Publications

Publications

Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators
Stojanovic, Vladimir M.
Physical Review Letters, p.190504
[Journal Article]


MagicPairing: Apple’s Take on Securing Bluetooth Peripherals
Heinze, Dennis; Classen, Jiska; Rohrbach, Felix
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
[Conference Proceedings]


On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
The 25th Australasian Conference on Information Security and Privacy (ACISP'20)
[Conference Proceedings]


Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models
Stojanovic, Vladimir M.
Physical Review B
[Journal Article]


LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]


The Lattice-Based Digital Signature Scheme qTESLA
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020)
[Conference Proceedings]


Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security
Krämer, Juliane; Struck, Patrick
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020)
[Conference Proceedings]


TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
Cloosters, Tobias; Rodler, Michael; Davi, Lucas
29th USENIX Security Symposium
[Conference Proceedings]


Trusted Execution Environments: Properties, Applications, and Challenges
Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
IEEE Security & Privacy, p.56-60
[Journal Article]


Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions
Krämer, Juliane; Struck, Patrick
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020)
[Conference Proceedings]


On the Security of Strong Memristor-based Physically Unclonable Functions
Zeitouni, Shaza; Stapf, Emmanuel; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Design Automation Conference 2020
[Conference Proceedings]


SAFE: A Secure and Efficient Long-Term Distributed Storage System
Buchmann, Johannes; Dessouky, Ghada; Frassetto, Tommaso; Kiss, Ágnes; Sadeghi, Ahmad-Reza; Schneider, Thomas; Traverso, Giulia; Zeitouni, Shaza
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20)
[Conference Proceedings]


Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System
Nguyen, Thien Duc; Rieger, Phillip; Miettinen, Markus; Sadeghi, Ahmad-Reza
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020
[Conference Proceedings]


BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
Alkeilani Alkadri, Nabil; Bansarkhani, Rachid El; Buchmann, Johannes
24th International Conference on Financial Cryptography and Data Security (FC'20)
[Conference Proceedings]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Sauer, Alexander; Alber, Gernot
Cryptography, Vol.4
[Journal Article]


Deterministic twirling with low resources
Stonner, David Jakob; Kysela, Jaroslav; Weir, Graeme; Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physics letters A
[Journal Article]


Offline Model Guard: Secure and Private ML on Mobile Devices
Bayerl, Sebastian P.; Frassetto, Tommaso; Jauernig, Patrick; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Stapf, Emmanuel; Weinert, Christian
23. Design, Automation and Test in Europe Conference (DATE '20)
[Conference Proceedings]


The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
[Journal Article]


A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, p.543-546
[Journal Article]


Quo Vadis? Digitalisierung und Soziale Medien im Bevölkerungsschutz
Reuter, Christian
Digitalisierung als Erfolgsfaktor für das Sozial- und Wohlfahrtswesenwesen, p.309-318


Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
[Journal Article]


HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Dessouky, Ghada; Frassetto, Tommaso; Sadeghi, Ahmad-Reza
USENIX Security
[Conference Proceedings]


Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]


To (Psychologically) Own Data is to Protect Data: How Psychological Ownership Determines Protective Behavior in a Work and Private Context
Heidt, Margareta; Olt, Christian M.; Buxmann, Peter
Internationale Tagung Wirtschaftsinformatik
[Conference Proceedings]


HEALED: HEaling & Attestation for Low-end Embedded Devices
Ibrahim, Ahmad; Sadeghi, Ahmad-Reza; Tsudik, Gene
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019
[Conference Proceedings]


Asymmetric DCnets for Effective and Efficient Sender Anonymity
Grube, Tim; Daubert, Jörg; Mühlhäuser, Max
IEEE Global Communications Conference (GLOBECOM)
[Conference Proceedings]


DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification
Truong, Hien Thi Thu; Toivonen, Juhani; Nguyen, Thien Duc; Soriente, Claudio; Tarkoma, Sasu; Asokan, N.
IEEE International Conference on Pervasive Computing and Communications (PerCom2019)
[Conference Proceedings]


On (The Lack Of) Location Privacy in Crowdsourcing Applications
Boukoros, Spyros; Humbert, Mathias; Katzenbeisser, Stefan; Troncoso, Carmela
USENIX Security Symposium
[Conference Proceedings]


Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography
[Journal Article]


Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment
Zimmermann, Sina; Gerber, Nina
i-com, p.271-285
[Journal Article]