Publications
Publications
The Quest to Replace Passwords Revisited – Rating Authentication Schemes
Zimmermann, Verena; Gerber, Nina; Kleboth, Marius; Preuschen, Alexandra von; Schmidt, Konstantin; Mayer, Peter
Twelth International Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), p.38-48
[Conference Proceedings]
Finally Johnny Can Encrypt. But Does This Make Him Feel More
Secure?
Gerber, Nina; Zimmermann, Verena; Henhapl, Birgit; Emeröz, Sinem; Volkamer, Melanie
International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
Collective Attestation: for a Stronger Security in Embedded Networks
Ibrahim, Ahmad
IEEE
[Conference Proceedings]
The Future of IoT Security: Special Session
Mohan, Sibin; Asplund, Mikael; Bloom, Gedare; Sadeghi, Ahmad-Reza; Ibrahim, Ahmad; Salajageh, Negin; Griffioen, Paul; Sinopoli, Bruno
International Conference on Embedded Software (EMSOFT 2018), 2018
[Conference Proceedings]
Securing Embedded Networks Through Secure Collective Attestation
Ibrahim, Ahmad
Workshop at 16th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2018), 2018
[Conference Proceedings]
One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]
Demo: Linux Goes Apple Picking: Cross-Platform Ad hoc Communication with Apple Wireless Direct Link
Stute, Milan; Kreitschmann, David; Hollick, Matthias
The 24th Annual International Conference on Mobile Computing and Networking (MobiCom '18)
[Conference Proceedings]
The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
[Conference Proceedings]
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
[Conference Proceedings]
Lattice Based Modularization of Static Analyses
Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
[Conference Proceedings]
ELSA: Efficient Long-Term Secure Storage of Large Datasets
Geihs, Matthias; Buchmann, Johannes
Information Security and Cryptology- ICISC 2018, p.269-286
[Conference Proceedings]
Coalition-Resistant Peer Rating for Long-Term Confidentiality
Traverso, Giulia; Butin, Denis; Buchmann, Johannes; Palesandro, Alex
PST 2018 - 16th Annual Conference on Privacy, Security and Trust
[Conference Proceedings]
SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
Scholl, Simon; Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André
Mensch und Computer 2018 Tagungsband, p.443-446
[Conference Proceedings]
From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
Riebe, Thea; Pätsch, Katja; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2018: Workshopband MuC 2018, p.595-603
[Conference Proceedings]
Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel; Bayer, Markus; Hartung, Daniel; Kaygusuz, Cemal
Mensch und Computer 2018: Workshopband MuC 2018, p.623-632
[Conference Proceedings]
5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Geisler, Stefan; Ludwig, Thomas; Pipek, Volkmar; Pottebaum, Jens
Mensch und Computer 2018: Workshopband MuC 2018, p.565-569
[Conference Proceedings]
ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
Reuter, Christian; Backfried, Gerhard; Kaufhold, Marc-André; Spahr, Fabian
ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management, p.445-458
[Conference Proceedings]
112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS 2018)
[Conference Proceedings]
Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; Radziewski, Elmar von
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]
Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]
Advances and Throwbacks in Hardware-assisted Security: Special Session
Brasser, Ferdinand; Davi, Lucas; Dhavlle, Abhijitt; Frassetto, Tommaso; Dinakarrao, Sai Manoj Pudukotai; Rafatirad, Setareh; Sadeghi, Ahmad-Reza; Sasan, Avesta; Sayadi, Hossein; Zeitouni, Shaza; Homayoun, Houman
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
[Conference Proceedings]
Efficient Circuit-based PSI via Cuckoo Hashing
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
37. Advances in Cryptology -- EUROCRYPT 2018
[Conference Proceedings]
Invited: Reconciling Remote Attestation and Safety-Critical
Operation on Simple IoT Devices
Carpent, Xavier; Eldefrawy, Karim; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
Design Automation Conference
[Conference Proceedings]
A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, p.340-350
[Conference Proceedings]
Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
crypto day matters: Beiträge vom 29. Kryptotag
[Conference Proceedings]
General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.949-966
[Conference Proceedings]
FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
[Conference Proceedings]
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
[Conference Proceedings]
Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
Proceedings: 21st IEEE International Conference on Computational Science and Engineering: CSE 2018
[Conference Proceedings]
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF), p.76-90
[Conference Proceedings]