Publications
Publications
Informatik für Frieden und Sicherheit
Reuter, Christian; Kaufhold, Marc-André
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.573-595
Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics
Reuter, Christian; Kaufhold, Marc-André
Journal of Contingencies and Crisis Management (JCCM), p.41-57
[Journal Article]
Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research
Reuter, Christian; Hughes, Amanda Lee; Kaufhold, Marc-André
International Journal on Human-Computer Interaction (IJHCI), p.280-294
[Journal Article]
Editorial of the Special Issue on Social Media in Crisis Management
Reuter, Christian; Hughes, Amanda Lee; Hiltz, Starr Roxanne; Imran, Muhammad; Plotnick, Linda
International Journal on Human-Computer Interaction (IJHCI), p.277-279
[Journal Article]
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
Reuter, Christian; Backfried, Gerhard; Kaufhold, Marc-André; Spahr, Fabian
ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management, p.445-458
[Conference Proceedings]
Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion
Reuter, Christian; Aal, Konstantin; Beham, Frank; Boden, Alexander; Brauner, Florian; Ludwig, Thomas; Lukosch, Stephan; Fiedrich, Frank; Fuchs-Kittowski, Frank; Geisler, Stefan; Gennen, Klaus; Herrmann, Dominik; Kaufhold, Marc-André; Klafft, Michael; Lipprandt, Myriam; Lo Iacono, Luigi; Pipek, Volkmar; Pottebaum, Jens; Mentler, Tilo; Nestler, Simon; Stieglitz, Stefan; Sturm, Christian; Rusch, Gebhard; Sackmann, Stefan; Volkamer, Melanie; Wulf, Volker
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.621-630
Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick
Reuter, Christian
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Technologien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.3-14
IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
Nordmann, Alfred; Reuter, Christian; Lederer, Markus
10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS 2018)
[Conference Proceedings]
Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
[Journal Article]
Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; Radziewski, Elmar von
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]
Environmental Peacebuilding in the Middle East
Ide, Tobias; Sumer, Vakur; Aldehoff, Larissa
Routledge Handbook of Environmental Conflict and Peacebuilding
Advances and Throwbacks in Hardware-assisted Security: Special Session
Brasser, Ferdinand; Davi, Lucas; Dhavlle, Abhijitt; Frassetto, Tommaso; Dinakarrao, Sai Manoj Pudukotai; Rafatirad, Setareh; Sadeghi, Ahmad-Reza; Sasan, Avesta; Sayadi, Hossein; Zeitouni, Shaza; Homayoun, Houman
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
[Conference Proceedings]
Efficient Circuit-based PSI via Cuckoo Hashing
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
37. Advances in Cryptology -- EUROCRYPT 2018
[Conference Proceedings]
Invited: Reconciling Remote Attestation and Safety-Critical
Operation on Simple IoT Devices
Carpent, Xavier; Eldefrawy, Karim; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
Design Automation Conference
[Conference Proceedings]
A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, p.340-350
[Conference Proceedings]
Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
crypto day matters: Beiträge vom 29. Kryptotag
[Conference Proceedings]
General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.949-966
[Conference Proceedings]
FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
[Conference Proceedings]
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
[Conference Proceedings]
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
[Journal Article]
Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
Proceedings: 21st IEEE International Conference on Computational Science and Engineering: CSE 2018
[Conference Proceedings]
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF), p.76-90
[Conference Proceedings]
Call Graph Construction for Java Libraries
Reif, Michael; Eichberg, Michael; Mezini, Mira
Software Engineering und Software Management 2018
[Conference Proceedings]
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices
Steinmetzer, Daniel; Wegemer, Daniel; Hollick, Matthias
3rd NSF Millimeter-Wave RCN Workshop
[Conference Proceedings]
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
[Report, Journal Article]