Publikationen

Hier finden Sie die aktuellen Publikationen der CYSEC-Mitglieder.

Springe zu: 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 1295.

2021

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
k. A., Internet Society, In: 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Online-Edition: https://encrypto.de/papers/HWSDS21.pdf],
[Konferenzveröffentlichung]

2020

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, In: Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Online-Edition: https://sci-workshops.alipay.com/CCS2020],
[Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, In: Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11., [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/home_page/news_feed/...],
[Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
In: The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Online-Edition: https://crypto-ppml.github.io/2020/],
[Konferenzveröffentlichung]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
In: 8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Online-Edition: https://conference.cs.cityu.edu.hk/asiaccsscc/],
[Konferenzveröffentlichung]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure two-party computation in a post-quantum world.
In: 18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Online-Edition: https://sites.google.com/di.uniroma1.it/ACNS2020/],
[Konferenzveröffentlichung]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
In: 25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Online-Edition: https://www.surrey.ac.uk/esorics-2020],
[Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
In: 15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Online-Edition: https://www.ares-conference.eu/detailed-program/],
[Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
In: The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Online-Edition: https://crypto-ppml.github.io/2020/],
[Konferenzveröffentlichung]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1,
[Online-Edition: https://arxiv.org/pdf/2008.04449.pdf],
[Report]

Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
In: 29th USENIX Security Symposium, virtual Conference, August 12.–14., 2020, [Online-Edition: https://www.usenix.org/conference/usenixsecurity20/presentat...],
[Konferenzveröffentlichung]

Stute, Milan ; Agarwal, Pranay ; Kumar, Abhinav ; Asadi, Arash ; Hollick, Matthias (2020):
LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems.
In: IEEE Internet of Things Journal, (8), 7. IEEE, S. 6802-6816, e-ISSN 2327-4662,
DOI: 10.1109/JIOT.2020.2985044,
[Online-Edition: https://ieeexplore.ieee.org/document/9055427],
[Artikel]

Putz, Florentin ; Álvarez, Flor ; Classen, Jiska (2020):
Acoustic Integrity Codes: Secure Device Pairing Using Short-Range Acoustic Communication.
In: WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., S. 31-41, ISBN 978-1-4503-8006-5,
DOI: 10.1145/3395351.3399420,
[Online-Edition: https://wisec2020.ins.jku.at/],
[Konferenzveröffentlichung]

Heinrich, Alexander ; Stute, Milan ; Hollick, Matthias (2020):
DEMO: BTLEmap: Nmap for Bluetooth Low Energy.
In: WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., S. 331-333, [Online-Edition: https://wisec2020.ins.jku.at/accepted-papers/],
[Konferenzveröffentlichung]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
In: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Online-Edition: https://wisec2020.ins.jku.at/],
[Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
ACM, In: ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., S. 428-439, ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Online-Edition: https://conf.researchr.org/home/issta-2020],
[Konferenzveröffentlichung]

Hessel, Frank ; Almon, Lars ; Álvarez, Flor (2020):
ChirpOTLE: A Framework for Practical LoRaWAN Security Evaluation.
In: WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, S. 306-316, ISBN 978-1-4503-8006,
DOI: 10.1145/3395351.3399423,
[Online-Edition: https://wisec2020.ins.jku.at/accepted-papers/],
[Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, In: Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Online-Edition: https://irtf.org/anrw/2020/],
[Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Online-Edition: https://ieeexplore.ieee.org/document/9126541],
[Artikel]

Reuter, Christian ; Kaufhold, Marc-André ; Spahr, Fabian ; Spielhofer, Thomas ; Hahne, Anna Sophie (2020):
Emergency Service Staff and Social Media – A Comparative Empirical Study of the Perception by Emergency Services Members in Europe in 2014 and 2017.
In: International Journal of Disaster Risk Reduction (IJDRR), (Art.101516), 46. Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101516,
[Online-Edition: https://www.sciencedirect.com/science/article/abs/pii/S22124...],
[Artikel]

Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
In: SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, S. 2-7, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Online-Edition: https://pldi20.sigplan.org/home/SOAP-2020],
[Konferenzveröffentlichung]

Stojanovic, Vladimir M. (2020):
Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators.
In: Physical Review Letters, (19), 124. S. 190504, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.124.190504,
[Online-Edition: https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.12...],
[Artikel]

Nieminen, Raine ; Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Artikel]

Stute, Milan ; Maass, Max ; Schons, Tom ; Kaufhold, Marc-André ; Reuter, Christian ; Hollick, Matthias (2020):
Empirical Insights for Designing Information and Communication Technology for International Disaster Response.
In: International Journal of Disaster Risk Reduction (IJDRR), (Art.101598), 47. Elsevier ScienceDirect, ISSN 2212-4209,
DOI: 10.1016/j.ijdrr.2020.101598,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S221242091...],
[Artikel]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Online-Edition: https://encrypto.de/papers/AGKS20.pdf],
[Artikel]

Haunschild, Jasmin ; Kaufhold, Marc-André ; Reuter, Christian (2020):
Sticking with Landlines? Citizens’ Use and Perception of Social Media in Emergencies and Expectations Towards Emergency Services in Germany.
AIS Electronic Library (AISel), In: 15th International Conference on Wirtschaftsinformatik (WI2020), Potsdam, Germany, 08.-11.03., DOI: 10.30844/wi_2020_o2-haunschild,
[Online-Edition: https://www.peasec.de/paper/2020/2020_HaunschildKaufholdReut...],
[Konferenzveröffentlichung]

Stojanovic, Vladimir M. (2020):
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models.
In: Physical Review B, (13), 101. American Physical Society, ISSN 2469-9950,
DOI: 10.1103/PhysRevB.101.134301,
[Artikel]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
In: 1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Online-Edition: https://ascslab.org/conferences/secriscv/index.html],
[Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
In: 11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Online-Edition: https://pqcrypto2020.inria.fr/papers/],
[Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
In: 11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Online-Edition: https://www.cosade.org/program.html],
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Le Roux, Stephane ; Rowe, Steven ; Mühlhäuser, Max (2020):
TRIDEnT: Towards a Decentralized Threat Indicator Marketplace.
ACM, In: 35th ACM/SIGAPP Symposium on Applied Computing (SAC'20), virtual Conference, 30.03.-03.04., S. 332-341, ISBN 978-1-4503-6866-7,
DOI: 10.1145/3341105.3374020,
[Konferenzveröffentlichung]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
In: 18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Online-Edition: https://sites.google.com/di.uniroma1.it/ACNS2020],
[Konferenzveröffentlichung]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
In: 23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Konferenzveröffentlichung]

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, (2), 18. IEEE, S. 56-60, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Artikel]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Artikel]

Stute, Milan (2020):
Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks.
Darmstadt, Technische Universität, DOI: 10.25534/tuprints-00011457,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/11457],
[Dissertation]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020. IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Artikel]

Sauer, Alexander ; Alber, Gernot (2020):
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
In: Cryptography, 4 (1), 2020. MDPI, DOI: 10.3390/cryptography4010002,
[Artikel]

Kaufhold, Marc-André ; Bayer, Markus ; Reuter, Christian (2020):
Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning.
In: Information Processing & Management, (1), 57. Elsevier ScienceDirect, ISSN 0306-4573,
DOI: 10.1016/j.ipm.2019.102132,
[Artikel]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
In: 24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Online-Edition: https://encrypto.de/papers/TMWSK20.pdf],
[Konferenzveröffentlichung]

Zimmermann, Verena ; Gerber, Nina (2020):
The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes.
In: International Journal of Human-Computer Studies, 133Elsevier, S. 26-44, DOI: 10.1016/j.ijhcs.2019.08.006,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S107158191...],
[Artikel]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
In: WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, S. 207-218, [Online-Edition: https://wisec2020.ins.jku.at/accepted-papers/],
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; El Bansarkhani, Rachid ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
Springer, In: 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., S. 484-502, ISBN 978-3-030-51279-8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-030-51280-4_...],
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; El Bansarkhani, Rachid ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
Springer, In: The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., S. 41-61, ISBN 978-3-030-55303-6,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-030-55304-3_...],
[Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Konferenzveröffentlichung]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
In: SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Online-Edition: http://www.secrypt.icete.org/],
[Konferenzveröffentlichung]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
In: ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Konferenzveröffentlichung]

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
In: The 22nd International Conference on Information and Communications Security (ICICS), virtual Conference, 24.-27.08.2020, [Online-Edition: http://icics2020.compute.dtu.dk/index.html],
[Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security, k.A., USENIX Association, In: 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Konferenzveröffentlichung]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
In: DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Online-Edition: https://www.dac.com/],
[Konferenzveröffentlichung]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
In: EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Online-Edition: https://eurocrypt.iacr.org/2020/],
[Konferenzveröffentlichung]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
In: Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Online-Edition: https://www.ndss-symposium.org/ndss-paper/disco-sidestepping...],
[Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
In: DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
In: DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
In: DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Kaufhold, Marc-André ; Haunschild, Jasmin ; Reuter, Christian (2020):
Warning the Public: A Survey on Attitudes, Expectations and Use of Mobile Crisis Apps in Germany.
AIS, In: Proceedings of the European Conference on Information Systems (ECIS 2020), ISBN 978-1-7336325-1-5,
[Online-Edition: https://aisel.aisnet.org/ecis2020_rp/84],
[Konferenzveröffentlichung]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
In: 29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Online-Edition: https://arxiv.org/abs/1912.04870],
[Konferenzveröffentlichung]

Krüger, Stefan ; Ali, Karim ; Bodden, Eric (2020):
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
In: International Symposium on Code Generation and Optimization, San Diego, CA, USA, February 22.-26., 2020, [Online-Edition: https://cgo-conference.github.io/cgo2020/],
[Konferenzveröffentlichung]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
In: Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Online-Edition: https://www.ndss-symposium.org/ndss-program/2020-program/dis...],
[Konferenzveröffentlichung]

Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, In: Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Konferenzveröffentlichung]

Reuter, Christian ; Haunschild, Jasmin ; Hollick, Matthias ; Mühlhäuser, Max ; Vogt, Joachim ; Kreutzer, Michael (2020):
Towards Secure Urban Infrastructures: Cyber Security Challenges to Information and Communication Technology in Smart Cities.
Gesellschaft für Informatik e.V., In: Mensch und Computer 2020 - Digitaler Wandel im Fluss der Zeit, virtual Conference, 06.-09.09., [Online-Edition: https://www.conftool.com/muc2020/index.php?page=browseSessio...],
[Konferenzveröffentlichung]

Reuter, Christian ; Kaufhold, Marc-André ; Comes, Tina ; Knodt, Michèle ; Mühlhäuser, Max (2020):
Mobile Resilience: Designing Mobile Interactive Systems for Societal and Technical Resilience.
In: 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI 2020), virtual Conference, 05.-09.10., [Online-Edition: https://mobilehci.acm.org/2020/workshops/],
[Konferenzveröffentlichung]

Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2020):
Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen.
In: BBK Bevölkerungsschutz, 2. S. 14-17, [Online-Edition: https://www.bbk.bund.de/SharedDocs/Downloads/BBK/DE/Publikat...],
[Artikel]

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
In: DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, In: 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Online-Edition: https://dsn2020.webs.upv.es/],
[Konferenzveröffentlichung]

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
In: Design Automation Conference 2020, virtual Conference, 19.-22.07., [Online-Edition: https://www.dac.com/],
[Konferenzveröffentlichung]

2019

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES 2019 - 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, August 26. - 29., ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3339252.3341475],
[Konferenzveröffentlichung]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
In: ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
In: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Online-Edition: https://eprint.iacr.org/2019/1034.pdf],
[Konferenzveröffentlichung]

Stonner, David Jakob ; Kysela, Jaroslav ; Weir, Graeme ; Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2019):
Deterministic twirling with low resources.
In: Physics Letters A, 2019. Elsevier, DOI: 10.1016/j.physleta.2019.126179,
[Online-Edition: https://www.sciencedirect.com/science/article/pii/S037596011...],
[Artikel]

Zimmermann, Verena ; Gerber, Paul ; Marky, Karola ; Böck, Leon ; Kirchbuchner, Florian (2019):
Assessing Users’ Privacy and Security Concerns of Smart Home Technologies.
In: i-com Journal of Interactive Media, 18 (3), 2019. De Gruyter, S. 197-216, e-ISSN 2196-6826,
DOI: 10.1515/icom-2019-0015,
[Artikel]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Online-Edition: https://eprint.iacr.org/2019/1356],
[Report]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
In: ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, In: 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Konferenzveröffentlichung]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, (2), 23. S. 16-21, ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Online-Edition: https://dl.acm.org/doi/10.1145/3372300.3372304],
[Artikel]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Konferenzveröffentlichung]

Köhler, Mirco ; Salvaneschi, Guido (2019):
Automated Refactoring to Reactive Programming.
In: ASE'19 - The 34th International Conference on Automated Software Engineering, San Diego, Ca, USA, November 10.-15.,2019, DOI: 10.1109/ASE.2019.00082,
[Online-Edition: https://2019.ase-conferences.org/],
[Konferenzveröffentlichung]

Nguyen, Giang Nam (2019):
Developing Performance Models for Codes with Exponential Runtime Behavior.
Darmstadt, TU Darmstadt, [Masterarbeit]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Konferenzveröffentlichung]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Online-Edition: https://encrypto.de/papers/TNKSB19.pdf],
[Artikel]

Zaidan, Firas (2019):
Developing a Fuzzing Framework for ARM TrustZone.
Darmstadt, TU Darmstadt, [Masterarbeit]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Artikel]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2019):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019. Institute of Electrical and Electronics Engineers, ISSN 1939-3520,
DOI: 10.1109/TSE.2019.2948910,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/8880510],
[Artikel]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Artikel]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, SpringerOpen, S. 16, DOI: 10.1186/s13635-019-0099-x,
[Online-Edition: https://jis-eurasipjournals.springeropen.com/articles/10.118...],
[Artikel]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, In: Latincrypt 2019, Oct. 2–4, 2019, [Konferenzveröffentlichung]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, (5), 42. Springer Heidelberg, S. 343-344, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Artikel]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Konferenzveröffentlichung]

Salvaneschi, Guido ; Köhler, Mirko ; Sokolowski, Daniel ; Haller, Philipp ; Erdweg, Sebastian ; Mezini, Mira (2019):
Language-integrated privacy-aware distributed queries.
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA), ACM, S. 167, ISSN 2475-1421,
DOI: 10.1145/3360593,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3360593],
[Artikel]

Ghaeini, Hamid Reza ; Chan, Matthew ; Bahmani, Raad ; Brasser, Ferdinand ; Garcia, Luis ; Zhou, Jianying ; Sadeghi, Ahmad-Reza ; Tippenhauer, Nils Ole ; Zonouz, Saman A. (2019):
PAtt: Physics-based Attestation of Control Systems.
Beijing, In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, 23. - 25.09.2019, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
In: ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, S. 521-541, ISBN 978-3-030-29962-0,
[Konferenzveröffentlichung]

Grinko, Margarita ; Kaufhold, Marc-André ; Reuter, Christian Alt, Florian ; Bulling, Andreas ; Döring, Tanja (Hrsg.) (2019):
Adoption, Use and Diffusion of Crisis Apps in Germany: A Representative Survey.
In: MuC'19 - Mensch und Computer, Hamburg, Germany, 8. bis 11. September 2019, ISBN 978-1-4503-7198-8,
DOI: 10.1145/3340764.3340782,
[Konferenzveröffentlichung]

Kalle, Timo ; Kaufhold, Marc-André ; Kuntke, Franz ; Reuter, Christian ; Rizk, Amr ; Steinmetz, Ralf David, Klaus (Hrsg.) (2019):
Resilience in Security and Crises through Adaptions and Transitions.
294In: GI-Edition. Proceedings, Bonn, Gesellschaft für Informatik e. V., In: 49. Jahrestagung der Gesellschaft für Informatik, Kassel, Germany, 23.-26. September 2019, ISBN 978-3-88579-688-6,
DOI: 10.18420/inf2019_ws60,
[Konferenzveröffentlichung]

Nikolopoulos, Georgios M. (2019):
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20), S. 29367-29379, DOI: 10.1364/OE.27.029367,
[Artikel]

Stonner, David Jakob (2019):
Construction of Random Unitary Operations for Asymptotic Preparation of Werner States.
Darmstadt, Technische Universität Darmstadt, [Bachelorarbeit]

Spielhofer, Thomas ; Hahne, Anna Sophie ; Reuter, Christian ; Kaufhold, Marc-André ; Schmid, Stefka (2019):
Social Media Use in Emergencies of Citizens in the United Kingdom.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/thomasspielhofer2/2019/1748_Thom...],
[Konferenzveröffentlichung]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Artikel]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
In: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, S. 251-261, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3293882&picked=prox],
[Konferenzveröffentlichung]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
In: USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
In: 28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Konferenzveröffentlichung]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Konferenzveröffentlichung]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Konferenzveröffentlichung]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
In: Quantum Information Processing, 18 (8), 2019. Springer Nature, S. 259, ISSN 1570-0755, e-ISSN 1573-1332,
DOI: 10.1007/s11128-019-2372-9,
[Artikel]

Paverd, Andrew ; Völp, Marcus ; Brasser, Ferdinand ; Schunter, Matthias ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Esteves-Verissimo, Paulo ; Steininger, Andreas ; Holz, Thorsten (2019):
Sustainable Security & Safety: Challenges and Opportunities.
Stuttgart, In: 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Stuttgart, 09.07.2019, DOI: 10.4230/OASIcs.CERTS.2019.4,
[Konferenzveröffentlichung]

Bock, Carsten ; Brasser, Ferdinand ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2019):
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Auckland, In: ACM Asia Conference on Computer and Communications Security (AsiaCCS), Auckland, 07. - 12.07.2019, DOI: 10.1145/3321705.3329827,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2De Gruyter Open, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Artikel]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KSS19.pdf],
[Konferenzveröffentlichung]

Schneider, Thomas ; Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Online-Edition: https://encrypto.de/papers/ST19ASIACCS.pdf],
[Konferenzveröffentlichung]

Zucker, René (2019):
Erstellung eines Python-Interfaces für die Erforschung von Polytopen in der Quanteninformationstheorie.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelorarbeit]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2019):
A Practical Attestation Protocol for Autonomous Embedded Systems.
In: 4th IEEE European Symposium on Security and Privacy (EuroS&P'19), Stockholm, Sweden, 17-19 June 2019, [Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/],
[Konferenzveröffentlichung]

Olt, Christian M. ; Mesbah, Neda (2019):
Weary of Watching Out? - Cause and Effect of Security Fatigue.
In: European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Konferenzveröffentlichung]

Wagner, Amina ; Mesbah, Neda (2019):
Too Confident to Care: Investigating Overconfidence in Privacy Decision Making.
In: European Conference on Information Systems - ECIS 2019, Stockholm, Sweden, 8. - 14.6.2019, [Konferenzveröffentlichung]

Zimmermann, Verena ; Gerber, Nina ; Mayer, Peter ; Kleboth, Marius ; von Preuschen, Alexandra ; Schmidt, Konstantin (2019):
Keep on rating – on the systematic rating and comparison of authentication schemes.
In: Information & Computer Security, Emerald Publishing, ISSN 2056-4961,
DOI: 10.1108/ICS-01-2019-0020,
[Online-Edition: https://www.emerald.com/insight/content/doi/10.1108/ICS-01-2...],
[Artikel]

Kohnhäuser, Florian (2019):
Advanced Remote Attestation Protocols for Embedded Systems.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8998],
[Dissertation]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8762],
[Dissertation]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, In: Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Konferenzveröffentlichung]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019, k.A., ACM, In: Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Online-Edition: https://dl.acm.org/citation.cfm?id=3316781],
[Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, Springer, Faro, Portugal, 12.-14.06.2019, S. 535-542, DOI: 10.1007/978-3-030-22750-0_48,
[Online-Edition: https://link.springer.com/chapter/10.1007%2F978-3-030-22750-...],
[Konferenzveröffentlichung]

Gerber, Nina ; Zimmermann, Verena ; Volkamer, Melanie (2019):
Why Johnny Fails to Protect his Privacy.
Los Alamos, California, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Konferenzveröffentlichung]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Konferenzveröffentlichung]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
In: The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Konferenzveröffentlichung]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Online-Edition: https://encrypto.de/papers/NJTKHMAATMGPCESBRTB19.pdf],
[Artikel]

Zimmermann, Verena ; Dickhaut, Ernestine ; Gerber, Paul ; Vogt, Joachim (2019):
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users.
Los Alamos, California, IEEE, In: 4th European Workshop on Usable Security (EuroUSEC 2019), Stockholm, Schweden, 20.06.2019, [Konferenzveröffentlichung]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8716],
[Dissertation]

Kohnhäuser, Florian ; Püllen, Dominik ; Katzenbeisser, Stefan (2019):
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles.
In: IEEE Workshop on the Internet of Safe Things, San Francisco, California, USA, 23rd May 2019, [Online-Edition: https://www.ieee-security.org/TC/SPW2019/SafeThings/],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Habdank, Matthias (2019):
Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System.
In: Behaviour & Information Technology (BIT), 38. Taylor & Francis, S. 1-24, DOI: 10.1080/0144929X.2019.1620334,
[Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Artikel]

OConnor, TJ ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
In: Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), Springer, S. 276-280, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Artikel]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories, k.A., IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Online-Edition: https://conf.researchr.org/home/msr-2019],
[Konferenzveröffentlichung]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, In: PQCrypto 2019, May 8-10, 2019, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019, Darmstadt, IACR, In: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Online-Edition: https://eurocrypt.iacr.org/2019/],
[Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Konferenzveröffentlichung]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Online-Edition: https://ieeexplore.ieee.org/document/8703121],
[Artikel]

Speth, Jonathan (2019):
How secure are business applications? An in-depth study on the security of business applications.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
In: 10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Online-Edition: https://www.cosade.org/cosade19/index.html],
[Konferenzveröffentlichung]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Masterarbeit]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), [Konferenzveröffentlichung]

Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, In: 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Konferenzveröffentlichung]

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., In: IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Konferenzveröffentlichung]

Reuter, Christian (Hrsg.) (2019):
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace.
Wiesbaden, Springer Vieweg, ISBN 978-3-658-25651-7,
DOI: 10.1007/978-3-658-25652-4,
[Buch]

Schulz, Philipp (2019):
Developing Secure Distributed Systems with Modular Tierless Programming.
TU Darmstadt, [Masterarbeit]

Srivatsa, Jeevan Karanam (2019):
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
TU Darmstadt, [Masterarbeit]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, In: IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Online-Edition: https://ieeexplore.ieee.org/document/8647607],
[Konferenzveröffentlichung]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Artikel]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
In: 23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Online-Edition: https://eprint.iacr.org/2019/154],
[Report]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, Springer, San Francisco, CA, USA, March 4–8, 2019, S. 493-513, [Online-Edition: https://www.rsaconference.com/events/us19/speakers/cryptogra...],
[Konferenzveröffentlichung]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS), In: 26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Konferenzveröffentlichung]

Surminski, Sebastian ; Rodler, Michael ; Davi, Lucas (2019):
Poster: Automated Evaluation of Fuzzers.
Internet Society, In: NDSS 2019 : 26th Annual Network and Distributed System Security Symposium, San Diego, California, 24 – 27 February 2019, [Online-Edition: https://www.ndss-symposium.org/wp-content/uploads/2019/02/nd...],
[Konferenzveröffentlichung]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Krüger, Stefan ; Hermann, Ben (2019):
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
In: GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering, Montreal, Canada, May 27, 2019, DOI: 10.1109/GE.2019.00012,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3339011],
[Konferenzveröffentlichung]

Maier, Christine ; Brydges, Tiff ; Jurcevic, Petar ; Trautmann, Nils ; Hempel, Cornelius ; Lanyon, Ben P. ; Hauke, Philipp ; Blatt, Rainer ; Roos, Christian F. (2019):
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5), American Physical Society, S. 050501, DOI: 10.1103/PhysRevLett.122.050501,
[Online-Edition: https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.12...],
[Artikel]

Wegert, Leonard (2019):
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
TU Darmstadt, [Bachelorarbeit]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Heidt, Margareta ; Gerlach, Jin ; Buxmann, Peter (2019):
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions.
In: Hawaii International Conference on System Sciences (HICSS), Wailea, USA, 08.-11.01.2019, [Online-Edition: http://hicss.hawaii.edu],
[Konferenzveröffentlichung]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Urheber) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Buchkapitel]

Heidt, Margareta ; Olt, Christian M. ; Buxmann, Peter (2019):
To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context.
In: Internationale Tagung Wirtschaftsinformatik, Siegen, Deutschland, 24.02.2019-27.02.2019, [Online-Edition: https://wi2019.de/],
[Konferenzveröffentlichung]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Masterarbeit]

Reuter, Christian ; Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko (Hrsg.) (2019):
SCIENCE PEACE SECURITY ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research.
Darmstadt, tuprints, DOI: 10.25534/tuprints-00009164,
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/9164],
[Konferenzveröffentlichung]

Aldehoff, Larissa ; Dankenbring, Meri ; Reuter, Christian (2019):
Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/larissaaldehoff/2019/1798_Lariss...],
[Konferenzveröffentlichung]

Almon, Lars ; Álvarez, Flor ; Kamp, Laurenz ; Hollick, Matthias (2019):
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments.
In: 2019 IEEE 44nd Conference on Local Computer Networks (LCN), Osnabrück, 14-17 Oktober 2019, [Konferenzveröffentlichung]

Bernardi, Ansgar ; Reuter, Christian ; Schneider, Wolfgang ; Linsner, Sebastian ; Kaufhold, Marc-André Meyer-Aurich, A. (Hrsg.) (2019):
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft.
287In: Gesellschaft für Informatik: GI-Edition / Proceedings, In: Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Bonn, Gesellschaft für Informatik, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19.2.2019, S. 25-30, ISBN 978-3-88579-681-7,
[Online-Edition: http://gil-net.de/Publikationen/139_25-30.pdf],
[Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Online-Edition: https://eprint.iacr.org/2019/1014.pdf],
[Artikel]

De Oliveira Nunes, Ivan ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
In: The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, [Konferenzveröffentlichung]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8605],
[Dissertation]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
IEEE Computer Society, In: 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, S. 327-340, [Online-Edition: https://www.ieee-security.org/TC/SP2018/],
[Konferenzveröffentlichung]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, In: The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Konferenzveröffentlichung]

El Bansarkhani, Rachid (2019):
LARA - A Design Concept for Lattice-based Encryption.
In: FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, S. 377-395, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Online-Edition: https://link.springer.com/chapter/10.1007%2F978-3-030-32101-...],
[Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Online-Edition: https://eprint.iacr.org/2019/1053.pdf],
[Artikel]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, In: International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Online-Edition: http://www.c2si-conference.org/],
[Konferenzveröffentlichung]

Hartwig, Katrin ; Reuter, Christian (2019):
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_HartwigReuter_TrustyTwe...],
[Konferenzveröffentlichung]

Hartwig, Katrin ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Konferenzveröffentlichung]

Kaufhold, Marc-André ; Grinko, Margarita ; Reuter, Christian ; Schorch, Marén ; Langer, Amanda ; Skudelny, Sascha ; Hollick, Matthias (2019):
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, 23.-27.2.2019, [Online-Edition: http://www.peasec.de/paper/2019/2019_KaufholdGrinkoReutereta...],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Cultural Violence and Peace in Social Media.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Kaufhold, Marc-André ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas (2019):
Cross-Media Usage of Social Big Data for Emergency Services and Volunteer Communities: Approaches, Development and Challenges of Multi-Platform Social Media Services.
In: arXiv:1907.07725 cs.SI, S. 1-11, [Online-Edition: https://arxiv.org/pdf/1907.07725.pdf],
[Artikel]

Kaufhold, Marc-André ; Schmidt, Arne ; Seifert, Fabienne ; Riebe, Thea ; Reuter, Christian (2019):
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Konferenzveröffentlichung]

Langer, Amanda ; Kaufhold, Marc-André ; Runft, Elena ; Reuter, Christian ; Grinko, Margarita ; Pipek, Volkmar (2019):
Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism.
In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), València, Spain, May 19 to 22, 2019, [Online-Edition: http://idl.iscram.org/files/amandalanger1/2019/1757_AmandaLa...],
[Konferenzveröffentlichung]

Linsner, Sebastian ; Varma, Rashmi ; Reuter, Christian (2019):
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks.
Wien, In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, 18.-19. Februar 2019, [Online-Edition: http://gil-net.de/Publikationen/139_119.pdf],
[Konferenzveröffentlichung]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, In: Design Automation Conference (DAC), 2019, [Konferenzveröffentlichung]

Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, In: Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Konferenzveröffentlichung]

Reinhold, Thomas ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
From Cyber War to Cyber Peace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Reinhold, Thomas ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Verification in Cyberspace.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Reuter, Christian (2019):
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges.
Darmstadt, Germany, TUprints, [Buch]

Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Information Technology for Peace and Security - Introduction and Overview.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Reuter, Christian Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (Hrsg.) (2019):
Fake News und manipulierte Meinungsbildung.
In: Digitalisierung der Kommunikation und der Wandel von Organisationen, Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, S. accepted, [Buchkapitel]

Reuter, Christian Ückert, Sandra (Hrsg.) (2019):
Quo Vadis? Digitalisierung und Social Media im Bevölkerungsschutz.
In: Digitalisierung als Erfolgsfaktor für Unternehmern im Wohlfahrts- und Sozialwesen, Nomos, [Buchkapitel]

Reuter, Christian ; Aldehoff, Larissa ; Riebe, Thea ; Kaufhold, Marc-André Reuter, Christian (Hrsg.) (2019):
IT in Peace, Conflict, and Security Research.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Reuter, Christian ; Altmann, Jürgen ; Aal, Konstantin ; Aldehoff, Larissa ; Buchmann, Johannes ; Bernhardt, Ute ; Denker, Kai ; Herrmann, Dominik ; Hollick, Matthias ; Katzenbeisser, Stefan ; Kaufhold, Marc-André ; Nordmann, Alfred ; Reinhold, Thomas ; Riebe, Thea ; Ripper, Annette ; Ruhmann, Ingo ; Saalbach, Klaus-Peter ; Schörnig, Niklas ; Sunyaev, Ali ; Wulf, Volker Reuter, Christian (Hrsg.) (2019):
The Future of IT in Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, DOI: 10.1007/978-3-658-25652-4_19,
[Online-Edition: https://www.springer.com/de/book/9783658256517],
[Buchkapitel]

Reuter, Christian ; Hartwig, Katrin ; Kirchner, Jan ; Schlegel, Noah (2019):
Fake News Perception in Germany: A Representative Study of People's Attitudes and Approaches to Counteract Disinformation.
Siegen, Germany, In: Proceedings of the International Conference on Wirtschaftsinformatik, Siegen, Germany, [Konferenzveröffentlichung]

Reuter, Christian ; Häusser, Katja ; Bien, Mona ; Herbert, Franziska Alt, Florian ; Bulling, Andreas ; Döring, Tanja (Hrsg.) (2019):
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.0.2019, ISSN ISSN 2510-2672,
[Konferenzveröffentlichung]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Ludwig, Thomas ; Pottebaum, Jens ; Kaufhold, Marc-André (2019):
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten.
ACM, In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Konferenzveröffentlichung]

Reuter, Christian ; Riebe, Thea ; Aldehoff, Larissa ; Kaufhold, Marc-André ; Reinhold, Thomas Werkner, Ines-Jacqueline (Hrsg.) (2019):
Cyberwar zwischen Fiktion und Realität – technologische Möglichkeiten.
In: Cyberwar – die Digitalisierung der Kriegsführung?, Springer VS, S. akzeptiert, [Buchkapitel]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel (2019):
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur.
In: 38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?, Wien, AUT, 18.-19.02.2019, [Online-Edition: https://www.gil-net.de/tagungen.php],
[Konferenzveröffentlichung]

Reuter, Christian ; Schultz, Tanjev ; Stegbauer, Christian (2019):
Digitalisierung der Kommunikation und der Wandel von Organisationen.
Frankfurt am Main, Mercator Science-Policy Fellowship-Programme, [Buch]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Social Media in Conflicts and Crises.
In: Behaviour & Information Technology (BIT), 38DOI: 10.1080/0144929X.2019.1629025.,
[Online-Edition: https://www.tandfonline.com/doi/full/10.1080/0144929X.2019.1...],
[Artikel]

Reuter, Christian ; Stieglitz, Stefan ; Imran, Muhammad (2019):
Special Issue on Social Media in Conflicts and Crises.
accepted[Buch]

Riebe, Thea ; Kaufhold, Marc-André ; Kumar, Tarun ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Threat Intelligence Application for Cyber Attribution.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Konferenzveröffentlichung]

Riebe, Thea ; Langer, Amanda ; Kaufhold, Marc-André ; Kretschmer, Nina Katharina ; Reuter, Christian (2019):
Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz.
In: Mensch und Computer 2019, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Konferenzveröffentlichung]

Riebe, Thea ; Reuter, Christian (2019):
Dual-Use in der IT: Bewertung in der Softwareentwicklung.
In: Wissenschaft & Frieden, (1), S. 46-48, [Online-Edition: http://www.peasec.de/paper/2019/2019_RiebeReuter_DualUse_WuF...],
[Artikel]

Riebe, Thea ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Accessing Dual Use in IT Development.
Darmstadt, Germany, TUprints, In: SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9.2019, [Konferenzveröffentlichung]

Riebe, Thea ; Reuter, Christian Reuter, Christian (Hrsg.) (2019):
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, Wiesbaden, Germany, Springer Vieweg, [Buchkapitel]

Saeed, Saqib ; Pipek, Volkmar ; Rohde, Markus ; Reuter, Christian ; Carvalho, Pinatti De (2019):
Nomadic Knowledge Sharing Practices and Challenges: Findings from a Long-term Case Study.
In: IEEE Access, 7 (1), S. 63564-63577, DOI: 10.1109/ACCESS.2019.2916903,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=871...],
[Artikel]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, In: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Online-Edition: https://acisp19.canterbury.ac.nz/],
[Konferenzveröffentlichung]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian (2019):
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit.
ACM, In: Mensch und Computer 2019 - Workshopband, Hamburg, Germany, 8.-11.9.2019, ISSN 2510-2672,
[Konferenzveröffentlichung]

Schmidbauer-Wolf, Gina Maria ; Herbert, Franziska ; Reuter, Christian Altmann, Jürgen ; Göttsche, Malte ; Himmel, Mirko ; Reuter, Christian (Hrsg.) (2019):
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations.
In: SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges, Darmstadt, Germany, 25.-27.9., S. 70-73, DOI: 10.25534/tuprints-00009164,
[Konferenzveröffentlichung]

Stute, Milan ; Narain, Sashank ; Mariotto, Alex ; Heinrich, Alexander ; Kreitschmann, David ; Noubir, Guevara ; Hollick, Matthias (2019):
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.
Santa Clara, CA, USA, In: 28th USENIX Security Symposium (USENIX Security '19), Santa Clara, CA, USA, August 14–16, 2019, [Online-Edition: https://www.usenix.org/conference/usenixsecurity19/presentat...],
[Konferenzveröffentlichung]

Zimmermann, Verena ; Renaud, Karen (2019):
Moving from a "human-as-problem” to a "human-as-solution” cybersecurity mindset.
In: International Journal of Human-Computer Studies, Elsevier, DOI: 10.1016/j.ijhcs.2019.05.005,
[Artikel]

Álvarez, Flor ; Almon, Lars ; Radtki, Hauke ; Hollick, Matthias (2019):
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh.
In: 9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019), Seattle, WA, 17-20, Oktober, 2019, [Konferenzveröffentlichung]

2018

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: LNCS, In: International Conference on Information Security and Cryptology (ICISC) 2018, Springer, Seoul, Korean, Nov 28, 2018 - Nov 30, 2018, [Online-Edition: http://www.wikicfp.com/cfp/program?id=1397&s=ICISC&f=Interna...],
[Konferenzveröffentlichung]

Heidt, Margareta ; Gerlach, Jin (2018):
The Influence of SME Constraints in an Organizational IT Security Context.
San Francisco, USA, In: International Conference on Information Systems (ICIS), San Francisco, USA, 13.-16.12.2018, [Online-Edition: https://icis2018.aisconferences.org/],
[Konferenzveröffentlichung]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Masterarbeit]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8495],
[Dissertation]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelorarbeit]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelorarbeit]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, In: The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Online-Edition: http://fps2018.encs.concordia.ca/],
[Konferenzveröffentlichung]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3267716,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3267716],
[Konferenzveröffentlichung]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Artikel]

Stute, Milan ; Kreitschmann, David ; Hollick, Matthias (2018):
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.
ACM, In: The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18), New Delhi, India, October 29–November 2, 2018, DOI: 10.1145/3241539.3241566,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3241539.3241566],
[Konferenzveröffentlichung]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
In: ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018, Springer, In: Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Online-Edition: https://asiacrypt.iacr.org/2018/index.html],
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, S. 66-70, DOI: 10.1145/3267323.3268963,
[Online-Edition: https://dl.acm.org/citation.cfm?doid=3267323.3268963],
[Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Konferenzveröffentlichung]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Masterarbeit]

Ibrahim, Ahmad (2018):
Collective Attestation: for a Stronger Security in Embedded Networks.
In: IEEE, Salvador, Brazil, Brazil, October, 2.-5., DOI: 10.1109/SRDS.2018.00039,
[Konferenzveröffentlichung]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, S. 847-861, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Konferenzveröffentlichung]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, In: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Online-Edition: https://www.sigsac.org/ccs/CCS2018/],
[Konferenzveröffentlichung]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Masterarbeit]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Masterarbeit]

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Masterarbeit]

Schneider, Thomas ; Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, S. 71-75, DOI: 10.1145/3267323.3268956,
[Online-Edition: https://encrypto.de/papers/TS18.pdf],
[Konferenzveröffentlichung]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelorarbeit]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Artikel]

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018, IEEE Computer Society, In: CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Online-Edition: https://cse2018.hpc.pub.ro/],
[Konferenzveröffentlichung]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

El Bansarkhani, Rachid (2018):
LARA - A Design Concept for Lattice-based Encryption.
(Report 2017/049), In: ePrint Archive, [Report]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
In: MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Online-Edition: https://doi.org/10.1145/3241539.3241576],
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), S. 1303-1307, DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Konferenzveröffentlichung]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelorarbeit]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ACM, In: ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, S. 340-350, DOI: 10.1145/3238147.3238226,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3238226],
[Konferenzveröffentlichung]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelorarbeit]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, S. 3-22, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Konferenzveröffentlichung]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Online-Edition: http://dsn2017.github.io/],
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI, In: 28th Crypto-Day, München, Deutschland, [Konferenzveröffentlichung]

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: GI, In: 28th Crypto-Day, [Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Artikel]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Masterarbeit]

Kalsen, Ali (2018):
On the impact of quantum algorithms on lattice enumeration.
TU Darmstadt, [Masterarbeit]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Masterarbeit]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: 27th USENIX Security Symposium, In: 27th USENIX Security Symposium, Baltimore, MD, USA, 15.-17.08.2018, [Konferenzveröffentlichung]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie (2018):
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
In: International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27.08. - 30.08.2018, DOI: 10.1145/3230833.3230859,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Konferenzveröffentlichung]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Masterarbeit]

Zimmermann, Verena ; Gerber, Nina ; Kleboth, Marius ; von Preuschen, Alexandra ; Schmidt, Konstantin ; Mayer, Peter Clarke, Nathan L. ; Furnell, Steven M. (Hrsg.) (2018):
The Quest to Replace Passwords Revisited – Rating Authentication Schemes.
In: Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), Plymouth, UK, University of Plymouth, In: Twelth International Symposium on Human Aspects of Information Security & Assurance (HAISA), Dundee, UK, 29. - 31.08.2018, S. 38-48, [Konferenzveröffentlichung]

du Crest de Villeneuve, Come (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Masterarbeit]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Masterarbeit]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelorarbeit]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Masterarbeit]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Masterarbeit]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Masterarbeit]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Masterarbeit]

Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan (2018):
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, Incheon, Republic of Korea, S. 329-342, DOI: 10.1145/3196494.3196544,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544],
[Konferenzveröffentlichung]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelorarbeit]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS), In: ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Online-Edition: https://esorics2018.upc.edu/],
[Konferenzveröffentlichung]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
In: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Online-Edition: http://icdcs2018.ocg.at],
[Konferenzveröffentlichung]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon, [Anderes]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, IEEE, Taipei, Taiwan, S. 1-6, DOI: 10.1109/NOMS.2018.8406315,
[Konferenzveröffentlichung]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018, In: 11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Online-Edition: http://scn.di.unisa.it/],
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
ACM, In: IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, S. 49-54, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Online-Edition: https://conferences.sigcomm.org/sigcomm/2018/workshop-iotsp....],
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, (7), 2. MDPI, DOI: 10.3390/cryptography2020007,
[Artikel]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Artikel]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
LNCS 10892In: Springer International Publishing, In: Applied Cryptography and Network Security - ACNS 2018, In: 16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, S. 202-220, [Online-Edition: https://www.springer.com/us/book/9783319933863],
[Konferenzveröffentlichung]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018, Songdo, Incheon, Korea, In: The Sixth International Workshop on Security in Cloud Computing (SCC), [Konferenzveröffentlichung]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
10815In: LNCS, Springer, In: 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., S. 168-188, ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-89641-0_...],
[Konferenzveröffentlichung]

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: LNCS, In: Information Security - 21st International Conference, ISC 2018, Guildford, UK, [Online-Edition: http://isc2018.sccs.surrey.ac.uk/],
[Konferenzveröffentlichung]

Wunderer, Thomas ; Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: Springer LNCS, In: ISPEC 2018, Tokyo, Japan, In: 14th International Conference on Information Security Practice and Experience (ISPEC 2018), [Konferenzveröffentlichung]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, In: Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Konferenzveröffentlichung]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
In: 37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Konferenzveröffentlichung]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
In: 23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
In: 37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Konferenzveröffentlichung]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 159-178, DOI: 10.1515/popets-2018-0037,
[Artikel]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, S. 113-118, DOI: 10.1145/3236454.3236509,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236509],
[Konferenzveröffentlichung]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Masterarbeit]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Schloss Dagstuhl-Leibniz-Zentrum für Informatik, In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, S. 10:1-10:27, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Online-Edition: https://2018.ecoop.org/],
[Konferenzveröffentlichung]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Masterarbeit]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelorarbeit]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, ACM, In: SOAP 2018, Amsterdam, Netherlands, S. 107-112, DOI: 10.1145/3236454.3236503,
[Online-Edition: https://dl.acm.org/citation.cfm?id=3236503],
[Konferenzveröffentlichung]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelorarbeit]

Senker, Matthias (2018):
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Masterarbeit]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm],
[Artikel]

Heidt, Margareta (2018):
Learning from Climate Research: Applying the Finite Pool of Worry on Cyber-Related Hazards.
In: European Conference on Information Systems (ECIS), Portsmouth, United Kingdom, 2018 [Research-in-Progress], [Artikel]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, k.A., SciTePress, In: Secrypt 2018, Porto, Portugal, 26.-28.07.2018, S. 698-702, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Konferenzveröffentlichung]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), IEEE, S. 1-6, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Online-Edition: https://encrypto.de/papers/RYTLJSL18.pdf],
[Konferenzveröffentlichung]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Masterarbeit]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security, [Konferenzveröffentlichung]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelorarbeit]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), ACM, In: 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, S. 32:1-32:6, [Konferenzveröffentlichung]

Renaud, Karen ; Zimmermann, Verena (2018):
Guidelines For Ethical Nudging in Password Authentication.
In: South African Institute Of Electrical Engineers (SAIEE), 109 (2), S. 102-118, [Artikel]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, S. 707-721, DOI: 10.1145/3196494.3196522,
[Online-Edition: https://encrypto.de/papers/RWTSSK18.pdf],
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
In: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, S. 12-22, DOI: 10.1145/3212480.3212499,
[Online-Edition: https://doi.org/10.1145/3212480.3212499],
[Konferenzveröffentlichung]

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, S. 221-235, DOI: 10.1145/3196494.3196541,
[Online-Edition: https://encrypto.de/papers/TWSH18.pdf],
[Konferenzveröffentlichung]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Masterarbeit]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018, [Konferenzveröffentlichung]

van der Wijden, Marius (2018):
Payment and State Channels in practice.
TU Darmstadt, [Masterarbeit]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Masterarbeit]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Masterarbeit]

Wolf, Yannic (2018):
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt, [Bachelorarbeit]

Biondo, Andrea ; Conti, Mauro ; Davi, Lucas ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2018):
The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
In: 27th USENIX Security Symposium, [Konferenzveröffentlichung]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: Frontiers of Information Technology & Electronic Engineering, (9), 18. Springer, S. 1348-1369, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Online-Edition: https://link.springer.com/journal/11714],
[Artikel]

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE, ACM, [Konferenzveröffentlichung]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Masterarbeit]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Masterarbeit]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelorarbeit]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
In: IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, S. 125-157, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Konferenzveröffentlichung]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Masterarbeit]

Vasilomanolakis, Emmanouil ; Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max (2018):
Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), IEEE, Taipei, Taiwan., S. 1-2, DOI: 10.1109/NOMS.2018.8406119,
[Konferenzveröffentlichung]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, Gesellschaft für Informatik, S. 117-118, [Buchkapitel]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Masterarbeit]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelorarbeit]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Masterarbeit]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), ACM, [Konferenzveröffentlichung]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Masterarbeit]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Masterarbeit]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Trautmann, Nils ; Hauke, Philipp (2018):
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: PHYSICAL REVIEW A, 97S. 023606, [Artikel]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Masterarbeit]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: CoRR, abs/1801.05764[Online-Edition: http://arxiv.org/abs/1801.05764],
[Artikel]

Gerber, Paul ; Ghiglieri, Marco ; Henhapl, Birgit ; Kulyk, Oksana ; Marky, Karola ; Mayer, Peter ; Reinheimer, Benjamin ; Volkamer, Melanie (2018):
Human Factors in Security.
In: Sicherheitskritische Mensch-Computer-Interaktion, Springer, S. 83-98, [Buchkapitel]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), S. 7:1-7:35, DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],
[Artikel]

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop, In: 3rd NSF Millimeter-Wave RCN Workshop, [Konferenzveröffentlichung]

Reuter, Christian (Hrsg.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement.
Wiesbaden, Springer Vieweg (Lehrbuch/Fachbuch), ISBN 978-3-658-19522-9,
DOI: 10.1007/978-3-658-19523-6,
[Online-Edition: http://www.springer.com/de/book/9783658195229],
[Buch]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (Hrsg.) (2018):
Social Media in Crisis Management - Special Issue.
34Taylor & Francis Online, ISSN 1532-7590,
[Online-Edition: https://www.tandfonline.com/toc/hihc20/34/4?nav=tocList],
[Zeitschriftenheft, -band oder -jahrgang]

Reuter, Christian ; Mentler, Tilo (Hrsg.) (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems - Special Issue.
26 (1), Wiley, ISSN 0966-0879,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/jccm.2018.26.issu...],
[Zeitschriftenheft, -band oder -jahrgang]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Artikel]

Asokan, N. ; Gröndahl, Tommi ; Nguyen, Hoang Long ; Nguyen, Thien Duc ; Paverd, Andrew ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Stobert, Elizabeth ; Tamrakar, Sandeep (2018):
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
In: IEEE Internet Computing, S. 1, ISSN 1089-7801,
DOI: 10.1109/MIC.2018.182130646,
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...],
[Artikel]

Asokan, N. ; Miettinen, Markus (2018):
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
In: Computer Communications, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2018.07.030,
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...],
[Artikel]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
In: HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, S. 64-70, DOI: 10.1145/3286062.3286072,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, Piscataway, NJ, USA, IEEE Press, In: Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, S. 15:1-15:10, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283552.3283567],
[Konferenzveröffentlichung]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
In: ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, S. 2213-2215, DOI: 10.1145/3243734.3278516,
[Konferenzveröffentlichung]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197[Online-Edition: http://arxiv.org/abs/1812.00197],
[Artikel]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8094],
[Dissertation]

Gerber, Nina ; Zimmermann, Verena ; Henhapl, Birgit ; Emeröz, Sinem ; Volkamer, Melanie ; Hilt, Tobias (2018):
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
In: Datenschutz und Datensicherheit (DuD), 42 (11), S. 680-685, [Artikel]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
In: 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Konferenzveröffentlichung]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
ACM, In: HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, S. 57-63, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Konferenzveröffentlichung]

Ibrahim, Ahmad (2018):
Securing Embedded Networks Through Secure Collective Attestation.
In: MobiSys PhD Forum '18, New York, NY, USA, ACM, In: Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018, New York, NY, USA, S. 1-2, ISBN 978-1-4503-5841-5,
DOI: 10.1145/3212711.3212712,
[Online-Edition: http://doi.acm.org/10.1145/3212711.3212712],
[Konferenzveröffentlichung]

Ide, Tobias ; Sumer, Vakur ; Aldehoff, Larissa Ojendal, Joakim ; Swain, Ashok (Hrsg.) (2018):
Environmental Peacebuilding in the Middle East.
In: Routledge Handbook of Environmental Conflict and Peacebuilding, London, Routledge, [Buchkapitel]

Kaufhold, Marc-André ; Gizikis, Alexis ; Reuter, Christian ; Habdank, Matthias ; Grinko, Margarita (2018):
Avoiding Chaotic Use of Social Media before, during and after Emergencies: Design and Evaluation of Citizens' Guidelines.
In: Journal of Contingencies and Crisis Management (JCCM), S. 1-16, DOI: 10.1111/1468-5973.12249,
[Online-Edition: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-5973.12...],
[Artikel]

Kaufhold, Marc-André ; Reuter, Christian ; Ermert, Tobias (2018):
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, S. 309-312, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16626/Beitrag...],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian ; Riebe, Thea ; von Radziewski, Elmar Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
Design eines BCM-Dashboards für kleine und mittlere Unternehmen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, S. 579-586, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16796/Beitrag...],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Riebe, Thea ; Reuter, Christian ; Hester, Julian ; Jeske, Danny ; Knüver, Lisa ; Richert, Viktoria (2018):
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), S. 1-19, DOI: 10.4018/IJISCRAM.2018010101,
[Artikel]

Kaufhold, Marc-André ; Rupp, Nicola ; Reuter, Christian ; Amelunxen, Christoph ; Cristaldi, Massimo (2018):
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen.
Portsmouth, UK, In: Proceedings of the European Conference on Information Systems (ECIS), Portsmouth, UK, S. accepted, [Konferenzveröffentlichung]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94Elsevier, S. 45-67, ISSN 2352-2216,
[Artikel]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
In: Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Konferenzveröffentlichung]

Mohan, Sibin ; Asplund, Mikael ; Bloom, Gedare ; Sadeghi, Ahmad-Reza ; Ibrahim, Ahmad ; Salajageh, Negin ; Griffioen, Paul ; Sinopoli, Bruno (2018):
The Future of IoT Security: Special Session.
In: EMSOFT '18, Piscataway, NJ, USA, IEEE Press, In: International Conference on Embedded Software (EMSOFT 2018), 2018, Piscataway, NJ, USA, S. 16:1-16:7, ISBN 978-1-5386-5564-1,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3283535.3283551],
[Konferenzveröffentlichung]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Dang, Minh Hoang ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
In: CoRR, abs/1804.07474[Online-Edition: http://arxiv.org/abs/1804.07474],
[Artikel]

Nordmann, Alfred ; Reuter, Christian ; Lederer, Markus Wiemeyer, Josef (Hrsg.) (2018):
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt.
In: 10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt, Darmstadt, S. 71-89, [Online-Edition: http://www.peasec.de/paper/2019/2019_LedererNordmannReuter_I...],
[Buchkapitel]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
Call Graph Construction for Java Libraries.
Bonn, Gesellschaft für Informatik, In: Software Engineering und Software Management 2018, Bonn, S. 119-120, [Konferenzveröffentlichung]

Renaud, Karen ; Zimmermann, Verena (2018):
Ethical guidelines for nudging in information security & privacy.
In: International Journal of Human-Computer Studies (IJHCS), 120Elsevier, S. 22-35, DOI: 10.1016/j.ijhcs.2018.05.011,
[Artikel]

Renaud, Karen ; Zimmermann, Verena (2018):
Nudging folks towards stronger password choices: Providing certainty is the key.
In: Behavioural Public Policy (BPP), Cambridge University Press, S. 1-31, DOI: 10.1017/bpp.2018.3,
[Artikel]

Reuter, Christian Reuter, Christian (Hrsg.) (2018):
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 3-14, DOI: 10.1007/978-3-658-19523-6_1,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Aal, Konstantin ; Beham, Frank ; Boden, Alexander ; Brauner, Florian ; Ludwig, Thomas ; Lukosch, Stephan ; Fiedrich, Frank ; Fuchs-Kittowski, Frank ; Geisler, Stefan ; Gennen, Klaus ; Herrmann, Dominik ; Kaufhold, Marc-André ; Klafft, Michael ; Lipprandt, Myriam ; Lo Iacono, Luigi ; Pipek, Volkmar ; Pottebaum, Jens ; Mentler, Tilo ; Nestler, Simon ; Stieglitz, Stefan ; Sturm, Christian ; Rusch, Gebhard ; Sackmann, Stefan ; Volkamer, Melanie ; Wulf, Volker Reuter, Christian (Hrsg.) (2018):
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 621-630, DOI: 10.1007/978-3-658-19523-6_30,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Backfried, Gerhard ; Kaufhold, Marc-André ; Spahr, Fabian (2018):
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017.
Rochester, New York, USA, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Rochester, New York, USA, [Online-Edition: http://idl.iscram.org/files/christianreuter/2018/1570_Christ...],
[Konferenzveröffentlichung]

Reuter, Christian ; Hughes, Amanda Lee ; Hiltz, Starr Roxanne ; Imran, Muhammad ; Plotnick, Linda (2018):
Editorial of the Special Issue on Social Media in Crisis Management.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), S. 277-279, DOI: 10.1080/10447318.2018.1427833,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesHiltzImranP...],
[Artikel]

Reuter, Christian ; Hughes, Amanda Lee ; Kaufhold, Marc-André (2018):
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research.
In: International Journal on Human-Computer Interaction (IJHCI), 34 (4), S. 280-294, DOI: 10.1080/10447318.2018.1427832,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterHughesKaufhold_So...],
[Artikel]

Reuter, Christian ; Kaufhold, Marc-André (2018):
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), Wiley, S. 41-57, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12196,
[Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufhold_FifteenY...],
[Artikel]

Reuter, Christian ; Kaufhold, Marc-André Reuter, Christian (Hrsg.) (2018):
Informatik für Frieden und Sicherheit.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 573-595, DOI: 10.1007/978-3-658-19523-6_28,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André Reuter, Christian (Hrsg.) (2018):
Soziale Medien in Notfällen, Krisen und Katastrophen.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Springer Vieweg, S. 379-402, DOI: 10.1007/978-3-658-19523-6_19,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André Reuter, Christian (Hrsg.) (2018):
Usable Safety Engineering sicherheitskritischer interaktiver Systeme.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 17-40, DOI: 10.1007/978-3-658-19523-6_2,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2018):
Soziale Medien und Apps in Notsituationen: Eine repräsentative Studie über die Wahrnehmung in Deutschland.
In: BBK Bevölkerungsschutz, 2S. 22-24, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterKaufholdSpielhofe...],
[Artikel]

Reuter, Christian ; Leopold, Inken (2018):
Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail.
In: Media in Action: An Interdisciplinary Journal on Cooperative Media, 2 (1), S. in press, [Artikel]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Spielhofer, Thomas (2018):
Studie: Wie sehen Mitarbeiter von Feuerwehr und THW den Einsatz sozialer Medien in Gefahrenlagen?
In: Crisis Prevention – Fachmagazin für Innere Sicherheit, Bevölkerungsschutz und Katastrophenhilfe, 1S. 64-66, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterLudwigKaufholdSpi...],
[Artikel]

Reuter, Christian ; Ludwig, Thomas ; Mischur, Patrick (2018):
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), [Artikel]

Reuter, Christian ; Ludwig, Thomas ; Pipek, Volkmar Reuter, Christian (Hrsg.) (2018):
Resilienz durch Kooperationstechnologien.
In: Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, Wiesbaden, Germany, Springer Vieweg, S. 443-465, DOI: 10.1007/978-3-658-19523-6_22,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-658-19523-6_...],
[Buchkapitel]

Reuter, Christian ; Mentler, Tilo (2018):
Human-Computer-Interaction and Social Media in Safety-Critical Systems – Editorial.
In: Journal of Contingencies and Crisis Management (JCCM), 26 (1), Wiley, S. 2-3, ISSN 0966-0879,
DOI: 10.1111/1468-5973.12192,
[Online-Edition: http://onlinelibrary.wiley.com/doi/10.1111/1468-5973.12192/a...],
[Artikel]

Reuter, Christian ; Mentler, Tilo ; Nestler, Simon ; Herczeg, Michael ; Geisler, Stefan ; Ludwig, Thomas ; Pipek, Volkmar ; Pottebaum, Jens Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, S. 565-569, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16929/Beitrag...],
[Konferenzveröffentlichung]

Reuter, Christian ; Pottebaum, Jens (2018):
Guest Editorial Preface: Special Issue on IT-Support for Crisis and Continuity Management.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10 (1), S. v-viii, [Online-Edition: http://www.peasec.de/paper/2018/2018_ReuterPottebaum_Editori...],
[Artikel]

Reuter, Christian ; Pottebaum, Jens (2018):
Special Issue on IT Support for Crisis and Continuity Management.
10[Buch]

Reuter, Christian ; Schneider, Wolfgang ; Eberz, Daniel ; Bayer, Markus ; Hartung, Daniel ; Kaygusuz, Cemal Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, S. 623-632, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16930/Beitrag...],
[Konferenzveröffentlichung]

Riebe, Thea ; Nordmann, Alfred ; Reuter, Christian (2018):
Responsible Research and Innovation: Interdisziplinärer Workshop von IANUS und Schader-Stiftung.
In: Wissenschaft & Frieden, S. 60-61, [Online-Edition: https://wissenschaft-und-frieden.de/seite.php?artikelID=2312],
[Artikel]

Riebe, Thea ; Pätsch, Katja ; Kaufhold, Marc-André ; Reuter, Christian Dachselt, Raimund ; Weber, Gerhard (Hrsg.) (2018):
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Workshopband, Dresden, Germany, S. 595-603, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16795/Beitrag...],
[Konferenzveröffentlichung]

Scholl, Simon ; Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André (2018):
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien.
Dresden, Germany, Gesellschaft für Informatik e.V., In: Mensch und Computer 2018: Tagungsband, Dresden, Germany, S. 443-446, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/16668/Beitrag...],
[Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
In: ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, S. 2300-2302, DOI: 10.1145/3243734.3278521,
[Konferenzveröffentlichung]

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, IEEE Computer Society, In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Online-Edition: https://pstnet.ca/pst2018/],
[Konferenzveröffentlichung]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8082],
[Dissertation]

Zimmermann, Verena ; Bennighof, Merve ; Edel, Miriam ; Hofmann, Oliver ; Jung, Judith ; von Wick, Melina Dachselt, R. ; Weber, G. (Hrsg.) (2018):
‘Home, Smart Home’ – Exploring End Users’ Mental Models of Smart Homes.
In: Mensch und Computer 2018 - Workshopband, Gesellschaft für Informatik e.V., In: Mensch und Computer, Dresden, Germany, 02.-05.09.2018, DOI: 10.18420/muc2018-ws08-0539,
[Konferenzveröffentlichung]

2017

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelorarbeit]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelorarbeit]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelorarbeit]

Schürl, Stefan (2017):
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt, [Masterarbeit]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology, Springer, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Konferenzveröffentlichung]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Masterarbeit]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Springer, [Konferenzveröffentlichung]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, S. 120-133, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Konferenzveröffentlichung]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
In: Black Hat Europe 2017, London, UK, 4th-7th December, 2017, [Online-Edition: https://www.blackhat.com/eu-17/arsenal/schedule/index.html#i...],
[Konferenzveröffentlichung]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, S. 443-470, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Konferenzveröffentlichung]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
Darmstadt, Technische Universität, [Masterarbeit]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Masterarbeit]

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, In: 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.33800.52483,
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...],
[Konferenzveröffentlichung]

Singh, Govind (2017):
o Static Bug Finders Identify API Misuses?
Darmstadt, Technische Universität, [Masterarbeit]

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, In: CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,
[Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe, London, UK, [Konferenzveröffentlichung]

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Masterarbeit]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Masterarbeit]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Masterarbeit]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Konferenzveröffentlichung]

Frassetto, Tommaso ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
JITGuard: Hardening Just-in-time Compilers with SGX.
In: 24th ACM Conference on Computer and Communications Security (CCS), Dallas, TX, USA, ISBN 978-1-4503-4946-8/17/10,
DOI: 10.1145/3133956.3134037,
[Konferenzveröffentlichung]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelorarbeit]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Konferenzveröffentlichung]

Liu, Jian ; Juuti, Mika ; Lu, Yao ; Asokan, N. (2017):
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security, DOI: 10.1145/3133956.3134056,
[Konferenzveröffentlichung]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Darmstadt, Technische Universität, [Masterarbeit]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Bachelorarbeit]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17), Irvine, California, US, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
Springer, In: 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, S. 107-118, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Konferenzveröffentlichung]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion, Springer, [Konferenzveröffentlichung]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security, Springer, [Konferenzveröffentlichung]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Masterarbeit]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Masterarbeit]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Athens, Greece, IARIA, S. 24-31, [Online-Edition: http://www.thinkmind.org/download.php?articleid=centric_2017...],
[Konferenzveröffentlichung]

Horsch, Moritz ; Braun, Johannes ; Buchmann, Johannes (2017):
Password Assistance.
In: Open Identity Summit 2017, Karlstad, Sweden, [Konferenzveröffentlichung]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelorarbeit]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelorarbeit]

Marchal, Samuel ; Armano, Giovanni ; Gröndahl, Tommi ; Saari, Kalle ; Singh, Nidhi ; Asokan, N. (2017):
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
66In: The 16th IEEE International Symposium on Network Computing and Applications (NCA 2017), S. 1717 - 1733, DOI: 10.1109/TC.2017.2703808,
[Konferenzveröffentlichung]

Renaud, Karen ; Maguire, Joseph ; Zimmermann, Verena ; Draper, Steve (2017):
Lessons Learned from Evaluating Eight Password Nudges in the Wild.
In: Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, Usenix Associaton, In: Learning from Authoritative Security Experiment Results (LASER), Arlington, VA, USA, 18.-19.10.2017, S. 25-38, [Konferenzveröffentlichung]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelorarbeit]

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2017):
Nexmon: Build Your Own Wi-Fi Testbeds With Low-Level MAC and PHY-Access Using Firmware Patches on Off-the-Shelf Mobile Devices.
In: Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, In: 11th Workshop on Wireless Network Testbeds, Experimental Evaluation & CHaracterization, Snowbird, Utah, USA, October 2017, S. 59-66, [Online-Edition: https://doi.org/10.1145/3131473.3131476],
[Konferenzveröffentlichung]

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelorarbeit]

Späth, Johannes ; Ali, Karim ; Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH), ACM Press, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), ACM, Snowbird, Utah, USA, S. 6, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Konferenzveröffentlichung]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, Paderborn, Germany, In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, S. 638-648, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3106305],
[Konferenzveröffentlichung]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017), [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, Cham, Springer International Publishing, S. 297-314, DOI: 10.1007/978-3-319-66402-6,
[Buchkapitel]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Atlanta, Georgia, USA, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, PPS. 1, DOI: 10.1109/COMST.2017.2748278,
[Artikel]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), ACM, S. 1-10, DOI: 10.1145/3098954.3098968,
[Konferenzveröffentlichung]

Gerber, Nina ; Zimmermann, Verena Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (Hrsg.) (2017):
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg, Gesellschaft für Informatik, Regensburg, Germany, S. 279-287, DOI: 10.18420/muc2017-ws05-0405,
[Konferenzveröffentlichung]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
10547In: Lecture Notes in Computer Science, In: Security and Trust Management. STM 2017., Oslo, Norway, Springer, In: 13th International Workshop on Security and Trust Management, Oslo, Norway, S. 213-223, DOI: 10.1007/978-3-319-68063-7_15,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-68063-7_...],
[Konferenzveröffentlichung]

Karuppayah, Shankar ; Böck, Leon ; Grube, Tim ; Manickam, Selvakumar ; Mühlhäuser, Max ; Fischer, Mathias (2017):
SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
In: International Conference on Availability, Reliability and Security (ARES), New York, USA, ACM, Reggio Calabria, Italy, S. 1-6, DOI: 10.1145/3098954.3098991,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, Springer, Oslo, Norway, [Konferenzveröffentlichung]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Masterarbeit]

Whitefield, Jorden ; Chen, Liqun ; Kargl, Frank ; Paverd, Andrew ; Schneider, Steve ; Treharne, Helen ; Wesemeyer, Stephan (2017):
Formal Analysis of V2X Revocation Protocols.
In: Security and Trust Management _ 13th International Workshop, STM 2017, Proceedings, ISBN 9783319680620,
DOI: 10.1007/978-3-319-68063-7_10,
[Konferenzveröffentlichung]

Zimmermann, Verena ; Henhapl, Birgit ; Gerber, Nina ; Enzmann, Matthias Burghardt, Manuel ; Wimmer, Raphael ; Wolff, Christian ; Womser-Hacker, Christa (Hrsg.) (2017):
Promoting secure Email communication and authentication.
In: Mensch und Computer 2017 - Workshopband: Spielend einfach integrieren, Norderstedt, Gesellschaft für Informatik, S. 269-277, DOI: 10.18420/muc2017-ws05-0404,
[Buchkapitel]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelorarbeit]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, IEEE, Sydney, Australia, 1-4 August 2017, S. 546-553, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, S. 1217-1234, [Online-Edition: https://www.usenix.org/conference/usenixsecurity17],
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
[Anderes]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2017):
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
In: 12th International Conference on Availability, Reliability and Security - ARES 2017, ACM, S. 1-10, DOI: 10.1145/3098954.3098990,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian Katz, Jonathan ; Shacham, Hovav (Hrsg.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, S. 651-681, [Konferenzveröffentlichung]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15S. 12-13, [Artikel]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), S. 37-43, DOI: 10.1109/MSP.2017.3151334,
[Artikel]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference, Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security, ACM, Reggio Calabria, Italy, [Konferenzveröffentlichung]

Kulyk, Oksana ; Reinheimer, Benjamin ; Gerber, Paul ; Volk, Florian ; Volkamer, Melanie ; Mühlhäuser, Max (2017):
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
In: 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, S. 562-569, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.285,
[Konferenzveröffentlichung]

Mayer, Peter ; Kunz, Alexandra ; Volkamer, Melanie (2017):
Reliable Behavioural Factors in the Information Security Context.
In: International Conference on Availability, Reliability and Security, DOI: 10.1145/3098954.3098986,
[Konferenzveröffentlichung]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), S. 14-21, DOI: 10.1109/MSP.2017.3151325,
[Artikel]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelorarbeit]

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
In: 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Online-Edition: https://doi.org/10.1109%2Fpst.2017.00040],
[Konferenzveröffentlichung]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Online-Edition: https://www.springer.com/de/book/9783319675213],
[Buch]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
In: 26th Crypto-Day, [Konferenzveröffentlichung]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3), De Gruyter Open, S. 143-163, DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Artikel]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), Springer, S. 805-858, DOI: 10.1007/s00145-016-9236-6,
[Online-Edition: https://encrypto.de/papers/ALSZ17.pdf],
[Artikel]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Springer, Auckland, New Zealand, [Konferenzveröffentlichung]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017In: Proceedings on Privacy Enhancing Technologies, De Gruyter, Minneapolis, USA, S. 118–134, DOI: 10.1515/popets-2017-0030,
[Konferenzveröffentlichung]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, S. 599-619, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Konferenzveröffentlichung]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Just-in-Time Static Analysis.
In: Proceedings of ISSTA ’17, ACM, Santa Barbara, California, United States, S. 447, ISBN 978-1-4503-5076-1,
DOI: 10.1145/3092703.3092705,
[Konferenzveröffentlichung]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017, [Konferenzveröffentlichung]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec), [Konferenzveröffentlichung]

Ghiglieri, Marco ; Volkamer, Melanie ; Renaud, Karen (2017):
Exploring Consumers' Attitudes of Smart TV Related Privacy Risks.
10292In: Human Aspects of Information Security, Privacy and Trust. HAS 2017. Lecture Notes in Computer Science, Springer, Cham, Vancouver, Canada, S. 656-674, ISBN 978-3-319-58460-7,
DOI: 10.1007/978-3-319-58460-7,
[Konferenzveröffentlichung]

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Konferenzveröffentlichung]

Horsch, Moritz ; Braun, Johannes ; Metz, Dominique ; Buchmann, Johannes (2017):
Update-tolerant and Revocable Password Backup.
In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy, Auckland, New Zealand, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, [Konferenzveröffentlichung]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4), De Gruyter Open, S. 177-197, DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Artikel]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ACM, S. 75-86, [Konferenzveröffentlichung]

Kulyk, Oksana ; Reinheimer, Benjamin ; Volkamer, Melanie (2017):
Sharing Information with Web Services -- A Mental Model Approach in the Context of Optional Information.
10292In: International Conference on Human-Computer Interaction (HCII), Springer, S. 675-690, DOI: 10.1007/978-3-319-58460-7_46,
[Konferenzveröffentlichung]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Darmstadt, Technische Universität, [Bachelorarbeit]

Schulz, Matthias ; Gringoli, Francesco ; Koch, Michael ; Steinmetzer, Daniel ; Hollick, Matthias (2017):
Massive reactive smartphone-based jamming using arbitrary waveforms and adaptive power control.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, 18.-20.07.2017, S. 111-121, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3098253,
[Online-Edition: https://doi.org/10.1145/3098243.3098253],
[Konferenzveröffentlichung]

Schulz, Matthias ; Hollick, Matthias ; Gringoli, Francesco ; Deligeorgopoulos, Efstathios (2017):
DEMO: Demonstrating Reactive Smartphone-Based Jamming.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), ACM, S. 285-287, ISBN 978-1-4503-5084-6,
DOI: 10.1145/3098243.3106022,
[Konferenzveröffentlichung]

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17), Springer, [Konferenzveröffentlichung]

Zimmermann, Verena ; Gerber, Nina Tryfonas, Theo (Hrsg.) (2017):
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
In: Human Aspects of Information Security, Privacy and Trust, Springer, In: 5th International Conference on Human Aspects of Information Security, Privacy and Trust (HAS), Vancouver, BC, Canada, 09.07.-4.07.2017, S. 265-283, [Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; El Bansarkhani, Rachid ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, (615), 2017. International Association for Cryptologic Research (IACR), S. 1-37, [Online-Edition: https://eprint.iacr.org/2017/615.pdf],
[Artikel]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Billes, Marina ; Møller, Anders ; Pradel, Michael (2017):
Systematic Black-Box Analysis of Collaborative Web Applications.
In: PLDI '17 ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM New York, NY, USA, Barcelona, Spain, S. 708, ISBN 978-1-4503-4988-8,
DOI: 10.1145/3062341.3062363,
[Konferenzveröffentlichung]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference, IEEE, Valencia Spain, [Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17), [Konferenzveröffentlichung]

Funke, Sebastian Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, München, DACH Security 2017, S. 1-10, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Konferenzveröffentlichung]

Göpfert, Florian ; van Vredendaal, Christine ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography, [Konferenzveröffentlichung]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, [Konferenzveröffentlichung]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie (2017):
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
In: IEEE Security & Privacy, 15 (3), S. 24-29, DOI: 10.1109/MSP.2017.70,
[Artikel]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), DOI: 10.1109/ICDCS.2017.283,
[Konferenzveröffentlichung]

Miettinen, Markus ; Marchal, Samuel ; Hafeez, Ibbad ; Frassetto, Tommaso ; Asokan, N. ; Sadeghi, Ahmad-Reza ; Tarkoma, Sasu (2017):
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
In: Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), IEEE, Atlanta, GA, USA, DOI: 10.1109/ICDCS.2017.284,
[Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
505In: Trust Management XI, In: International Conference on Trust Management (IFIPTM), Springer International Publishing, Gothenburg, Sweden, S. 94-109, ISSN 1868-4238, ISBN 978-3-319-59171-1,
DOI: 10.1007/978-3-319-59171-1,
[Online-Edition: https://doi.org/10.1007/978-3-319-59171-1_8],
[Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Habib, Sheikh Mahbub ; Milaszewicz, Pavlos ; Malik, Rabee Sohail ; Mühlhäuser, Max Steghöfer, Jan-Philipp ; Esfandiari, Babak (Hrsg.) (2017):
Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions.
In: Trust Management XI, Springer International Publishing, In: 11th IFIP Trust Management Conference, Gothenbug, Sweden, 12/06/17-16/06/2017, S. 94-109, DOI: 10.1007/978-3-319-59171-1_8,
[Online-Edition: https://link.springer.com/chapter/10.1007/978-3-319-59171-1_...],
[Konferenzveröffentlichung]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress, SecuMedia Verlag, [Konferenzveröffentlichung]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Artikel]

Do, Lisa Nguyen Quang ; Ali, Karim ; Livshits, Benjamin ; Bodden, Eric ; Smith, Justin ; Murphy-Hill, Emerson (2017):
Cheetah: Just-in-Time Taint Analysis for Android Apps.
In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), Curran Associates, Inc., Buenos Aires, Argentina, S. 39-42, ISBN 978-1-5386-1589-8,
DOI: 10.1109/ICSE-C.2017.20,
[Konferenzveröffentlichung]

Grosse-Puppendahl, Tobias ; Holz, Christian ; Cohn, Gabe A. ; Wimmer, Raphael ; Bechtold, Oskar ; Hodges, Steve ; Reynolds, Matthew S. ; Smith, Joshua R. (2017):
Finding Common Ground: A Survey of Capacitive Sensing in Human-Computer Interaction.
In: CHI'17 CHI Conference on Human Factors in Computing Systems, ACM, Denver, CO, USA, S. 3293-3316, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025808,
[Konferenzveröffentlichung]

Holzinger, Philipp ; Hermann, Ben ; Lerch, Johannes ; Bodden, Eric ; Mezini, Mira (2017):
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.
2In: 2017 IEEE Symposium on Security and Privacy (SP 2017), Curran Associates, Inc, San Jose, CA, USA, S. 1.109, ISBN 978-1-5090-5534-0,
[Konferenzveröffentlichung]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM), Atlanta, GA, USA, [Konferenzveröffentlichung]

Neumann, Stephan ; Noll, Manuel ; Volkamer, Melanie (2017):
Election-Dependent Security Evaluation of Internet Voting Schemes.
502In: ICT Systems Security and Privacy Protection. SEC 2017. IFIP Advances in Information and Communication Technology, Springer, Rome, Italy, S. 371-382, DOI: 10.1007/978-3-319-58469-0_25,
[Konferenzveröffentlichung]

Schmitz, Martin ; Steimle, Jürgen ; Huber, Jochen ; Dezfuli, Niloofar ; Mühlhäuser, Max (2017):
Flexibles: Deformation-Aware 3D-Printed Tangibles for Capacitive Touchscreens.
In: CHI '17, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, Denver, Colorado, USA, S. 1001-1014, ISBN 978-1-4503-4655-9,
DOI: 10.1145/3025453.3025663,
[Online-Edition: https://doi.org/10.1145/3025453.3025663],
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Konferenzveröffentlichung]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, New York, ACM, In: ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, S. 461-468, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Konferenzveröffentlichung]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, Springer, Rabat, Morocco, S. 142-160, ISBN 978-3-319-55589-8,
[Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), IEEE, Paris, France, [Konferenzveröffentlichung]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques, Springer, [Konferenzveröffentlichung]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Masterarbeit]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Volkamer, Melanie (2017):
Enabling Vote Delegation in Boardroom Voting.
In: Workshop on Advances in Secure Electronic Voting Associated with Financial Crypto 2017, Springer, S. 419-433, [Konferenzveröffentlichung]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (Volume 2017 Issue 1), S. 405-426, DOI: 10.13154/tosc.v2017.i1.405-426,
[Artikel]

Mayer, Peter ; Volkamer, Melanie (2017):
Poster: Secure Storage of Masked Passwords.
In: IEEE European Symposium on Security and Privacy Posters, [Konferenzveröffentlichung]

Petzoldt, Albrecht ; Szepieniec, Alan ; Mohamed, Mohamed Saied Emam (2017):
A Practical Multivariate Blind Signature Scheme.
In: Financial Cryptography and Data Security 2017, Malta, [Konferenzveröffentlichung]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security, [Konferenzveröffentlichung]

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, S. 31-44, DOI: 10.1145/3052973.3053006,
[Konferenzveröffentlichung]

Trautmann, Nils ; Ferenczi, Gergely ; Croke, Sarah ; Barnett, Stephen (2017):
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, 19 (5), IOP Publishing, [Online-Edition: http://iopscience.iop.org/article/10.1088/2040-8986/aa67b6],
[Artikel]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, S. 436-448, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Konferenzveröffentlichung]

Zimmermann, Verena ; Volkamer, Melanie ; Vogt, Joachim ; Henhapl, Birgit (2017):
Ende-zu-Ende sichere E-Mail-Kommunikation.
In: >Datenschutz und Datensicherheit - DUD, 41S. 308-313, [Artikel]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), IEEE, In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Online-Edition: https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber...],
[Konferenzveröffentlichung]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems, Uppsala, Sweden, [Konferenzveröffentlichung]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), Göttingen, Germany, IEEE, S. 1-8, DOI: 10.1109/NetSys.2017.7903958,
[Online-Edition: https://ieeexplore.ieee.org/abstract/document/7903958],
[Konferenzveröffentlichung]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelorarbeit]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), Springer, S. 281-297, ISSN 1615-5270,
[Artikel]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, Springer, S. 17-31, [Konferenzveröffentlichung]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Darmstadt, Technische Universität, [Masterarbeit]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in Signed Domains.
In: The 14th USENIX Symposium on Networked SystemsDesign and Implementation (NSDI), Boston, MA, USA, [Konferenzveröffentlichung]

Toteva, Iva (2017):
Advancing Tool Support for the Detection of Side-Channel.
Darmstadt, Technische Universität, [Masterarbeit]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS), San Diego, CA, USA, [Konferenzveröffentlichung]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Konferenzveröffentlichung]

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Konferenzveröffentlichung]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Konferenzveröffentlichung]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen (2017):
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, [Artikel]

Ulmer, Alex ; Kohlhammer, Jörn ; Shulman, Haya (2017):
Towards Enhancing the Visual Analysis of Interdomain Routing.
In: VISIGRAPP 2017 : 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Porto, Portugal, [Konferenzveröffentlichung]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin ; Kunz, Alexandra (2017):
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
In: >Computers & Security, 71S. 100-113, DOI: 10.1016/j.cose.2017.02.004,
[Artikel]

Ankele, Robin ; Kucuk, Kubilay A. ; Martin, Andrew ; Simpson, Andrew ; Paverd, Andrew (2017):
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications.
In: 13th IEEE International Conference on Advanced and Trusted Computing, S. 414-422, ISBN 9781509027705,
DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0077,
[Konferenzveröffentlichung]

Dietsch, Sascha Thorsten (2017):
Integration des gitterbasierten LARA-Verschlüsselungsverfahrens in JCA.
Darmstadt, Technische Universität, [Bachelorarbeit]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, IEEE, Las Vegas (USA), S. 337-340, DOI: 10.1109/CCNC.2017.7983129,
[Online-Edition: https://ieeexplore.ieee.org/document/7983129],
[Konferenzveröffentlichung]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Artikel]

Rehfeld, Silke ; Volkamer, Melanie ; Neumann, Stephan (2017):
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
In: >Mittelstand 4.0 - Agentur Kommunikation, [Artikel]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1), De Gruyter Open, S. 62-78, DOI: 10.1515/popets-2017-0005,
[Online-Edition: https://encrypto.de/papers/RSSSK17.pdf],
[Artikel]

Pottebaum, Jens ; Reuter, Christian (Hrsg.) (2017):
Special Issue on IT-Support for Critical Infrastructure Protection.
9 (4), Hershey, Pa., IGI Global, ISSN 1937-9420,
[Zeitschriftenheft, -band oder -jahrgang]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), S. 225-241, [Konferenzveröffentlichung]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, S. 15:1-15:8, DOI: 10.1145/3098954.3098977,
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977],
[Konferenzveröffentlichung]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
In: Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), S. 427-445, [Konferenzveröffentlichung]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Mazaheri, Sogol (2017):
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
In: Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), S. 18-34, [Konferenzveröffentlichung]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
In: Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), S. 245-261, [Konferenzveröffentlichung]

Gerber, Paul ; Volkamer, Melanie ; Gerber, Nina (2017):
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
In: Dialogmarketing Perspektiven 2016/2017: Tagungsband 11. wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing, Springer Fachmedien Wiesbaden, S. 139-167, ISBN 978-3-658-16835-3,
DOI: 10.1007/978-3-658-16835-3_8,
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian (2017):
Integration von Flow in die Mensch- Computer-Interaktion? Potenziale für die Gestaltung interaktiver Systeme.
In: Mittelstand-Digital "Wissenschaft trifft Praxis", 7 (1), S. 78-88, [Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_KaufholdReu...],
[Artikel]

Kaufhold, Marc-André ; Reuter, Christian Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (Hrsg.) (2017):
The Impact of Social Media in Emergencies: A Case Study with the Fire Department of Frankfurt.
In: Agility is coming : mines Albi : Proceedings of Information Systems for Crisis Response and Management (ISCRAM), Albi, France, In: ISCRAM 2017 - 14th International Conference on Information Systems for Crisis Response and Management, Albi, France, May 21-24, 2017, S. 603-612, [Online-Edition: http://idl.iscram.org/files/marc-andrekaufhold/2017/1494_Mar...],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian ; Ludwig, Thomas ; Scholl, Simon Eibl, Maximilian ; Gaedke, Martin (Hrsg.) (2017):
Social Media Analytics: Eine Marktstudie im Krisenmanagement.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, S. 1325-1338, [Online-Edition: http://www.peasec.de/paper/2017/2017_KaufholdReuterLudwigSch...],
[Konferenzveröffentlichung]

Kaufhold, Marc-André ; Reuter, Christian ; Stefan, Marvin Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Gesellschaftliche Herausforderungen des Missbrauchs von Bots und sozialen Medien.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., S. 51-58, DOI: 10.18420/muc2017-ws01-0386,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3236],
[Konferenzveröffentlichung]

Leopold, Inken ; Reuter, Christian Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Kundenakzeptanz von Bluetooth-Beacons im Lebensmittelhandel.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, S. 361-364, DOI: 10.18420/muc2017-mci-0350,
[Online-Edition: http://www.peasec.de/paper/2017/2017_LeopoldReuter_BeaconLeb...],
[Konferenzveröffentlichung]

Li, Ximeng ; Mantel, Heiko ; Tasch, Markus (2017):
Taming Message-passing Communication in Compositional Reasoning about Confidentiality.
In: Proceedings of the 15th Asian Symposium on Programming Languages and Systems (APLAS), S. 45-66, [Konferenzveröffentlichung]

Ludwig, Thomas ; Kotthaus, Christoph ; Reuter, Christian ; Dongen, Sören Van ; Pipek, Volkmar (2017):
Situated crowdsourcing during disasters: Managing the tasks of spontaneous volunteers through public displays.
In: International Journal on Human-Computer Studies (IJHCS), 102 (C), S. 103-121, DOI: 10.1016/j.ijhcs.2016.09.008,
[Online-Edition: http://wineme.uni-siegen.de/paper/2016/2016_Ludwigetal_Situa...],
[Artikel]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
In: Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), S. 213-230, [Konferenzveröffentlichung]

Mayer, Peter ; Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2017):
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
In: Information and Computer Security, 25 (2), S. 137-151, DOI: 10.1108/ICS-03-2017-0014,
[Artikel]

Mosconi, Gaia ; Korn, Matthias ; Reuter, Christian ; Tolmie, Peter ; Teli, Maurizio ; Pipek, Volkmar (2017):
From Facebook to the Neighbourhood: Infrastructuring of Hybrid Community Engagement.
In: Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), 26 (4-6), S. 959-1003, DOI: 10.1007/s10606-017-9291-z,
[Online-Edition: https://link.springer.com/article/10.1007/s10606-017-9291-z],
[Artikel]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295[Online-Edition: http://arxiv.org/abs/1705.10295],
[Artikel]

Pinatti de Carvalho, Aparecido Fabiano ; Saeed, Saqib ; Reuter, Christian ; Wulf, Volker (2017):
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community.
Sheffield, UK, In: Proceedings of the ECSCW-Workshop on Nomadic Culture Beyond Work Practices, International Reports on Socio-Informatics (IRSI), Sheffield, UK, S. 41-47, [Online-Edition: https://www.iisi.de/wp-content/uploads/2018/07/6_decarvalho-...],
[Konferenzveröffentlichung]

Pottebaum, Jens ; Erfurth, Christian ; Reuter, Christian Eibl, Maximilian ; Gaedke, Martin (Hrsg.) (2017):
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response.
Bonn, In: INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn, S. 1281-1282, [Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3891/B16-0.pd...],
[Konferenzveröffentlichung]

Pottebaum, Jens ; Reuter, Christian (2017):
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection.
In: International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 9 (4), IGI Global, S. iv-vii, ISSN 1937-9420,
[Online-Edition: http://www.peasec.de/paper/2017/2017_PottebaumReuter_Editori...],
[Artikel]

Reinhold, Thomas (2017):
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft.
In: Sicherheit und Frieden, [Online-Edition: https://www.nomos-elibrary.de/10.5771/0175-274X-2016-4/s-f-s...],
[Artikel]

Reinhold, Thomas ; Schulze, Matthias (2017):
Arbeitspapier: „Digitale Gegenangriffe – Eine Analyse der technischen und politischen Implikationen von „hack backs“.
[Online-Edition: https://www.swp-berlin.org/fileadmin/contents/products/arbei...],
[Anderes]

Renaud, Karen ; Zimmermann, Verena (2017):
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully.
In: Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, IEEE, In: Information Security for South Africa (ISSA), Johannesburg, South Africa, 16.-17.08.2017, S. 1-9, [Konferenzveröffentlichung]

Reuter, Christian ; Kaufhold, Marc-André ; Klös, Jonas Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, S. 33-41, DOI: 10.18420/muc2017-ws01-0384,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3214],
[Konferenzveröffentlichung]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah (2017):
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps.
Guimar\~es, Portugal, In: European Conference on Information Systems (ECIS), Guimar\~es, Portugal, S. 2187-2201, [Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLeopoldKn...],
[Konferenzveröffentlichung]

Reuter, Christian ; Kaufhold, Marc-André ; Leopold, Inken ; Knipp, Hannah Klafft, Michael (Hrsg.) (2017):
Informing the Population: Mobile Warning Apps.
In: Risk and Crisis Communication in Disaster Prevention and Management, Wilhelmshaven, epubli, S. 31-41, [Online-Edition: http://publica.fraunhofer.de/eprints/urn_nbn_de_0011-n-45272...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André ; Ludwig, Thomas Paterno, Fabio ; Wulf, Volker (Hrsg.) (2017):
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media.
In: New Perspectives in End-User Development, Springer, S. 307-332, DOI: 10.1007/978-3-319-60291-2_12,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdLudwig_EU...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André ; Schorch, Marén ; Gerwinski, Jan ; Soost, Christian ; Hassan, Sohaib S. ; Rusch, Gebhard ; Moog, Petra ; Pipek, Volkmar ; Wulf, Volker Hoch, Gero ; Schröteler von Brandt, Hildegard ; Stein, Volker ; Schwarz, Angela (Hrsg.) (2017):
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat).
In: Sicherheit (DIAGONAL Jahrgang 38), Göttingen, Vandenhoeck & Ruprecht, S. 207-224, DOI: 10.14220/digo.2017.38.1.207,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSchorchet...],
[Buchkapitel]

Reuter, Christian ; Kaufhold, Marc-André ; Spielhofer, Thomas ; Hahne, Anna Sophie (2017):
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany.
In: Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 1 (Issue CSCW), S. 1-19, DOI: 10.1145/3134725,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterKaufholdSpielhofe...],
[Artikel]

Reuter, Christian ; Kaufhold, Marc-André ; Steinfort, René Comes, Tina ; Bénaben, Frédérick ; Hanachi, Chihab ; Lauras, Matthieu (Hrsg.) (2017):
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media.
Albi, France, In: Proceedings of the Information Systems for Crisis Response and Management (ISCRAM), Albi, France, S. 583-591, [Online-Edition: http://idl.iscram.org/files/christianreuter/2017/1492_Christ...],
[Konferenzveröffentlichung]

Reuter, Christian ; Ludwig, Thomas ; Kaufhold, Marc-André ; Hupertz, Julian Wohlgemuth, V. ; Fuchs-Kittowski, Frank ; Wittmann, Jochen (Hrsg.) (2017):
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks.
In: Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, Berlin, Germany, Springer, S. 75-88, DOI: 10.1007/978-3-319-44711-7_7,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2017/2017_Reuteretal_...],
[Buchkapitel]

Reuter, Christian ; Mentler, Tilo ; Geisler, Stefan ; Herczeg, Michael ; Ludwig, Thomas ; Pipek, Volkmar ; Nestler, Simon Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen.
In: Mensch und Computer 2017 - Workshopband, Regensburg, Germany, Gesellschaft für Informatik e.V., S. 5-8, DOI: 10.18420/muc2017-ws01-0380,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3170/2017_WS0...],
[Konferenzveröffentlichung]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena (2017):
IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study.
In: i-com: Journal of Interactive Media, 16 (2), S. 181-195, DOI: 10.1515/icom-2017-0013,
[Online-Edition: http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITfo...],
[Artikel]

Reuter, Christian ; Pätsch, Katja ; Runft, Elena Leimeister, J. M. ; Brenner, W. (Hrsg.) (2017):
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter.
St. Gallen, Switzerland, In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), St. Gallen, Switzerland, S. 649-663, [Online-Edition: https://aisel.aisnet.org/wi2017/track06/paper/6/],
[Konferenzveröffentlichung]

Reuter, Christian ; Spielhofer, Thomas (2017):
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe.
In: Journal Technological Forecasting and Social Change (TFSC), 121S. 168-180, DOI: 10.1016/j.techfore.2016.07.038,
[Online-Edition: https://www.wineme.uni-siegen.de/paper/2016/2016_reuterspiel...],
[Artikel]

Reuter, Christian ; Wiegärtner, Daniel ; Müller, Claudia Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Tagungsband, Regensburg, Germany, S. 295-298, DOI: 10.18420/muc2017-mci-0352,
[Online-Edition: https://dl.gi.de/bitstream/handle/20.500.12116/3279/2017_MCI...],
[Konferenzveröffentlichung]

Riebe, Thea ; Geisse, Jens (2017):
Warum die Cyber-Sicherheitskultur ein Update braucht.
Frankfurt a.M., sicherheitspolitik-blog.de, [Online-Edition: http://www.sicherheitspolitik-blog.de/2017/07/03/warum-die-c...],
[Anderes]

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, Springer, Oslo, Norway, S. 437-455, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, S. 131-144, [Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Gens, David ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2017):
Execution Integrity with In-Place Encryption.
In: CoRR, abs/1703.02698[Online-Edition: http://arxiv.org/abs/1703.02698],
[Artikel]

Tundis, Andrea ; Garcia Cordero, Carlos ; Egert, Rolf ; Garro, Alfredo ; Mühlhäuser, Max (2017):
Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells.
In: 19th International Conference on Cyber-Physical Systems (ICCPS), Zurich, Switzerland, 13th-14th January, 2017, S. 796-807, DOI: 10.5281/zenodo.1130542,
[Konferenzveröffentlichung]

Wiegärtner, Daniel ; Reuter, Christian ; Müller, Claudia Burghardt, M. ; Wimmer, R. ; Wolff, C. ; Womser-Hacker, C. (Hrsg.) (2017):
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation.
Regensburg, Germany, Gesellschaft für Informatik e.V., In: Mensch & Computer: Workshopband, Regensburg, Germany, S. 609-614, DOI: 10.18420/muc2017-ws17-0416,
[Online-Edition: https://dl.gi.de/handle/20.500.12116/3243],
[Konferenzveröffentlichung]

von Drachenfels, Magdalena ; Riebe, Thea (2017):
Normative Ordnungen des Digitalen - Konferenzbericht.
Frankfurt a.M., sicherheitspolitik-blog.de, [Anderes]

2016

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, (733), 2016. International Association for Cryptologic Research (IACR), S. 1-35, [Online-Edition: https://eprint.iacr.org/2016/733],
[Artikel]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Garcia Cordero, Carlos ; Hauke, Sascha ; Mühlhäuser, Max ; Fischer, Mathias (2016):
Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks.
In: 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, S. 317 - 324, ISBN 978-1-5090-4379-8,
DOI: 10.1109/PST.2016.7906980,
[Konferenzveröffentlichung]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference, Auckland, New Zealand, [Konferenzveröffentlichung]

Gerber, Paul ; Renaud, Karen ; Volkamer, Melanie (2016):
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
In: >Journal of Information Security and Applications, 34 (1), S. 8-26, DOI: 10.1016/j.jisa.2016.10.003,
[Artikel]

Mayer, Peter ; Berket, Hermann ; Volkamer, Melanie (2016):
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
In: International Conference on Passwords, Springer LNCS, [Konferenzveröffentlichung]

Sang, Bo ; Petri, Gustavo ; Ardekani, Masoud Saeida ; Ravi, Srivatsan ; Eugster, Patrick (2016):
Programming Scalable Cloud Services with AEON.
In: Middleware '16 Proceedings of the 17th International Middleware Conference, ACM, Trento, Italy, S. 16:1, ISBN 978-1-4503-4300-8,
DOI: 10.1145/2988336.2988352,
[Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference, IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelorarbeit]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security, IEEE, [Konferenzveröffentlichung]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2016):
DNSSEC Misconfigurations in Popular Domains.
In: vol 10052, In: Cryptology and Network Security. CANS 2016, Springer, Cham, Milano, Italy, [Konferenzveröffentlichung]

El Bansarkhani, Rachid ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016, Milan, Italy, [Konferenzveröffentlichung]

Kogan, Kirill ; Nikolenko, Sergey I. ; Eugster, Patrick ; Shalimov, Alexander ; Rottenstreich, Ori (2016):
FIB efficiency in distributed platforms.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, S. 1-10, DOI: 10.1109/ICNP.2016.7784452,
[Konferenzveröffentlichung]

Lato, Ellen (2016):
Fault Attacks on Lattice-Based Encryption Schemes.
Darmstadt, Technische Universität, [Masterarbeit]

Nobach, Leonhard ; Rimac, I. ; Hilt, V. ; Hausheer, David (2016):
SliM: Enabling Efficient, Seamless NFV State Migration (Poster Paper).
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, S. 1-2, ISBN 978-1-5090-3281-5/16,
DOI: 10.1109/ICNP.2016.7784459,
[Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe, [Konferenzveröffentlichung]

Wang, Lin ; Jiao, Lei ; Kliazovich, Dzmitry ; Bouvry, Pascal (2016):
Reconciling Task Assignment and Scheduling in Mobile Edge Clouds.
In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, Singapore, Singapore, S. 1-6, DOI: 10.1109/ICNP.2016.7785317,
[Konferenzveröffentlichung]

Wang, Weihang ; Zheng, Yunhui ; Xing, Xinyu ; Kwon, Yonghwi ; Zhang, Xiangyu ; Eugster, Patrick (2016):
WebRanz: web page randomization for better advertisement delivery and web-bot prevention.
In: FSE 2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ACM, Seattle, WA, USA, S. 205-216, ISBN 978-1-4503-4218-6,
DOI: 10.1145/2950290.2950352,
[Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Konferenzveröffentlichung]

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik (2016):
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
In: WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, ACM, Vienna, Austria, S. 37-46, ISBN 978-1-4503-4569-9,
DOI: 10.1145/2994620.2994621,
[Konferenzveröffentlichung]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelorarbeit]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Artikel]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS), [Konferenzveröffentlichung]

Fojtik, Roman (2016):
Salt Synchronization Service.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelorarbeit]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala, ACM, [Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW), Vienna, Austria, [Konferenzveröffentlichung]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelorarbeit]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Masterarbeit]

Lacoste, Marc ; Sousa, Paulo ; Neves, Nuno ; Miettinen, Markus ; Ramos, Fernando M.V. ; Vukolic, Marko ; Charmet, Fabien ; Yaich, Reda ; Oborzynski, Krzysztof ; Vernekar, Gitesh (2016):
User-Centric Security and Dependability in the Cloud of Clouds.
In: IEEE Cloud Computing Special issue on Cloud Security, 3 (5), S. 64-75, [Artikel]

Mayer, Peter ; Neumann, Stephan ; Volkamer, Melanie (2016):
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: CCS '16, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, Vienna, Austria, S. 1817-1819, ISBN 978-1-4503-4139-4,
DOI: 10.1145/2976749.2989045,
[Konferenzveröffentlichung]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16, New York, NY, USA, ACM, In: 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, S. 117-122, DOI: 10.1145/2994459.2994463,
[Online-Edition: http://doi.acm.org/10.1145/2994459.2994463],
[Konferenzveröffentlichung]

Renaud, Karen ; Flowerday, Stephen ; English, Rosanne ; Volkamer, Melanie (2016):
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
In: >Information and Computer Security, 24 (4), S. 400-415, DOI: 10.1108/ICS-06-2015-0024,
[Artikel]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016, CCS 2016, [Konferenzveröffentlichung]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), Philadelphia, PA USA, [Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Garcia Cordero, Carlos ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, IEEE, Philadelphia, USA, S. 279 - 286, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Konferenzveröffentlichung]

Ali, Azmzt ; Othmane, Lotfi Ben (2016):
Towards effective security assurance for incremental software development - the case of zen cart application,.
In: Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES), [Konferenzveröffentlichung]

Appel, Michael ; Bossert, Andreas ; Cooper, Steven ; Kußmaul, Tobias ; Löffler, Johannes ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Block ciphers for the IoT – SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared.
[Report]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Security aspects and comparison of block ciphers LED and TEA.
[Report]

Bossert, Andreas ; Cooper, Steven ; Wiesmaier, Alexander (2016):
A comparison of block ciphers SIMON, SPECK, and KATAN.
[Report]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016, sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Konferenzveröffentlichung]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, Austria, [Konferenzveröffentlichung]

Diedrich, Lennart ; Jattke, Patrick ; Murati, Lulzim ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium.
[Report]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Ghiglieri, Marco ; Stopczynski, Martin (2016):
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues.
ACM SIGITE, [Konferenzveröffentlichung]

Jattke, Patrick ; Senker, Matthias ; Wiesmaier, Alexander (2016):
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8.
[Report]

Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, Heraklion, Greece, S. 320-338, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Konferenzveröffentlichung]

Kulyk, Oksana ; Marky, Karola ; Neumann, Stephan ; Volkamer, Melanie (2016):
Introducing Proxy Voting to Helios.
In: 11th International Conference on Availability, Reliability and Security - ARES 2016, IEEE, Salzburg, S. 98 - 106, DOI: 10.1109/ARES.2016.38,
[Konferenzveröffentlichung]

Lieb, Patrick ; Schmidt, Markus ; Wiesmaier, Alexander (2016):
ECDSA and QUARTZ in Comparison with RSA.
[Report]

Mohamed, Mohamed Saied Emam ; El Bansarkhani, Rachid ; Petzoldt, Albrecht (2016):
MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
In: ISC 2016 - The 19th Information Security Conference, Springer LNCS, Honolulu, Hi, USA, S. 426-440, [Konferenzveröffentlichung]

Reinheimer, Benjamin ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
In: MuC-Workshop „Usable Security and Privacy“, Gesellschaft für Informatik e.V., Aachen, Germany, [Konferenzveröffentlichung]

Roepke, Rene ; Thraem, Timo ; Wagener, Johannes ; Wiesmaier, Alexander (2016):
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i.
[Report]

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd (2016):
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, American Physical Society, S. 8, [Artikel]

Volkamer, Melanie ; Renaud, Karen ; Gerber, Paul (2016):
Spot the phish by checking the pruned URL.
In: Information and Computer Security, 24 (4), S. 372-385, DOI: 10.1108/ICS-07-2015-0032,
[Artikel]

El Bansarkhani, Rachid ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, (823), 2016. International Association for Cryptologic Research (IACR), S. 1-28, [Online-Edition: https://eprint.iacr.org/2016/823],
[Artikel]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, New York, ACM, In: ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, S. 1-13, ISBN 978-1-4503-4944-4,
[Konferenzveröffentlichung]

Demirel, Denise ; Traverso, Giulia ; Krenn, Stephan ; Loruenser, Thomas (2016):
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
In: 2016 11th International Conference on Availability, Reliability and Security (ARES), IEEE, Salzburg, Austria, S. 88-97, ISBN 978-1-5090-0990-9/16,
DOI: 10.1109/ARES.2016.88,
[Konferenzveröffentlichung]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Frömmgen, Alexander ; Stohr, Denny ; Fornoff, Jan ; Effelsberg, Wolfgang ; Buchmann, Alejandro (2016):
Capture and Replay: Reproducible Network Experiments in Mininet.
In: SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, ACM, Florianopolis, Brazil, S. 621-622, ISBN 978-1-4503-4193-6,
DOI: 10.1145/2934872.2959076,
[Konferenzveröffentlichung]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelorarbeit]

McGrew, David ; Kampanakis, Panos ; Fluhrer, Scott ; Gazdag, Stefan-Lukas ; Butin, Denis ; Buchmann, Johannes (2016):
State Management for Hash-Based Signatures.
In: 3rd International Conference on Research in Security Standardisation (SSR 2016), Springer LNCS, Gaithersburg, USA, [Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub Gierlichs, Benedikt ; Poschmann, Axel (Hrsg.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
9813In: Lecture Notes in Computer Science (LNCS), In: Cryptographic Hardware and Embedded Systems (CHES 2016), Springer, Santa Barbara, California, USA, S. 432-453, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016, Springer, Tacoma, Washington, USA, [Konferenzveröffentlichung]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
Darmstadt, Technische Universität, [Bachelorarbeit]

Habib, Sheikh Mahbub ; Vassileva, Julita ; Mauw, Sjouke ; Mühlhäuser, Max (Hrsg.) (2016):
Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016 Proceedings.
IFIP AICT 473Springer, Darmstadt, Germany, [Konferenzveröffentlichung]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016, [Konferenzveröffentlichung]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), ACM, S. 32-34, DOI: 10.1145/2959424.2959427,
[Online-Edition: https://encrypto.de/papers/CDCSS16.pdf],
[Konferenzveröffentlichung]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS), [Konferenzveröffentlichung]

Ermuth, Markus ; Pradel, Michael (2016):
Monkey see, monkey do: effective generation of GUI tests with inferred macro events.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, S. 82-93, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931053,
[Konferenzveröffentlichung]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops, Toulouse, France, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, Springer, S. 60-89, DOI: 10.1007/978-3-662-53015-3_3,
[Konferenzveröffentlichung]

Gerber, Nina ; McDermott, Ronja ; Volkamer, Melanie ; Vogt, Joachim (2016):
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
10.In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, Germany, S. 145-155, [Konferenzveröffentlichung]

Gutmann, Andreas ; Volkamer, Melanie ; Renaud, Karen (2016):
Memorable And Secure: How Do You Choose Your PIN?
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, S. 156-166, [Konferenzveröffentlichung]

Horsch, Moritz ; Schlipf, Mario ; Braun, Johannes ; Buchmann, Johannes (2016):
Password Requirements Markup Language.
In: ACISP 2016 - 21st Australasian Conference on Information Security and Privacy, Melbourne, Australia, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016, [Konferenzveröffentlichung]

Kunz, Alexandra ; Volkamer, Melanie ; Stockhardt, Simon ; Palberg, Sven ; Lottermann, Tessa ; Piegert, Eric (2016):
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
In: Jahrestagung der Gesellschaft für Informatik, Lecture Notes in Informatics (LNI), Bonn, Germany, S. 509--518, [Konferenzveröffentlichung]

Mayer, Peter ; Neumann, Stephan ; Storck, Daniel ; Volkamer, Melanie (2016):
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
In: International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), University of Plymouth, Frankfurt, S. 67-77, [Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016, [Konferenzveröffentlichung]

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16), [Konferenzveröffentlichung]

Schulz, Matthias ; Klapper, Patrick ; Hollick, Matthias ; Tews, Erik (2016):
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, S. 43-48, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2940650,
[Konferenzveröffentlichung]

Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias (2016):
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, S. 201-203, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942418,
[Konferenzveröffentlichung]

Schulz, Matthias ; Wegemer, Daniel ; Hollick, Matthias (2016):
DEMO: Using NexMon, the C-based WiFi firmware modification framework.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, S. 213-215, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2942419,
[Konferenzveröffentlichung]

Späth, Johannes ; Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: 30th European Conference on Object-Oriented Programming (ECOOP 2016), Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Rome, Italy, S. 22:1, ISBN 978-3-95977-014-9,
DOI: 10.4230/LIPIcs.ECOOP.2016.22,
[Konferenzveröffentlichung]

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: European Conference on Object-Oriented Programming, Dagstuhl, Rome, Italy, S. 25, [Konferenzveröffentlichung]

Wang, Weihang ; Zheng, Yunhui ; Liu, Peng ; Xu, Lei ; Zhang, Xiangyu ; Eugster, Patrick (2016):
ARROW: automated repair of races on client-side web pages.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, S. 201-212, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931052,
[Konferenzveröffentlichung]

Yu, Tingting ; Pradel, Michael (2016):
SyncProf: detecting, localizing, and optimizing synchronization bottlenecks.
In: ISSTA 2016 Proceedings of the 25th International Symposium on Software Testing and Analysis, ACM, Saarbrücken, Germany, S. 389-400, ISBN 978-1-4503-4390-9,
DOI: 10.1145/2931037.2931070,
[Konferenzveröffentlichung]

Zheng, Yao ; Schulz, Matthias ; Lou, Wenjing ; Hou, Thomas ; Hollick, Matthias (2016):
Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding.
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec 2016), ACM, S. 21-30, ISBN 978-1-4503-4270-4,
DOI: 10.1145/2939918.2939933,
[Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Borgwart, Andreas ; Shulman, Haya ; Waidner, Michael (2016):
Towards Automated Measurements of Internets Naming Infrastructure.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), [Konferenzveröffentlichung]

Dix, Isabella (2016):
Implementation of a Reputation System for CA Trust Management.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelorarbeit]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE), Beer Sheva, Israel, [Konferenzveröffentlichung]

Kulyk, Oksana ; Neumann, Stephan ; Marky, Karola ; Budurushi, Jurlind ; Volkamer, Melanie (2016):
Coercion-resistant Proxy Voting.
In: 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Springer, Ghent, Belgium, S. 3-16, [Konferenzveröffentlichung]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC), [Konferenzveröffentlichung]

Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science, Porto, Portugal, [Konferenzveröffentlichung]

Neumann, Stephan ; Volkamer, Melanie ; Budurushi, Jurlind ; Prandini, Marco (2016):
SecIVo: a quantitative security evaluation framework for internet voting schemes.
In: >Annals of Telecommunications, S. 1-16, DOI: 10.1007/s12243-016-0520-0,
[Artikel]

Roth, Johannes (2016):
Analyse von TLS Bibliotheken basierend auf Fuzz Testing.
Darmstadt, Technische Universität, [Bachelorarbeit]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, 2016[Artikel]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, S. 73:1-73:6, DOI: 10.1145/2897937.2898027,
[Online-Edition: https://encrypto.de/papers/SZDSSK16.pdf],
[Konferenzveröffentlichung]

Stockhardt, Simon ; Reinheimer, Benjamin ; Volkamer, Melanie ; Mayer, Peter ; Kunz, Alexandra ; Rack, Philipp ; Lehmann, Daniel (2016):
Teaching Phishing-Security: Which Way is Best?
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, S. 135-149, [Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
In: SpringerBriefs in Computer Science, Springer, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Buch]

Volkamer, Melanie ; Renaud, Karen ; Reinheimer, Benjamin (2016):
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
In: 31st International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Springer, Ghent, Belgium, S. 161-175, [Konferenzveröffentlichung]

Arzt, Steven ; Bodden, Eric (2016):
StubDroid: automatic inference of precise data-flow summaries for the android framework.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, S. 725-735, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884816,
[Konferenzveröffentlichung]

Bernhard, David ; Kulyk, Oksana ; Volkamer, Melanie (2016):
Security Proofs for Participation Privacy and Stronger Verifiability for Helios.
Darmstadt, CRISP, DOI: 10.5445/IR/1000081968,
[Report]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, ACM, Xi'an, China, [Konferenzveröffentlichung]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security, ACM, Xi'an, China, [Konferenzveröffentlichung]

Budurushi, Jurlind ; Hilt, Annika ; Volkamer, Melanie (2016):
"E-Mail made in Germany" Untersuchung der Sicherheitsbeurteilung von E-Mail-Nutzern.
In: Datenschutz und Datensicherheit - DuD, 40 (5), Springer Fachmedien Wiesbaden, S. 300-304, DOI: 10.1007/s11623-016-0600-3,
[Artikel]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016), IEEE, San Jose, California, USA, [Konferenzveröffentlichung]

Ghiglieri, Marco ; Waidner, Michael (2016):
HbbTV Security and Privacy: Issues and Challenges.
In: >IEEE Security & Privacy, vol. 14, no. (IEEE 14/3), S. pp. 61-67, [Artikel]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: IEEE ICC Communication and Information Systems Security Symposium, IEEE, Kuala Lumpur, Malaysia, S. 1-7, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, S. 699-728, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Konferenzveröffentlichung]

Liu, Hui ; Liu, Qiurong ; Staicu, Cristian-Alexandru ; Pradel, Michael ; Luo, Yue (2016):
Nomen est Omen: Exploring and Exploiting Similarities between Argument and Parameter Names.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, Texas, S. 1063-1073, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884841,
[Konferenzveröffentlichung]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering, ACM, Austin, Texas, USA, [Konferenzveröffentlichung]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
Jumping through hoops: why do Java developers struggle with cryptography APIs?
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, Texas, S. 935-946, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884790,
[Konferenzveröffentlichung]

Salvaneschi, Guido ; Mezini, Mira (2016):
Debugging for reactive programming.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM, Austin, TX, S. 796-807, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884815,
[Konferenzveröffentlichung]

Schmitz, Martin ; Leister, Andreas ; Dezfuli, Niloofar ; Riemann, Jan ; Müller, Florian ; Mühlhäuser, Max (2016):
Liquido: Embedding Liquids into 3D Printed Objects to Sense Tilting and Motion.
In: CHI EA'16, In: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, ACM, San Jose, CA, USA, S. 2688-2696, ISBN 978-1-4503-4082-3,
DOI: 10.1145/2851581.2892275,
[Online-Edition: https://doi.org/10.1145/2851581.2892275],
[Konferenzveröffentlichung]

Schochlow, Verena ; Neumann, Stephan ; Braun, Kristoffer ; Volkamer, Melanie (2016):
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
5/2016In: Datenschutz und Datensicherheit, S. 295-299, DOI: 10.1007/s11623-016-0599-5,
[Konferenzveröffentlichung]

Selakovic, Marija ; Pradel, Michael (2016):
Performance issues and optimizations in JavaScript: an empirical study.
In: ICSE '16 Proceedings of the 38th International Conference on Software Engineering, ACM Association for Computing Machinery, Austin, Texas, S. 61-72, ISBN 978-1-4503-3900-1,
DOI: 10.1145/2884781.2884829,
[Konferenzveröffentlichung]

Taha, Ahmed ; Metzler, Patrick ; Trapero, Ruben ; Luna, Jesus ; Suri, Neeraj (2016):
Identifying and Utilizing Dependencies Across Cloud Security Services.
In: ASIA CCS '16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ACM, Xi'an, China, S. 329-340, ISBN 978-1-4503-4233-9,
DOI: 10.1145/2897845.2897911,
[Konferenzveröffentlichung]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, S. 10, [Konferenzveröffentlichung]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, [Artikel]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
ISBN 978-3-319-53797-9,
[Buch]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016, Springer, Fes, Morocco, [Konferenzveröffentlichung]

Budurushi, Jurlind ; Reanaud, Karen ; Volkamer, Melanie ; Woide, Marcel (2016):
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
In: Journal of Annals of Telecommunications: The role of telecommunications in electronic voting, 71 (7), Springer Paris, S. 309–322, DOI: 10.1007/s12243-016-0510-2,
[Artikel]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Anderes]

Marky, Karola ; Gutmann, Andreas ; Rack, Philipp ; Volkamer, Melanie (2016):
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
1575In: 1st International Workshop on Innovations in Mobile Privacy and Security, CEUR Workshop Proceedings, S. 46-48, [Konferenzveröffentlichung]

Mayer, Christoph (2016):
Implementing a Toolkit for Ring-LWE Cryptography.
TU Darmstadt, [Masterarbeit]

Müller, Florian ; Günther, Sebastian ; Dezfuli, Niloofar ; Khalilbeigi, Mohammadreza ; Mühlhäuser, Max (2016):
ProxiWatch: Enhancing Smartwatch Interaction through Proximity-based Hand Input.
In: CHI EA '16: Proceedings of the 34rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, ACM New York, NY, USA, DOI: 10.1145/2851581.2892450,
[Konferenzveröffentlichung]

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, S. 111-129, DOI: 10.1007/978-3-319-43283-0_7,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA), Louvain La Neuve, Belgium, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters), San Francisco, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Artikel]

Strenzke, Falko (2016):
An Analysis of OpenSSL's Random Number Generator.
In: Lecture Notes in Computer Science 9665, In: Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Vienna, Austria, S. 644-669, ISBN 978-3-662-49889-7,
DOI: 10.1007/978-3-662-49890-3 25,
[Konferenzveröffentlichung]

Trautmann, Nils ; Hauke, Philipp (2016):
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, (18), S. 043029, [Artikel]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, Springer, Taipei, Taiwan, S. 24, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Konferenzveröffentlichung]

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), IEEE, Saarbrucken, S. 357-371, DOI: 10.1109/EuroSP.2016.35,
[Konferenzveröffentlichung]

Kogan, Kirill ; Menikkumbura, Danushka ; Petri, Gustavo ; Noh, Youngtae ; Nikolenko, Sergey I. ; Eugster, Patrick (2016):
BASEL (Buffer mAnagement SpEcification Language).
In: ANCS '16 Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, ACM, Santa Clara, CA, S. 69-74, ISBN 978-1-4503-4183-7,
DOI: 10.1145/2881025.2881027,
[Konferenzveröffentlichung]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, PP (99), DOI: 10.1109/JPROC.2015.2512235,
[Artikel]

Waidner, Michael ; Kasper, Michael (2016):
Security in Industrie 4.0 - Challenges and Solutions for the Fourth Industrial Revolution.
In: DATE 2016 (Design, Automation and Test in Europe), Dresden, Germany, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99DOI: TIFS.2015.2512534,
[Artikel]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), [Konferenzveröffentlichung]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Heraklion, Crete, Greece, S. 596-603, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), Springer, S. 637-657, ISSN 1615-5270,
[Artikel]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelorarbeit]

Ghiglieri, Marco ; Hansen, Marit ; Nebel, Maxi ; Pörschke, Julia Victoria ; Fhom, Hervais Simo (2016):
Smart-TV und Privatheit - Bedrohungspotenziale und Handlungsmöglichkeiten.
[Report]

Kulyk, Oksana ; Gerber, Paul ; Reinheimer, Benjamin ; Renaud, Karen ; Volkamer, Melanie (2016):
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
In: NDSS Workshop on Usable Security (USEC), Internet Society., San Diego, California, ISBN 1891562428,
[Konferenzveröffentlichung]

Kulyk, Oksana ; Volkamer, Melanie (2016):
Efficiency Comparison of Various Approaches in E-Voting Protocols.
In: Financial Cryptography and Data Security. FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Revised Selected Papers, Springer, Barbados, S. 209-233, [Konferenzveröffentlichung]

Mariano, Artur ; Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016, Conference Publishing Services (CPS), Heraklion Crete, Greece, [Konferenzveröffentlichung]

Rasthofer, Siegfried ; Arzt, Steven ; Miltenberger, Marc ; Bodden, Eric (2016):
Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques.
In: Network and Distributed System Security Symposium 2016, Internet Society, San Diego, CA, S. 1-15, ISBN 1-891562-41-X,
DOI: 10.14722/ndss.2016.23066,
[Konferenzveröffentlichung]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Masterarbeit]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, (81), 2016. International Association for Cryptologic Research (IACR), S. 1-33, [Online-Edition: https://eprint.iacr.org/2016/081],
[Artikel]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
9540In: LNCS, In: Cryptography and Information Security in the Balkans, Springer, Koper, Slovenia, S. 155-168, [Konferenzveröffentlichung]

Appel, Michael ; Pauer, Christof ; Wiesmaier, Alexander (2016):
Sicherheitsaspekte und Vergleich der Blockchifren LED und TEA.
[Report]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), IEEE, Las Vegas, USA, S. 738-744, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Konferenzveröffentlichung]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
In: Financial Crypto 2016, [Konferenzveröffentlichung]

Heuser, Stephan ; Negro, Marco ; Pendyala, Praveen Kumar ; Sadeghi, Ahmad-Reza (2016):
Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android.
[Report]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Konferenzveröffentlichung]

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario Curry, Edward ; Wahlster, Wolfgang (Hrsg.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, Springer, S. 119-141, DOI: 10.1007/978-3-319-21569-3,
[Buchkapitel]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Cham, Springer, S. 47-71, [Online-Edition: https://doi.org/10.1007/978-3-319-49175-2],
[Buchkapitel]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference, ACM, [Konferenzveröffentlichung]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5473],
[Dissertation]

Fleisch, Gilbert (2016):
Towards policy checks on passwords via fully homomorphic encryption.
Darmstadt, Technische Universität, [Masterarbeit]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5850],
[Dissertation]

Miettinen, Markus ; Huang, Jialin ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2016):
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
In: Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16), Darmstadt, Germany, [Konferenzveröffentlichung]

Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2016):
Call graph construction for Java libraries.
In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, S. 474-486, DOI: 10.1145/2950290.2950312,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference, [Konferenzveröffentlichung]

Trautmann, Nils ; Alber, Gernot (2016):
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, S. 9, DOI: 10.1103/PhysRevA.93.053807,
[Artikel]

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, Thinkmind Digital Library, Nice, France, S. 262-270, ISBN 978-1-61208-493-0,
[Konferenzveröffentlichung]

2015

Bagci, Ibrahim Ethem ; Roedig, Utz ; Martinovic, Ivan ; Schulz, Matthias ; Hollick, Matthias (2015):
IOT: Using Channel State Information for Tamper Detection in the Internet of Things.
In: ACSAC 2015, In: Using Channel State Information for Tamper Detection in the Internet of Things, ACM, Los Angeles, CA, USA, S. 131-140, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818028,
[Konferenzveröffentlichung]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; van Royeen, Carel (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference, IEEE, San Diego, CA, USA, [Konferenzveröffentlichung]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Anderes]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Buch]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Phys. Rev. A, American Physical Society, (92), S. 10, [Artikel]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Buch]

Mayer, Peter ; Volkamer, Melanie (2015):
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
In: ACSAC 2015, In: Proceedings of the 31st Annual Computer Security Applications Conference, ACM, Los Angeles, CA, USA, S. 431-440, ISBN 978-1-4503-3682-6,
DOI: 10.1145/2818000.2818043,
[Konferenzveröffentlichung]

Pellegrino, Giancarlo ; Tschürtz, Constantin ; Bodden, Eric ; Rossow, Christian Bos, Herbert ; Monrose, Fabian ; Blanc, Gregory (Hrsg.) (2015):
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
In: Lecture Notes in Computer Science 9404, In: Research in Attacks, Intrusions, and Defenses. 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings., Springer Cham, Kyoto, Japan, S. 295-316, ISBN 978-3-319-26361-8,
DOI: 10.1007/978-3-319-26362-5,
[Konferenzveröffentlichung]

Schlipf, Mario (2015):
Password Policy Crawler.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Wolf, Peter ; Barrat, Jordi ; Bolo, Eden ; Bravo, Alejandro ; Krimmer, Robert ; Neumann, Stephan ; Parreño, Al ; Schürmann, Carsten ; Volkamer, Melanie (2015):
Certification of ICTs in Elections.
1nternational Institute for Democracy and Electoral Assistance, [Buch]

Coudert, Fanny ; Butin, Denis ; Métayer, Daniel Le (2015):
Body-worn Cameras for Police Accountability: Opportunities and Risks.
In: Computer Law & Security Review (CLSR), 31 (6), S. 749-762, [Artikel]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015, Springer, Seoul, Korea, [Konferenzveröffentlichung]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, S. 181-196, DOI: 10.1007/978-3-319-32859-1_15,
[Konferenzveröffentlichung]

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), Washington, DC, USA, IEEE Computer Society, In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, S. 619-629, [Online-Edition: https://dl.acm.org/citation.cfm?id=2916135&picked=prox],
[Konferenzveröffentlichung]

Petzoldt, Albrecht ; Cheng, Ming-Shing ; Yang, Bo-Yin ; Chengdong, Tao ; Ding, Jintai (2015):
Design Principles for HFEv- based Signature Schemes.
In: LNCS, In: ASIACRYPT 2015 - Part I - 21st International Conference on the Theory and Application of Cryptology and Information Security, Springer, Auckland, New Zealand, S. 1-24, [Konferenzveröffentlichung]

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, IARIA, Barcelona, Spain, S. 36-41, ISBN 978-1-61208-440-4,
[Konferenzveröffentlichung]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Konferenzveröffentlichung]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Konferenzveröffentlichung]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS), [Konferenzveröffentlichung]

Della Toffola, Luca ; Pradel, Michael ; Gross, Thomas R. Andy, Gill (Hrsg.) (2015):
Performance problems you can fix: a dynamic analysis of memoization opportunities.
50In: OOPSLA 2015, In: Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications, ACM, Pittsburgh, PA, USA, S. 607-622, ISBN 978-1-4503-3689-5,
DOI: 10.1145/2814270.2814290,
[Konferenzveröffentlichung]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, S. 1504-1517, DOI: 10.1145/2810103.2813678,
[Online-Edition: https://encrypto.de/papers/DDKSSZ15.pdf],
[Konferenzveröffentlichung]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), ACM, Denver, Colorado, USA, S. 1197-1210, [Konferenzveröffentlichung]

Fischlin, Marc ; Mazaheri, Sogol (2015):
Notions of Deniable Message Authentication.
In: WPES '15, In: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ACM, Denver, Colorado, USA, S. 55-64, ISBN 978-1-4503-3820-2,
DOI: 10.1145/2808138.2808143,
[Konferenzveröffentlichung]

Neumann, Stephan ; Volkamer, Melanie ; Strube, Moritz ; Jung, Wolfgang ; Brelle, Achim (2015):
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
In: Datenschutz und Datensicherheit, (11), 2015. S. 747-752, DOI: 10.1007/s11623-015-0512-7,
[Artikel]

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, (062335), 92. DOI: 10.1103/PhysRevA.92.062335,
[Artikel]

Saissi, Habib ; Bokor, Peter ; Suri, Neeraj (2015):
PBMC: Symbolic Slicing for the Verification of Concurrent Programs.
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, [Konferenzveröffentlichung]

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), Denver, Colorado, USA, S. 15-20, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), S. 14, [Artikel]

Ta, Vinh-Thong ; Butin, Denis ; Métayer, Daniel Le (2015):
Formal Accountability for Biometric Surveillance: A Case Study.
In: LNCS, In: Annual Privacy Forum (APF2015), Springer, Luxembourg, [Konferenzveröffentlichung]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, IEEE, Florence, Italy, S. 731-732, DOI: 10.1109/CNS.2015.7346908,
[Konferenzveröffentlichung]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, Paris, France, S. 6, [Konferenzveröffentlichung]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, S. 8, [Konferenzveröffentlichung]

Funke, Sebastian ; Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis ; Mühlhäuser, Max (2015):
End-2-End Privacy Architecture for IoT.
In: IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28.-30. Sept. 2015, ISBN 978-1-4673-7876-5,
DOI: 10.1109/CNS.2015.7346895,
[Konferenzveröffentlichung]

Germanus, Daniel ; Ismail, Hatem ; Suri, Neeraj (2015):
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation.
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, [Konferenzveröffentlichung]

Kulyk, Oksana ; Teague, Vanessa ; Volkamer, Melanie Haenni, Rolf ; Koenig, Reto ; Wikström, Douglas (Hrsg.) (2015):
Extending Helios Towards Private Eligibility Verifiability.
In: E-Voting and Identity: 5th International Conference - VoteID 2015, Springer, Bern, Switzerland, S. 57-73, [Konferenzveröffentlichung]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, Springer, Vienna, Austria, S. 20, [Konferenzveröffentlichung]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015):
Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP.
In: ICPP 2015 - The 44th Annual Conference 2015 International Conference on Parallel Processing, in press, Beijing, China, [Konferenzveröffentlichung]

Piper, Thorsten ; Suri, Neeraj ; Fuhrman, Thomas (2015):
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms.
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, [Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS, Vienna, Austria, [Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael Pernul, Günther ; Ryan, Michael Y. A. ; Weippl, Edgar (Hrsg.) (2015):
DNS-Scopy: Towards Security of Internet Naming Infrastructure.
1In: Lecture Notes in Computer Science 9326, In: 20th European Symposium on Research in Computer Security Vienna, Austria, September 21 – 25, 2015 Proceedings, Springer-Verlag New York, Inc., Vienna, Austria, S. 3-22, ISBN 978-3-319-24173-9,
DOI: 10.1007/978-3-319-24174-6_1,
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS), Florence, DOI: 10.1109/CNS.2015.7346844,
[Konferenzveröffentlichung]

Tao, Chengdong ; Xiang, Hong ; Petzoldt, Albrecht ; Ding, Jintai (2015):
Simple Matrix - A Multivariate Public Key Cryptosystem (MPKC) for Encryption.
In: Finite Fields and Their Applications, (35), S. 352-368, [Artikel]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem Foresti, Sara (Hrsg.) (2015):
A Socio-Technical Investigation into Smartphone Security.
In: Security and Trust Management: 11th International Workshop - STM 2015, Springer, S. 265-273, [Konferenzveröffentlichung]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, In: OOPSLA Onward!, Piitsburgh, 25.10.2015, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Konferenzveröffentlichung]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15), USENIX Association, Washington, D.C., USA, [Konferenzveröffentlichung]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA, [Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, Springer, Santa Barbara, CA, USA, S. 545-564, [Konferenzveröffentlichung]

Gong, Liang ; Pradel, Michael ; Sen, Koushik (2015):
JITProf: pinpointing JIT-unfriendly JavaScript code.
In: ESEC/FSE 2015, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ACM, Bergamo, Italy, S. 357-368, ISBN 978-1-4503-3675-8,
DOI: 10.1145/2786805.2786831,
[Konferenzveröffentlichung]

Horsch, Moritz ; Hülsing, Andreas ; Buchmann, Johannes (2015):
PALPAS - PAsswordLess PAssword Synchronization.
In: International Conference on Availability, Reliability and Security (ARES), Université Paul Sabatier, Toulouse, France, [Konferenzveröffentlichung]

Huang, Jialin ; Vaudenay, Serge ; Lai, Xuejia ; Nyberg, Kaisa (2015):
Capacity and Data Complexity in Multidimensional Linear Attack.
In: CRYPTO, [Konferenzveröffentlichung]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, S. 181-190, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Konferenzveröffentlichung]

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer, Heraklion, Crete, Greece, S. 3-21, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Konferenzveröffentlichung]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: 10th International Conference on Availability, Reliability and Security - ARES 2015, IEEE, Toulouse, France, S. 224-229, DOI: 10.1109/ARES.2015.75,
[Konferenzveröffentlichung]

Meskanen, Tommi ; Ramezanian, Sara ; Liu, Jian ; Niemi, Valtteri (2015):
Private Membership Test for Bloom Filters.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Konferenzveröffentlichung]

Mineraud, Julien ; Lancerin, Federico ; Balasubramaniam, Sasitharan ; Conti, Mauro ; Tarkoma, Sasu (2015):
You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Konferenzveröffentlichung]

Nyman, Thomas ; McGillion, Brian ; Asokan, N. (2015):
On Making Emerging Trusted Execution Environments Accessible to Developers.
9229In: Lecture Notes in Computer Science, In: 8th International Conference on Trust & Trustworthy Computing, Springer International Publishing, Heraklion, Crete, Greece, S. 58-67, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_4,
[Konferenzveröffentlichung]

Pellegrino, Giancarlo ; Balzarotti, Davide ; Winter, Stefan ; Suri, Neeraj (2015):
In the Compression Hornet's Nest: A Security Study of Data Compression in Network Services.
In: Proceedings of USENIX Security Symposium, 12.-14. August 2015, Washington D.C, [Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, S. 515-530, [Online-Edition: https://encrypto.de/papers/PSSZ15.pdf],
[Konferenzveröffentlichung]

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015):
How Current Android Malware Seeks to Evade Automated Code Analysis.
In: 9th International Conference on Information Security Theory and Practice (WISTP'2015), [Konferenzveröffentlichung]

Tamrakar, Sandeep ; Ekberg, Jan-Erik ; Laitinen, Pekka (2015):
On Rehoming the Electronic Id to TEEs.
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, [Konferenzveröffentlichung]

Volkamer, Melanie ; Renaud, Karen ; Braun, Kristoffer ; Canova, Gamze ; Reinheimer, Benjamin Conti, Mauro ; Schunter, Matthias ; Askoxylakis, Ioannis (Hrsg.) (2015):
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
In: Trust and Trustworthy Computing, In: International Conference on Trust and Trustworthy Computing (TRUST), Springer, Heraklion, Crete, Greece, S. 104-121, ISBN 978-3-319-22845-7,
DOI: 10.1007/978-3-319-22846-4_7,
[Konferenzveröffentlichung]

Volkamer, Melanie ; Renaud, Karen ; Kulyk, Oksana ; Emeröz, Sinem (2015):
An Investigation into the "Other" Barriers to Adoption of Smartphone Security Precautions (Poor Usability being a Given).
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, (755), 2015. International Association for Cryptologic Research (IACR), S. 1-24, [Online-Edition: https://eprint.iacr.org/2015/755/20150730:095248],
[Artikel]

Askarov, Aslan ; Chong, Stephen ; Mantel, Heiko (2015):
Hybrid Monitors for Concurrent Noninterference.
In: Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF), IEEE Computer Society, Verona, Italy, S. 137-151, ISBN 978-1-4673-7539-9,
DOI: 10.1109/CSF.2015.17,
[Konferenzveröffentlichung]

Diedrich, Lennart ; Murati, Lulzim ; Wiesmaier, Alexander (2015):
Stream ciphers in the IoT: Grain and Trivium.
[Report]

Do, Lisa Nguyen Quang ; Ali, Karim ; Bodden, Eric ; Livshits, Benjamin (2015):
Toward a Just-in-Time Static Analysis.
[Artikel]

Do, Trinh Minh Tri ; Dousse, Olivier ; Miettinen, Markus ; Gatica-Perez, Daniel (2015):
A probabilistic kernel method for human mobility prediction with smartphones.
In: Pervasive and Mobile Computing, 20S. 13-28, DOI: 10.1016/j.pmcj.2014.09.001,
[Artikel]

Ghiglieri, Marco ; Lange, Benjamin ; Simo, Hervais ; Waidner, Michael (2015):
Security und Privacy bei Smart TVs – Bedrohungspotential und technische Lösungsansätze.
In: Weiterdenken, In: Digitale Schwellen - Freiheit und Privatheit in der digitalisierten Welt, Dreseden, S. 67-84, [Konferenzveröffentlichung]

Gong, Liang ; Pradel, Michael ; Sridharan, Manu ; Sen, Koushik (2015):
DLint: Dynamically Checking Bad Coding Practices in JavaScript.
In: ISSTA 2015, In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, ACM, Baltimore, MD, USA, S. 94-105, ISBN 978-1-4503-3620-8,
DOI: 10.1145/2771783.2771809,
[Konferenzveröffentlichung]

Kußmaul, Tobias ; Löffler, Johannes ; Wiesmaier, Alexander (2015):
Block ciphers PRESENT and SEA in comparison.
[Report]

Letzkus, Fabian (2015):
NotaryCache: Preventing man-in-the-middle attacks through ubiquitous multi-path probing.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Loruenser, Thomas ; Rodriguez, Charles Bastos ; Demirel, Denise ; Fischer-Hübner, Simone ; Gross, Thomas R. ; Langer, Thomas ; des Noes, Mathieu ; Poehls, Henrich ; Rozenberg, Boris ; Slamanig, Daniel (2015):
Towards a New Paradigm for Privacy and Security in Cloud Services.
In: CoRR abs/1506.05980 (2015), [Artikel]

Luna, Jesus ; Suri, Neeraj ; Iorga, Michaela ; Karmel, Anil (2015):
Leveraging the Potential of Cloud Security Service Level Agreements through Standards.
In: Proceedings of IEEE Cloud Computing, 27.06.- 02.07. 2015, New York, [Konferenzveröffentlichung]

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, Prague, Czech Republic, S. 999-1022, [Konferenzveröffentlichung]

Meuser, Tobias ; Schmidt, Larissa ; Wiesmaier, Alexander (2015):
Comparing Lightweight Hash Functions – PHOTON & Quark.
[Report]

Kulyk, Oksana ; Neumann, Stephan ; Budurushi, Jurlind ; Volkamer, Melanie ; Haenni, Rolf ; Koenig, Reto ; von Bergen, Philemon (2015):
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
In: Cryptology ePrint Archive, (558), 2015. International Association for Cryptologic Research (IACR), S. 1-19, [Online-Edition: https://eprint.iacr.org/2015/558],
[Artikel]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award).
In: 52nd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015, [Konferenzveröffentlichung]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Daubert, Jörg ; Wiesmaier, Alexander ; Kikiras, Panayotis (2015):
A View on Privacy & Trust in IoT.
In: IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE, In: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), London, UK, S. 2665-2670, DOI: 10.1109/ICCW.2015.7247581,
[Konferenzveröffentlichung]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Gutmann, Andreas ; Renaud, Karen ; Volkamer, Melanie (2015):
Nudging Bank Account Holders Towards More Secure PIN Management.
4In: Journal of Internet Technology and Secured Transaction (JITST), Infonomics Society, S. 380 - 386, DOI: 10.20533/jitst.2046.3723.2015.0049,
[Konferenzveröffentlichung]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Springer, Queensland University of Technology (QUT), Brisbane, Australia, S. 195-212, [Konferenzveröffentlichung]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max Ko, Ryan ; Choo, Kim-Kwang Raymond (Hrsg.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, Amsterdam Heidelberg, Elsevier Syngress, S. 463-493, DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Buchkapitel]

Hasan, T. ; Kikiras, Panayotis ; Leonardi, Alessandro ; Ziekow, Holger ; Daubert, Jörg (2015):
Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot.
In: Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), ACM, Vancouver, Canada, S. 1-10, DOI: 10.4108/icst.tridentcom.2015.259694,
[Konferenzveröffentlichung]

Nagy, Marcin ; Bui, Thanh Phong ; Cristofaro, Emiliano De ; Asokan, N. ; Ott, Jörg ; Sadeghi, Ahmad-Reza (2015):
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
In: ACM WiSEC 2015, [Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Wachsmann, Christian ; Waidner, Michael (2015):
Security and Privacy Challenges in Industrial Internet of Things.
In: 52nd Design Automation Conference (DAC) Research, [Konferenzveröffentlichung]

Schäfer, Marcel ; Mair, Sebastian ; Berchtold, Waldemar ; Steinebach, Martin (2015):
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
In: IH&MMSec '15 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, Portland, Oregon, S. 109-114, ISBN 978-1-4503-3587-4,
DOI: 10.1145/2756601.2756611,
[Konferenzveröffentlichung]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC), [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Konferenzveröffentlichung]

Struck, Patrick (2015):
On the difference between hardness and security: a comparison of lattice-based signature schemes.
TU Darmstadt, [Masterarbeit]

Wilk, Stefan ; Schönherr, Sophie ; Stohr, Denny ; Effelsberg, Wolfgang (2015):
EnvDASH: An Environment-Aware Dynamic Adaptive Streaming over HTTP System.
In: TVX '15, In: Proceedings of the ACM International Conference on Interactive Experiences for TV and Online Video, ACM, Brussels, Belgium, S. 113-118, ISBN 978-1-4503-3526-3,
DOI: 10.1145/2745197.2745205,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Masterarbeit]

Arabadzhieva, Vladislava (2015):
Privacy Taxonomy for Verifiable Poll-site Voting Schemes.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelorarbeit]

Braun, Kristoffer ; Rack, Philipp (2015):
Shoulder-surfing resistente Authentisierung an mobilen Endgeräten.
Darmstadt, Technische Universität, [Online-Edition: https://download.hrz.tu-darmstadt.de/media/FB20/Dekanat/Publ...],
[Bachelorarbeit]

Canova, Gamze ; Volkamer, Melanie ; Bergmann, Clemens ; Borza, Roland ; Reinheimer, Benjamin ; Stockhardt, Simon ; Tenberg, Ralf (2015):
Learn To Spot Phishing URLs with the Android NoPhish App.
In: IFIP Advances in Information and Communication Technology, In: Information Security Education Across the Curriculum - 9th (IFIP), Springer, Hamburg, Germany, S. 87-100, DOI: 10.1007/978-3-319-18500-2_8,
[Konferenzveröffentlichung]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Konferenzveröffentlichung]

Ghiglieri, Marco ; Müller, Jan (2015):
Datenschutzfreundliche Erfassung von Nutzungsdaten bei Smart Entertainment Geräten.
In: 14. Deutscher IT-Sicherheitskongress, [Konferenzveröffentlichung]

Ghiglieri, Marco ; Oswald, Florian (2015):
SSP – Ansatz zur garantierten Durchsetzung von Web Sicherheitsmaßnahmen auf dem Client.
In: 14. Deutscher IT-Sicherheitskongress, [Konferenzveröffentlichung]

Pradel, Michael ; Schuh, Parker ; Sen, Koushik (2015):
TypeDevil: dynamic type inconsistency analysis for JavaScript.
1In: Proceedings of the 37th International Conference on Software Engineering, IEEE Press, Florence, Italy, S. 314-324, ISBN 978-1-4799-1934-5,
DOI: 10.1109/ICSE.2015.51,
[Konferenzveröffentlichung]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland), [Konferenzveröffentlichung]

Shirazi, Fatemeh ; Goehring, Matthias ; Diaz, Claudia (2015):
Tor Experimentation Tools.
In: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, IEEE, FAIRMONT, SAN JOSE, CA, [Konferenzveröffentlichung]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, S. 411-428, DOI: 10.1109/SP.2015.32,
[Online-Edition: https://encrypto.de/papers/SHSSK15.pdf],
[Konferenzveröffentlichung]

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50S. 16-32, [Artikel]

Winter, Stefan ; Piper, Thorsten ; Schwahn, Oliver ; Natella, Roberto ; Suri, Neeraj ; Cotroneo, Domenico (2015):
GRINDER: On Reusability of Fault Injection Tools.
In: Proceedings of the ICSE/AST, 23.05.-24.05.2015, Florenz, [Konferenzveröffentlichung]

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah (2015):
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
In: 3rd International Workshop on Release Engineering, Florence, Italy, S. 4, [Konferenzveröffentlichung]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, S. 430-454, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Konferenzveröffentlichung]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, S. 673-701, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Konferenzveröffentlichung]

Bucicoiu, Mihai ; Davi, Lucas ; Deaconescu, Razvan ; Sadeghi, Ahmad-Reza (2015):
XiOS: Extended Application Sandboxing on iOS.
In: 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), [Konferenzveröffentlichung]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, IOP PublishingS. 025501, [Artikel]

Rasthofer, Siegfried ; Asrar, Irfan ; Huber, Stephan ; Bodden, Eric (2015):
An Investigation of the Android/BadAccents Malware which Exploits a new Android Tapjacking Attack.
[Report]

Tancreti, Matthew ; Sundaram, Vinaitheerthan ; Bagchi, Saurabh ; Eugster, Patrick (2015):
TARDIS: Software-Only System-Level Record and Replay in Wireless Sensor Networks.
In: Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM, In: 14th ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN 2015), Seattle, WA, USA, S. 286-297, ISBN 978-1-4503-3475-4,
DOI: 10.1145/2737095.2737096,
[Konferenzveröffentlichung]

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. (2015):
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: PHYSICAL REVIEW LETTERS, APSS. 173601, [Artikel]

Alhamoud, Alaa ; Xu, Pei ; Englert, Frank ; Scholl, Philipp ; Nguyen, The An Binh ; Böhnstedt, Doreen ; Steinmetz, Ralf (2015):
Evaluation of User Feedback in Smart Home for Situational Context Identification.
In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, St. Louis, MO, USA, S. 20-25, ISBN 978-1-4799-8426-8,
DOI: 10.1109/PERCOMW.2015.7133987,
[Konferenzveröffentlichung]

Brzuska, Christina ;