Publikationen
Publikationen
IT in Peace, Conflict, and Security Research
Reuter, Christian; Aldehoff, Larissa; Riebe, Thea; Kaufhold, Marc-André
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.11-37
Vulnerability Assessment in the Smart Farming Infrastructure through Cyberattacks
Linsner, Sebastian; Varma, Rashmi; Reuter, Christian
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]
Cultural Violence and Peace in Social Media
Kaufhold, Marc-André; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.361-381
Potentiale von IKT beim Ausfall kritischer Infrastrukturen: Erwartungen, Informationsgewinnung und Mediennutzung der Zivilbevölkerung in Deutschland
Kaufhold, Marc-André; Grinko, Margarita; Reuter, Christian; Schorch, Marén; Langer, Amanda; Skudelny, Sascha; Hollick, Matthias
Proceedings of the International Conference on Wirtschaftsinformatik
[Conference Proceedings]
TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter
Hartwig, Katrin; Reuter, Christian
Proceedings of the International Conference on Wirtschaftsinformatik (WI)
[Conference Proceedings]
Hybride Dienstleistungen in digitalisierten Kooperationen in der Landwirtschaft
Bernardi, Ansgar; Reuter, Christian; Schneider, Wolfgang; Linsner, Sebastian; Kaufhold, Marc-André
38. GIL-Jahrestagung in Wien: Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen - ein Widerspruch in sich?
[Conference Proceedings]
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions
Heidt, Margareta; Gerlach, Jin; Buxmann, Peter
Hawaii International Conference on System Sciences (HICSS)
[Conference Proceedings]
Dual Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
Riebe, Thea; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.165-183
Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden
[Journal Article]
Behaviour & information technology : Special Issue on Social Media in Conflicts and Crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
[Book]
The Future of Information Technology for Peace and Security
Reuter, Christian; Altmann, Jürgen; Aal, Konstantin; Aldehoff, Larissa; Buchmann, Johannes; Bernhardt, Ute; Denker, Kai; Herrmann, Dominik; Hollick, Matthias; Katzenbeisser, Stefan; Kaufhold, Marc-André; Nordmann, Alfred; Reinhold, Thomas; Riebe, Thea; Ripper, Annette; Ruhmann, Ingo; Saalbach, Klaus-Peter; Schörnig, Niklas; Sunyaev, Ali; Wulf, Volker
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace
Information Technology for Peace and Security - Introduction and Overview
Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.3-9
Verification in Cyberspace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.257-275
From Cyber War to Cyber Peace
Reinhold, Thomas; Reuter, Christian
Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace, p.139-164
Resilient Smart Farming (RSF) – Nutzung digitaler Technologien in krisensicherer Infrastruktur
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel
Informatik in der Land-, Forst- und Ernährungswirtschaft : Digitalisierung für landwirtschaftliche Betriebe in kleinstrukturierten Regionen – ein Widerspruch in sich? Referate der 39. GIL-Jahrestagung, p.177-182
[Conference Proceedings]
SANCTUARY: ARMing TrustZone with User-space Enclaves
Brasser, Ferdinand; Gens, David; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V
Weiser, Samuel; Werner, Mario; Brasser, Ferdinand; Malenko, Maja; Mangard, Stefan; Sadeghi, Ahmad-Reza
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
Nautilus: Fishing for Deep Bugs with Grammars
Aschermann, Cornelius; Frassetto, Tommaso; Holz, Thorsten; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Teuchert, Daniel
26th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]
SoK: Modular and Efficient Private Decision Tree Evaluation
Kiss, Ágnes; Naderpour, Masoud; Liu, Jian; Asokan, N.; Schneider, Thomas
Proceedings on Privacy Enhancing Technologies (PoPETs)
[Journal Article]
RescueGlass: Collaborative Applications involving Head-Mounted Displays for Red Cross Rescue Dog Units
Reuter, Christian; Ludwig, Thomas; Mischur, Patrick
Computer Supported Cooperative Work: The Journal of Collaborative Computing (JCSCW), p.209-246
[Journal Article]
Perun: Virtual Payment Hubs over Cryptocurrencies
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian; Malinowski, Daniel
39th IEEE Symposium on Security and Privacy
[Conference Proceedings]
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead
Asokan, N.; Miettinen, Markus
Computer Communications
[Journal Article]
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
Dessouky, Ghada; Abera, Tigist; Ibrahim, Ahmad; Sadeghi, Ahmad-Reza
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18)
[Conference Proceedings]
A Comparative Study across Static and Dynamic Side-Channel Countermeasures
Dantas, Yuri Gil; Hamann, Tobias; Mantel, Heiko
The 11th International Symposium on Foundations & Practice of Security (FPS)
[Conference Proceedings]
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Degabriele, Jean Paul; Fischlin, Marc
Advances in Cryptology - ASIACRYPT 2018, p.519-550
[Conference Proceedings]
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Kulyk, Oksana; Hilt, Annika; Gerber, Nina; Volkamer, Melanie
3rd European Workshop on Usable Security (EuroUSEC), London, England, April 23, 2018
[Conference Proceedings]
Helping john to make informed decisions on using social login
Karegar, Farzaneh; Gerber, Nina; Volkamer, Melanie; Fischer-Hübner, Simone
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, p.1165-1174
[Conference Proceedings]
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, Marco; Henhapl, Birgit; Gerber, Nina
Mensch und Computer 2018 - Workshopband
[Conference Proceedings]
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
Gerber, Nina; Gerber, Paul; Volkamer, Melanie
Computers & Security, p.226-261
[Journal Article]