Publikationen

Publikationen

U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance
Riebe, Thea; Kuehn, Philipp; Imperatori, Philipp; Reuter, Christian
European Journal for Security Research, p.39-65
[Journal Article]


Zur Schnittmenge von Informatik mit Friedens- und Sicherheitsforschung: Erfahrungen aus der interdisziplinären Lehre in der Friedensinformatik
Reuter, Christian; Riebe, Thea; Haunschild, Jasmin; Reinhold, Thomas; Schmid, Stefka
Zeitschrift für Friedens- und Konfliktforschung, p.129-140
[Journal Article]


Using Digitally Mediated Methods in Sensitive Contexts: A Threat Analysis and Critical Reflection on Security, Privacy, and Ethical Concerns in the Case of Afghanistan
Guntrum, Laura Gianna; Güldenring, Benjamin; Kuntke, Franz; Reuter, Christian
Zeitschrift für Friedens- und Konfliktforschung, p.95-128
[Journal Article]


Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations
Hartwig, Katrin; Reuter, Christian
Behaviour & Information Technology, p.1357-1380
[Journal Article]


Resilience in Agriculture: Communication and Energy Infrastructure Dependencies of German Farmers
Kuntke, Franz; Linsner, Sebastian; Steinbrink, Enno; Franken, Jonas; Reuter, Christian
International Journal of Disaster Risk Science, p.214-229
[Journal Article]


Remotely Accessing the Field and Building Trust with Distant Sources. Perspectives from Journalism Practice for Ethnographic Research
Guntrum, Laura Gianna; Keßler, Mira; Patel, Jignesh; Varfolomeeva, Anna
Global Media Journal - German Edition
[Journal Article]


Book Review: Artificial Intelligence and The Future of Warfare: The USA China and Strategic Stability. Johnson,J. Manchester: University Press. (2021)
Reinhold, Thomas; Reuter, Christian
Zeitschrift für Außen- und Sicherheitspolitik, p.353-355
[Journal Article]


Mensch und Computer 2022: Facing Realities - Tagungsband
[Conference Proceedings]


A European Perspective on Crisis Informatics: Citizens‘ and Authorities‘ Attitudes Towards Social Media for Public Safety and Security
Reuter, Christian
[Book]


Für eine umfassende, globale und aktive Abrüstungs- und Rüstungskontrollpolitik
Meier, Oliver; Brzoska, Michael; Ferl, Anna-Katharina; Hach, Sascha; Bayer, Markus; Mutschler, Max; Prem, Berenike; Reinhold, Thomas; Schmid, Stefka; Schwarz, Matthias
[Report]


Conference Proceedings : Science, Peace, Security '21 : The Impact of new Technologies: Destabilizing or Enabling Resilience? : 8-10 September 2021
Göttsche, Malte; Bauer, Sibylle; Dahlmann, Anja; Frieß, Friederike; Lentzos, Filippa; Neuneck, Götz; Niemeyer, Irmgard; Riebe, Thea; Silomon, Jantje; Reuter, Christian; Brochhaus, Jakob; Rademacher, Lukas
[Conference Proceedings]


The Digital Divide in State Vulnerability to Submarine Communications Cable Failure
Franken, Jonas; Reinhold, Thomas; Reichert, Lilian; Reuter, Christian
International Journal of Critical Infrastructure Protection
[Journal Article]


CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain
Bayer, Markus; Kuehn, Philipp; Shanehsaz, Ramin; Reuter, Christian
[Report]


Clustering of Threat Information to Mitigate Information Overload for Computer Emergency Response Teams
Kuehn, Philipp; Kerk, Moritz; Wendelborn, Marc; Reuter, Christian
[Report]


Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users’ daily lives
Bekaert, Paul; Alotaibi, Norah; Mathis, Florian; Gerber, Nina; Rafferty, Aidan Christopher; Khamis, Mohamed; Marky, Karola
Proceedings of the 12th Nordic Conference on Human-Computer Interaction, p.1-9
[Conference Proceedings]


Website operators are not the enemy either - Analyzing options for creating cookie consent notices without dark patterns
Stöver, Alina; Gerber, Nina; Cornel, Christin; Henz, Mona; Marky, Karola; Zimmermann, Verena; Vogt, Joachim
Mensch und Computer 2022 - Workshopband
[Conference Proceedings]


Autonomous Driving - Analysing the Impact of Resilience Engineering Features in Smart Car Interfaces
Pasnicu, Otilia; Zmmermann, Verena; Gerber, Nina; Cardoso, Sarah
Mensch und Computer 2022: Facing Realities - Tagungsband, p.545-549
[Conference Proceedings]


You offer privacy like you offer tea: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households
Marky, Karola; Gerber, Nina; Pelzer, Michelle Gabriela; Khamis, Mohamed; Mühlhäuser, Max
Proceedings on Privacy Enhancing Technologies (PoPETs), p.400-420
[Journal Article]


Nostradamus Goes Quantum
Benedikt, Barbara Jiabao; Fischlin, Marc; Huppert, Moritz
Advances in Cryptology - ASIACRYPT 2022, p.583-613
[Conference Proceedings]


Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels
Degabriele, Jean Paul; Karadžić, Vukašin
Advances in Cryptology - CRYPTO 2022, p.264-295
[Conference Proceedings]


On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography, p.286-306
[Conference Proceedings]


A Random Oracle for All of Us
Fischlin, Marc; Rohrbach, Felix; Schmalz, Tobias
Progress in Cryptology - AFRICACRYPT 2022, p.469-489
[Conference Proceedings]


Processing of botnet tracking data under the GDPR
Böck, Leon; Fejrskov, Martin; Demetzou, Katerina; Karuppayah, Shankar; Mühlhäuser, Max; Vasilomanolakis, Emmanouil
Computer law & security review
[Journal Article]


VirTEE: a full backward-compatible TEE with native live migration and secure I/O
Wang, Jianqiang; Mahmoody, Pouya; Brasser, Ferdinand; Jauernig, Patrick; Sadeghi, Ahmad-Reza; Yu, Donghui; Pan, Dahan; Zhang, Yuanyuan
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.241-246
[Conference Proceedings]


Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing
Chen, Chen; Kande, Rahul; Mahmoody, Pouya; Sadeghi, Ahmad-Reza; Rajendran, JV
DAC'22: Proceedings of the 59th ACM/IEEE Design Automation Conference, p.1379-1383
[Conference Proceedings]


PEA: Practical private epistasis analysis using MPC
Hamacher, Kay; Kussel, Tobias; Schneider, Thomas; Tkachenko, Oleksandr
Computer Security - ESORICS 2022, p.320-339
[Conference Proceedings]


POSTER: MPClan: Protocol suite for privacy-conscious computations
Kotila, Nishat; Patil, Shravani; Patra, Arpita; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3379-3381
[Conference Proceedings]


Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs
Günther, Daniel; Holz, Marco; Judkewitz, Benjamin; Möllering, Helen; Pinkas, Benny; Schneider, Thomas; Suresh, Ajith
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3351-3353
[Conference Proceedings]


Poster: Efficient Three-Party Shuffling Using Precomputation
Brüggemann, Andreas; Schneider, Thomas; Suresh, Ajith; Yalame, Hossein
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, p.3331-3333
[Conference Proceedings]


Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter
Reuter, Christian; Pätsch, Katja; Runft, Elena
Proceedings der 13. Internationalen Tagung Wirtschaftsinformatik (WI 2017), p.649-663
[Conference Proceedings]