Publications

Publications

Secure computations on non-integer values with applications to privacy-preserving sequence analysis
Franz, M.; Deiseroth, B.; Hamacher, Kay; Jha, Somesh; Katzenbeisser, S.; Schröder, H.
Information Security Technical Report, p.117-128
[Journal Article]


Pseudorandom Signatures
Fleischhacker, N.; Günther, F.; Kiefer, F.; Poettering, B.
>8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 7-10 May, Hangzhou, China
[Journal Article]


Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications
Armknecht, F.; Katzenbeisser, S.; Peter, A.
Designs, Codes and Cryptography, p.209-232
[Journal Article]


Internet Privacy. Taking opportunities, assessing risks, building trust.
Simo-Fhom, Hervais
>Springer Vieweg; 2013
[Journal Article]


Sichere Nutzung von Cloud-Speicherdiensten
Kalabis, Lukas; Wolf, Ruben; Kunz, Thomas
Datenschutz und Datensicherheit, p.512-516
[Journal Article]


Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]


Schutz­maß­nahmen gegen datenschutzunfreundliche Smartphone-Apps – Technische Möglich­keiten und rechtliche Zulässigkeit des Selbstdatenschutzes bei Apps
Bodden, Eric; Rasthofer, Siegfried; Richter, Philipp; Roßnagel, Alexander
Datenschutz und Datensicherheit, p.720 - 725
[Journal Article]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
Cryptology ePrint Archive, p.1-12
[Conference Proceedings, Journal Article]


Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey
Vigil, Martín Gagliotti; Cabarcas, Daniel; Wiesmaier, Alexander; Buchmann, Johannes
IACR Cryptology ePrint Archive
[Journal Article]


Certified Grid Job Submission in the ALICE Grid Services
Schreiner, Steffen; Grigoras, Costin; Litmaath, Maarten; Betev, Latchezar; Buchmann, Johannes
Open Access Journal of Physics: Conference Series (JPCS), International Conference on Computing in High Energy and Nuclear Physics (CHEP) 2012
[Journal Article]


Das Recht auf Vergessenwerden nach der geplanten EU-Verordnung - Umsetzungsmöglichkeiten im Internet
Kalabis, Lukas; Selzer, Annika
Datenschutz und Datensicherheit, p.670--675
[Journal Article]


Sicherheitskern(e) für Smartphones: Ansätze und Lösungen
Alkassar, Ammar; Schulz, Steffen; Stüble, Christian
Datenschutz und Datensicherheit (DuD), p.175-179
[Journal Article]


Policy Override in Practice: Model, Evaluation, and Decision Support
Bartsch, Steffen
Security and Communication Networks
[Journal Article]


Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, Cristian Thiago; Volkamer, Melanie
Information and Computer Security, p.75-85
[Journal Article]


Legal Analysis of Privacy Weaknesses in Poll-Site eVoting Systems
Demirel, Denise; Henning, Maria
Jusletter IT - Die Zeitschrift für IT und Recht
[Journal Article]


IT-Sicher­heits­forschung in Darmstadt - von den Grundlagen bis zur Anwendung
Kreutzer, Michael; Waidner, Michael; Buchmann, Johannes
Praxis der Informationsverarbeitung und Kommunikation, p.305-308
[Journal Article]


Physical Unclonable Functions: Sicher­heits­eigen­schaften und Anwendungen
Katzenbeisser, Stefan; Schaller, André
Datenschutz und Datensicherheit, p.881-885
[Journal Article]


A Selection of Recent lattice-Based Signature and Encryption Schemes
Bansarkhani, Rachid El; Cabarcas, Daniel; Kuo, Po-Chun; Schmidt, Patrick; Schneider, Michael
Tatra Mountains Mathematical Publications, p.81-102
[Journal Article]