Publications

Publications

Modeling the German Legal Latitude Principles
Neumann, Stephan; Kahlert, Anna; Henning, Maria; Richter, Philipp; Jonker, Hugo; Volkamer, Melanie
5th International Conference on eParticipation (ePart 2013), p.49-56
[Conference Proceedings]


Limiting MitM to MitE Covert-Channels
Herzberg, Amir; Shulman, Haya
2013 International Conference on Availability, Reliability and Security, p.236-241
[Conference Proceedings]


Revocation & Non-Repudiation: When the first destroys the latter
Braun, Johannes; Kiefer, Franziskus; Hülsing, Andreas
Public Key Infrastructures, Services and Applications - EuroPKI 2013, p.31-46
[Conference Proceedings]


How Long Are You Staying? Predicting Residence Time from Human Mobility Traces
Baumann, Paul; Kleiminger, Wilhelm; Santini, Silvia
The 19th Annual International Conference on Mobile Computing and Networking, p.231-233
[Conference Proceedings]


Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, Steffen; Volkamer, Melanie
RiskKom-Workshop, INFORMATIK 2013, p.1971-1984
[Conference Proceedings]


Code based Identification and Signature Schemes in Software
Yousfi Alaoui, Sidi Mohamed el; Bansarkhani, Rachid El; Cayrel, Pierre-Louis; Hoffmann, Gerhard
Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013
[Conference Proceedings]


Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets
Stancill, Blaine; Snow, Kevin; Otterness, Nathan; Monrose, Fabian; Davi, Lucas; Sadeghi, Ahmad-Reza
16th Research in Attacks, Intrusions and Defenses (RAID) Symposium
[Conference Proceedings]


HbbTV: Neue Funktionen mit möglichen Nebenwirkungen
Ghiglieri, Marco; Oswald, Florian; Tews, Erik
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien, p.563-566
[Conference Proceedings]


Security analysis of a widely deployed locking system
Tews, Erik; Weiner, M.; Massar, M.; Giese, D.; Wieser, W.
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.929-940
[Journal Article, Conference Proceedings]


Bita: Coverage-Guided, Automatic Testing of Actor Programs
Tasharofi, Samira; Pradel, Michael; Lin, Yu; Johnson, Ralph
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), p.114-124
[Conference Proceedings]


PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dobre, Dan; Karame, Ghassan O.; Li, Wenting; Majuntke, Matthias; Suri, Neeraj; Vukolic, Marko
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, p.285-298
[Conference Proceedings]


Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones
Demmler, Daniel; Schneider, Thomas; Zohner, Michael
19th Crypto-Day
[Conference Proceedings]


A Security Framework for Analysis and Design of Software Attestation
Armknecht, Frederik; Sadeghi, Ahmad-Reza; Schulz, Steffen; Wachsmann, Christian
ACM Conference on Computer and Communications Security (CCS), p.1-12
[Conference Proceedings]


On the Efficacy of Solving LWE by Reduction to Unique-SVP
Albrecht, Martin; Fitzpatrick, Robert; Göpfert, Florian
ICISC 2013
[Conference Proceedings]


Assured Cloud-Based Data Analysis with ClusterBFT
Stephen, Julian James; Eugster, Patrick
Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Proceedings, p.82-102
[Conference Proceedings]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
INF13 - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl, p.804-818
[Conference Proceedings]


Towards A Practical JCJ / Civitas Implementation
Neumann, Stephan; Feier, Christian; Volkamer, Melanie; Koenig, Reto
Cryptology ePrint Archive, p.1-12
[Conference Proceedings, Journal Article]


Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
Nagy, Marcin; Cristofaro, Emiliano De; Dmitrienko, Alexandra; Asokan, N.; Sadeghi, Ahmad-Reza
Annual Computer Security Applications Conference (ACSAC 2013)
[Conference Proceedings]


Atmosphere: A Universal Cross-Cloud Communication Infrastructure
Jayalath, Chamikara; Stephen, Julian James; Eugster, Patrick
Middleware 2013. ACM/IFIP/USENIX 14th International Middleware Conference. Beijing, China. December 2013. Proceedings., p.163-182
[Conference Proceedings]


The Mobile Data Challenge: Big Data for Mobile Computing Research
Laurila, Juha; Gatica-Perez, Daniel; Aad, Imad; Blom, Jan; Bornet, Olivier; Do, Trinh Minh Tri; Dousse, Olivier; Eberle, Julien; Miettinen, Markus
Proceedings of the Workshop on the Nokia Mobile Data Challenge, in Conjunction with the 10th International Conference on Pervasive Computing
[Conference Proceedings]


PeerSense: Who is near you?
Gupta, Aditi; Miettinen, Markus; Nagy, Marcin; Asokan, Nadarajah; Wetzel, Alexandre
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), p.516-518
[Conference Proceedings]


Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling
Gupta, Aditi; Miettinen, Markus; Asokan, N.; Nagy, Marcin
2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom), p.471 - 480
[Conference Proceedings]


Security versus Trust Indicators in 2011 in Germany
Volkamer, Melanie; Karayumak, Fatih; Kauer, Michaela; Halim, Dhanish; Bruder, Ralph
Current Issues in IT Security 2012, p.79-96
[Conference Proceedings]


The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
Sadeghi, Ahmad-Reza; Schulz, Steffen; Varadharajan, Vijay
European Symposium on Research in Computer Science (ESORICS), p.253-270
[Conference Proceedings]


Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited
Peter, Andreas; Kronberg, M.; Trei, W.; Katzenbeisser, Stefan
International Conference on Information Security (ISC 2012), p.242-257
[Conference Proceedings]


C4PS - Helping Facebookers Manage Their Privacy Settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Social Informatics 4th International Conference, SocInfo 2012, proceedings, p.188-201
[Conference Proceedings]


Improving the Performance of the SYND Stream Cipher
Meziani, Mohammed; Hoffmann, Gerhard; Cayrel, Pierre-Louis
AfricaCrypt 2012
[Conference Proceedings]


An Efficient and Secure Coding-based Authenticated Encryption
Meziani, Mohammed; Bansarkhani, Rachid El
7th DPM International Workshop on Data Privacy Management (DPM 2012)
[Conference Proceedings]


The Influence of trustworthiness of website layout on security perception of websites
Kauer, Michaela; Kiesel, Florian; Ueberschaer, Felix; Volkamer, Melanie; Bruder, Ralph
Current Issues in IT Security 2012, p.215-220
[Conference Proceedings]


On the design and implementation of the Open eCard App
Hühnlein, Detlef; Petrautzki, Dirk; Schmölz, Johannes; Wich, Tobias; Horsch, Moritz; Wieland, Thomas; Eichholz, Jan; Wiesmaier, Alexander; Braun, Johannes; Feldmann, Florian; Potzernheim, Simon; Schwenk, Jörg; Kahlo, Christian; Kühne, Andreas; Veit, Heiko
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Conference Proceedings]