (2012):
How Users Bypass Access Control and Why: The Impact of Authorization Problems on Individuals and the Organization.
(RN/12/06), [Report]

Braun, Johannes ; Buchmann, Johannes
Levi, Albert ; Badra, Mohamad ; Cesana, Matteo ; Ghassemian, Mona ; Jabeur, Nafaa ; Klonowski, Marek ; Mana, Antonio ; Sargento, Susana ; Zeadally, Sherali (Hrsg.) (2012):
Perfect Confidentiality Network - A solution for information theoretically secure key agreement.
In: 5th IFIP International Conference on New Technologies, Mobility & Security (NTMS) 2012, IEEE, Istanbul, Turkey, ISBN 978-1-4673-0229-6,
DOI: 10.1109/NTMS.2012.6208676,
[Conference item]

Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Huber, Jochen ; Müller, Florian ; Mühlhäuser, Max (2012):
Leveraging the Palm Surface as an Eyes-free TV Remote Control.
In: CHI EA '12: Proceedings of the 2012 ACM annual conference extended abstracts on Human Factors in Computing Systems Extended Abstracts, ACM, ISBN 978-1-4503-1016-1,
DOI: 10.1145/2212776.2223823,
[Conference item]

Hauke, Sascha ; Volk, Florian ; Habib, Sheikh Mahbub ; Mühlhäuser, Max
Dimitrakos, Theo ; Moona, Rajat ; Patel, Dhiren ; McKnight, D. Harrison (Hrsg.) (2012):
Integrating Indicators of Trustworthiness into Reputation-Based Trust Models.
In: Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012), Berlin, Heidelberg, Springer, S. 158-173, [Book section]

Heinrichs, Felix ; Schreiber, Daniel ; Huber, Jochen ; Mühlhäuser, Max (2012):
Toward a Theory of Interaction in Mobile Paper-Digital Ensembles.
In: CHI '12: Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, ACM, In: CHI'12, ISBN 978-1-4503-1015-4,
DOI: 10.1145/2208276.2208328,
[Conference item]

Huber, Jochen ; Steimle, Jürgen ; Liao, Chunyuan ;