Publikationen
Publikationen
POSTER: Toward a Secure and Scalable Attestation
Ambrosin, Moreno; Conti, Mauro; Ibrahim, Ahmad; Neven, Gregory; Sadeghi, Ahmad-Reza; Schunter, Matthias
ACM WiSEC 2016
[Conference Proceedings]
Trust Management X
10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016)
[Conference Proceedings]
Dynamic and Verifiable Hierarchical Secret Sharing
Traverso, Giulia; Demirel, Denise; Buchmann, Johannes
9th International Conference on Information Theoretic Security - ICITS 2016
[Conference Proceedings]
Run-time Accessible DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Gabmeyer, Sebastian; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Katzenbeisser, Stefan; Szefer, Jakub
Cryptographic Hardware and Embedded Systems (CHES 2016), p.432-453
[Conference Proceedings]
State Management for Hash-Based Signatures
McGrew, David; Kampanakis, Panos; Fluhrer, Scott; Gazdag, Stefan-Lukas; Butin, Denis; Buchmann, Johannes
3rd International Conference on Research in Security Standardisation (SSR 2016)
[Conference Proceedings]
Capture and Replay: Reproducible Network Experiments in Mininet
Frömmgen, Alexander; Stohr, Denny; Fornoff, Jan; Effelsberg, Wolfgang; Buchmann, Alejandro
SIGCOMM '16 Proceedings of the 2016 ACM SIGCOMM Conference, p.621-622
[Conference Proceedings]
Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Noon, Hon Bin; Shulman, Haya
International Cryptology Conference (CRYPTO)
[Conference Proceedings]
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System
Demirel, Denise; Traverso, Giulia; Krenn, Stephan; Loruenser, Thomas
2016 11th International Conference on Availability, Reliability and Security (ARES), p.88-97
[Conference Proceedings]
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Bindel, Nina; Buchmann, Johannes; Krämer, Juliane
FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography
[Conference Proceedings]
Low-temperature data remanence attacks against intrinsic SRAM PUFs
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Rosenstihl, Markus; Schaller, André; Gabmeyer, Sebastian; Arul, Tolga
[Report]
Spot the phish by checking the pruned URL
Volkamer, Melanie; Renaud, Karen; Gerber, Paul
Information and Computer Security, p.372-385
[Journal Article]
Efficient single-photon absorption by a trapped moving atom
Trautmann, Nils; Alber, Gernot; Leuchs, Gerd
Physical Review A
[Journal Article]
A Survey on Protocols securing the Internet of Things: DTLS, IPSec and IEEE 802.11i
Roepke, Rene; Thraem, Timo; Wagener, Johannes; Wiesmaier, Alexander
[Report]
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, Benjamin; Braun, Kristoffer; Volkamer, Melanie
MuC-Workshop „Usable Security and Privacy“
[Conference Proceedings]
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Mohamed, Mohamed Saied Emam; Bansarkhani, Rachid El; Petzoldt, Albrecht
ISC 2016 - The 19th Information Security Conference, p.426-440
[Conference Proceedings]
ECDSA and QUARTZ in Comparison with RSA
Lieb, Patrick; Schmidt, Markus; Wiesmaier, Alexander
[Report]
Introducing Proxy Voting to Helios
Kulyk, Oksana; Marky, Karola; Neumann, Stephan; Volkamer, Melanie
11th International Conference on Availability, Reliability and Security - ARES 2016, p.98 - 106
[Conference Proceedings]
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
Kohnhäuser, Florian; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016), p.320-338
[Conference Proceedings]
Comparison of two Lightweight Stream Ciphers: MICKEY 2.0 & WG-8
Jattke, Patrick; Senker, Matthias; Wiesmaier, Alexander
[Report]
SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy Issues
Ghiglieri, Marco; Stopczynski, Martin
[Conference Proceedings]
Secure Logging Schemes and Certificate Transparency
Dowling, Benjamin; Günther, Felix; Herath, Udyani; Stebila, Douglas
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]
Comparison of Lightweight Stream Ciphers: MICKEY 2.0, WG-8, Grain and Trivium
Diedrich, Lennart; Jattke, Patrick; Murati, Lulzim; Senker, Matthias; Wiesmaier, Alexander
[Report]
Efficient Third Party Auditing for a Distributed Storage System
Demirel, Denise; Krenn, Stephan; Loruenser, Thomas; Traverso, Giulia
International Conference on Availability, Reliability and Security - ARES 2016
[Conference Proceedings]
Formal Policy-based Provenance Audit
Butin, Denis; Demirel, Denise; Buchmann, Johannes
The 11th International Workshop on Security - IWSEC 2016
[Conference Proceedings]
Compiling Low Depth Circuits for Practical Secure Computation
Buescher, Niklas; Holzer, Andreas; Weber, Alina; Katzenbeisser, Stefan
21st European Symposium on Research in Computer Security (ESORICS 2016)
[Conference Proceedings]
A comparison of block ciphers SIMON, SPECK, and KATAN
Bossert, Andreas; Cooper, Steven; Wiesmaier, Alexander
[Report]
Security aspects and comparison of block ciphers LED and TEA
Appel, Michael; Pauer, Christof; Wiesmaier, Alexander
[Report]
Block ciphers for the IoT - SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared
Appel, Michael; Bossert, Andreas; Cooper, Steven; Kußmaul, Tobias; Löffler, Johannes; Pauer, Christof; Wiesmaier, Alexander
[Report]
Towards effective security assurance for incremental software development - the case of zen cart application,
Ali, Azmzt; Othmane, Lotfi Ben
Proc. of the 11th International Conference on Availabil- ity, Reliability and Security (ARES)
[Conference Proceedings]
On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Vasilomanolakis, Emmanouil; Stahn, Michael; Garcia Cordero, Carlos; Mühlhäuser, Max
IEEE Conference on Communications and Network Security, p.279 - 286
[Conference Proceedings]