Publikationen
Publikationen
A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules
Huss, Sorin; Stein, Oliver
Journal of Low Power Electronics and Applications
[Journal Article]
Execution Integrity with In-Place Encryption
Sullivan, Dean; Arias, Orlando; Gens, David; Davi, Lucas; Sadeghi, Ahmad-Reza; Jin, Yier
CoRR
[Journal Article]
Das Privacy-Paradoxon – Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, Paul; Volkamer, Melanie; Gerber, Nina
Dialogmarketing Perspektiven 2016/2017, p.139-167
A Framework to Select Parameters for Lattice-Based Cryptography
Alkeilani Alkadri, Nabil; Buchmann, Johannes; Bansarkhani, Rachid El; Krämer, Juliane
Cryptology ePrint Archive, p.1-37
[Journal Article]
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]
ID2T - The Intrusion Detection Dataset Generation Toolkit
Garcia Cordero, Carlos; Vasilomanolakis, Emmanouil; Mühlhäuser, Max
Black Hat Europe 2017
[Conference Proceedings]
Measuring privacy in high dimensional microdata collections
Boukoros, Spyros; Katzenbeisser, Stefan
Proceedings of the 12th International Conference on Availability, Reliability and Security
[Conference Proceedings]
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
Yalame, Mohammad Hossein; Farzam, Mohammad Hossein; Sarmadi, Siavash Bayat
8. International Conference on Applications and Techniques in Information Security (ATIS'17)
[Conference Proceedings]
Enriched Nudges Lead to Stronger Password Replacements … but Implement Mindfully
Renaud, Karen; Zimmermann, Verena
Proceedings of the 2017 Information Security for South Africa (ISSA) Conference, p.1-9
[Conference Proceedings]
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, Verena; Gerber, Nina
Human Aspects of Information Security, Privacy and Trust, p.265-283
[Conference Proceedings]
Lessons Learned from Evaluating Eight Password Nudges in the Wild
Renaud, Karen; Maguire, Joseph; Zimmermann, Verena; Draper, Steve
Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results, p.25-38
[Conference Proceedings]
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Nyman, Thomas; Dessouky, Ghada; Zeitouni, Shaza; Lehikoinen, Aaro; Paverd, Andrew; Asokan, N.; Sadeghi, Ahmad-Reza
Cryptography and Security
[Journal Article]
Erwartungen der älteren Bevölkerung an IKT für Krisenkommunikation
Wiegärtner, Daniel; Reuter, Christian; Müller, Claudia
Mensch & Computer 2017 - Workshopband, p.609-614
[Conference Proceedings]
DIVOA – Unterstützung der älteren Bevölkerung bei Schadenslagen
Reuter, Christian; Wiegärtner, Daniel; Müller, Claudia
Mensch & Computer 2017: Tagungsband, p.295-298
[Conference Proceedings]
Towards Social Resilience: A Quantitative and Qualitative Survey on Citizens' Perception of Social Media in Emergencies in Europe
Reuter, Christian; Spielhofer, Thomas
Technological Forecasting and Social Change (TFSC), p.168-180
[Journal Article]
Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]
IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study
Reuter, Christian; Pätsch, Katja; Runft, Elena
i-com: Journal of Interactive Media, p.181-195
[Journal Article]
4. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Geisler, Stefan; Herczeg, Michael; Ludwig, Thomas; Pipek, Volkmar; Nestler, Simon
Mensch und Computer 2017 - Workshopband, p.5-8
[Conference Proceedings]
Social Media Resilience during Infrastructure Breakdowns using Mobile Ad-Hoc Networks
Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André; Hupertz, Julian
Advances and New Trends in Environmental Informatics : Stability, Continuity, Innovation, p.75-88
Rumors, Fake News and Social Bots in Conflicts and Emergencies: Towards a Model for Believability in Social Media
Reuter, Christian; Kaufhold, Marc-André; Steinfort, René
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management; ISCRAM 2017, p.583-591
[Conference Proceedings]
Social Media in Emergencies: A Representative Study on Citizens' Perception in Germany
Reuter, Christian; Kaufhold, Marc-André; Spielhofer, Thomas; Hahne, Anna Sophie
Proceedings of the ACM Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing Vol. 1 Issue CSCW, p.1-19
[Journal Article, Conference Proceedings]
Digitalisierung und Zivile Sicherheit: Zivilgesellschaftliche und betriebliche Kontinuität in Katastrophenlagen (KontiKat)
Reuter, Christian; Kaufhold, Marc-André; Schorch, Marén; Gerwinski, Jan; Soost, Christian; Hassan, Sohaib S.; Rusch, Gebhard; Moog, Petra; Pipek, Volkmar; Wulf, Volker
Sicherheit (DIAGONAL Jahrgang 38), p.207-224
End-User Development and Social Big Data - Towards Tailorable Situation Assessment with Social Media
Reuter, Christian; Kaufhold, Marc-André; Ludwig, Thomas
New Perspectives in End-User Development, p.307-332
Katwarn, NINA or FEMA? Multi-Method Study on Distribution, Use and Public Views on Crisis Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Proceedings of the 25th European Conference on Information Systems (ECIS), p.2187-2201
[Conference Proceedings]
Informing the Population: Mobile Warning Apps
Reuter, Christian; Kaufhold, Marc-André; Leopold, Inken; Knipp, Hannah
Risk and Crisis Communication in Disaster Prevention and Management, p.31-41
[Conference Proceedings]
Benutzbare Sicherheit: Usability, Safety und Security bei Passwörtern
Reuter, Christian; Kaufhold, Marc-André; Klös, Jonas
Mensch & Computer: Workshopband, p.33-41
[Conference Proceedings]
Zur Verantwortung der Informatik in einer technologisierten Gesellschaft
Reinhold, Thomas
Sicherheit und Frieden
[Journal Article]
Guest Editorial Preface: Special Issue on IT-Support for Critical Infrastructure Protection
Pottebaum, Jens; Reuter, Christian
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.iv-vii
[Journal Article]
IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
INFORMATIK 2017, p.1281-1282
[Conference Proceedings]
The Role of Technological Infrastructure in Nomadic Practices of a Social Activist Community
Carvalho, Aparecido Fabiano Pinatti de; Saeed, Saqib; Reuter, Christian; Wulf, Volker
International reports on socio-informatics, p.41-47
[Conference Proceedings, Journal Article]