Publikationen
Publikationen
Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]
User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]
Resilience in Security and Crises through Adaptions and
Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]
Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs
Hassan, Sohaib S.; Reuter, Christian; Bzhalava, Levan
International Journal of Innovation Management
[Journal Article]
Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]
On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Weber, Alexandra; Nikiforov, Oleg; Sauer, Alexander; Schickel, Johannes; Alber, Gernot; Mantel, Heiko; Walther, Thomas
26th European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]
Privacy-preserving density-based clustering
Bozdemir, Beyza; Canard, Sebastian; Ermis, Orhan; Möllering, Helen; Önen, Melek; Schneider, Thomas
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21)
[Conference Proceedings]
Verifying Post-Quantum Signatures in 8kB of RAM
Gonzalez, Ruben; Hülsing, Andreas; Kannwischer, Matthias; Krämer, Juliane; Lange, Tanja; Stöttinger, Marc; Waitz, Elisabeth; Wiggers, Thom; Yang, Bo-Yin
Post-Quantum Cryptography, p.215-233
[Conference Proceedings]
Quantum Indistinguishability for Public Key Encryption
Gagliardoni, Tommaso; Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings
[Conference Proceedings]
FastZIP: faster and more secure zero-interaction pairing
Fomichev, Mikhail; Hesse, Julia; Almon, Lars; Lippert, Timm; Han, Jun; Hollick, Matthias
MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, p.440-452
[Conference Proceedings]
PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021, Online>
[Conference Paper]
Exploring cybersecurity-related emotions and finding that they are challenging to measure
Renaud, Karen; Zimmermann, Verena; Schürmann, Tim; Böhm, Carlos
Humanities and Social Sciences Communications
[Journal Article]
Investigating Simple Privacy Indicators for Supporting Users When Installing New Mobile Apps
Stöver, Alina; Gerber, Nina; Kaushik, Sushma; Mühlhäuser, Max; Marky, Karola
CHI EA'21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems
[Conference Proceedings]
OpenHaystack: A Framework for Tracking Personal Bluetooth Devices via Apple's Massive Find My Network
Heinrich, Alexander; Stute, Milan; Hollick, Matthias
WiSec ’21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.374-376
[Conference Proceedings]
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop
Heinrich, Alexander; Hollick, Matthias; Schneider, Thomas; Stute, Milan; Weinert, Christian
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, p.371-373
[Conference Proceedings]
LLVM-based Circuit Compilation for Practical Secure Computation
Heldmann, Tim; Schneider, Thomas; Tkachenko, Oleksandr; Weinert, Christian; Yalame, Mohammad Hossein
Applied Cryptography and Network Security: Proceedings Part II, p.99-121
[Conference Proceedings]
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation
Keller, Hannah; Möllering, Helen; Schneider, Thomas; Yalame, Mohammad Hossein
18th International Conference on Security and Cryptography (SECRYPT'21)
[Conference Proceedings]
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhauser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
IEEE Transactions on Dependable and Secure Computing
[Journal Article]
Zero-Interaction Security-Towards Sound Experimental Validation
Fomichev, Mikhail; Maass, Max; Hollick, Matthias
GetMobile: Mobile Computing and Communications
[Journal Article]
Attack Surface Assessment for Cybersecurity Engineering in the Automotive Domain
Plappert, Christian; Zelle, Daniel; Gadacz, Henry; Rieke, Roland; Scheuermann, Dirk; Krauß, Christoph
29th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP
[Conference Proceedings]
Secure gate: Secure gateways and wireless sensors as enablers for sustainability in production plants
Bienhaus, Diethelm; Ebner, Andreas; Jäger, Lukas; Rieke, Roland; Krauß, Christoph
Simulation Modelling Practice and Theory, Vol.109, p.9
[Journal Article]
Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte
Zeier, A.; Wiesmaier, A.; Heinemann, A.
Tagungsband zum 17. Deutschen IT-Sicherheitskongress, p.381-391
[Conference Proceedings]
Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview
Bender, Tim; Huesmann, Rolf; Heinemann, Andreas
ARES 2021, SSC Workshop: The 16th International Conference on Availability, Reliability and Security, Virtual Event, August 17-20, 2021
[Conference Proceedings]
On the Generalisation capabilities of Fisher Vector based Face Presentation Attack Detection
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-12
[Journal Article]
On the Generalisation Capabilities of Fingerprint Presentation Attack Detection Methods in the Short Wave Infrared Domain
Kolberg, J.; Gomez-Barrero, M.; Busch, C.
IET Biometrics, p.1-15
[Journal Article]
Makeup Presentation Attack Potential Revisited: Skills Pay the Bills
Drozdowski, P.; Grobarek, S.; Schurse, J.; Rathgeb, C.; Stockhardt, F.; Busch, C.
Intl. Workshop on Biometrics and Forensics (IWBF), p.1-6
[Conference Proceedings]
Local Feature Encoding for Unknown Presentation Attack Detection: An Analysis of Different Local Feature Descriptors
Gonzalez-Soler, L. J.; Gomez-Barrero, M.; Kolberg, J.; Chang, L.; Perez-Suarez, A.; Busch, C.
IET Biometrics, p.1-13
[Journal Article]
Impact of facial tattoos and paintings on face recognition systems
Ibsen, M.; Rathgeb, C.; Fink, T.; Drozdowski, P.; Busch, C.
IET Biometrics
[Journal Article]