Publications
Publications
On the Application of Homomorphic Encryption to Face Identification
Drozdowski, P.; Buchmann, N.; Rathgeb, C.; Margraf, M.; Busch, C.
Intl. Conf. of the Biometrics Special Interest Group (BIOSIG), p.1-8
[Conference Proceedings]
On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, L.; Damer, N.; Moseguí-Saladié, A.; Rathgeb, C.; Scherhag, U.; Busch, C.; Kirchbuchner, F.; Uhl, A.
Image Analysis and Processing (ICIAP), p.345-356
[Conference Proceedings]
LARA - A Design Concept for Lattice-based Encryption
Bansarkhani, Rachid El
FC 2019: 23rd International Conference on Financial Cryptography and Data Security
[Conference Proceedings]
Science peace security ‘19: Proceedings of the Interdisciplinary Conference on Technical Peace and Security Research
Interdisciplinary Conference on Technical Peace and Security Research
[Conference Proceedings]
Automated Refactoring to Reactive Programming
Köhler, Mirco; Salvaneschi, Guido
ASE2019
[Conference Proceedings]
Post-Quantum Cryptography in Embedded Systems
Krämer, Juliane; Marzougui, Soundes
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
[Conference Proceedings]
Can an online service predict gender?: on the state-of-the-art in gender identification from texts
Krüger, Stefan; Hermann, Ben
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering
[Conference Proceedings]
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation
Günther, Daniel; Kiss, Ágnes; Scheidel, Lukas; Schneider, Thomas
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, p.2541-2543
[Conference Proceedings]
Simple Refreshing in the Noisy Leakage Model
Dziembowski, Stefan; Faust, Sebastian; Zebrowski, Karol
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]
Secure and Private Function Evaluation with Intel SGX
Felsen, Susanne; Kiss, Ágnes; Schneider, Thomas; Weinert, Christian
CCSW 2019 - The ACM Cloud Computing Security Workshop
[Conference Proceedings]
A Formal Treatment of Deterministic Wallets
Das, Poulami; Faust, Sebastian; Loss, Julian
ACM CCS 2019 - Symposium on Computer and Communications Security
[Conference Proceedings]
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC '19: Proceedings of the 35th Annual Computer Security Applications Conference, p.788-800
[Conference Proceedings]
Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
[Conference Proceedings]
Sponges Resist Leakage: The Case of Authenticated Encryption
Degabriele, Jean Paul; Janson, Christian; Struck, Patrick
25th Annual International Conference on the Theory and Application of Cryptology and Information Security
[Conference Proceedings]
Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
[Conference Proceedings]
Responsible Data Usage in Smart Cities: Privacy in Everyday Life vs. Reacting to Emergency Situations
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]
Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]
Accessing Dual Use in IT Development
Riebe, Thea; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]
Wertekonflikte in der Nutzung sozialer Medien zur Vernetzung ungebundener HelferInnen in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]
Threat Intelligence Application for Cyber Attribution
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]
6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019 - Workshopband, p.278-280
[Conference Proceedings]
Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
Reuter, Christian; Häusser, Katja; Bien, Mona; Herbert, Franziska
MuC'19: Proceedings of Mensch und Computer 2019, p.287-297
[Conference Proceedings]
SentiNet: Twitter-basierter Ansatz zur kombinierten Netzwerk- und Stimmungsanalyse in Katastrophenlagen
Kaufhold, Marc-André; Schmidt, Arne; Seifert, Fabienne; Riebe, Thea; Reuter, Christian
Mensch und Computer 2019 - Workshopband
[Conference Proceedings]
Social Media Misuse: Cultural Violence, Peace and Security in Digital Networks
Kaufhold, Marc-André; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Wirtschaftsinformatik Proceedings 2019, p.1054-1068
[Conference Proceedings]
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Wirtschaftsinformatik Proceedings 2019, p.1844-1855
[Conference Proceedings]
Fighting Misinformation on Twitter: The Plugin based approach TrustyTweet
Hartwig, Katrin; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
[Conference Proceedings]
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
Informatik in der Land-, Forst- und Ernährungswirtschaft : Fokus: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.25-30
[Conference Proceedings]
The King is Dead Long Live the King! Towards Systematic Performance Evaluation of Heterogeneous Bluetooth Mesh Networks in Real World Environments
Almon, Lars; Álvarez, Flor; Kamp, Laurenz; Hollick, Matthias
2019 IEEE 44nd Conference on Local Computer Networks (LCN)
[Conference Proceedings]
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
Informatik in der Land-, Forst- und Ernährungswirtschaft, p.119-124
[Conference Proceedings]