Publikationen

Publikationen

Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications
Javadi, Mohammad; Yalame, Mohammad Hossein; Mahdiani, Hamid Reza
Transactions on Computers
[Journal Article]


Efficient and Scalable Universal Circuits
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas
Journal of Cryptology (JoC)
[Journal Article]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Alber, Gernot; Sauer, Alexander
Cryptography
[Journal Article]


Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
Nikolopoulos, Georgios M.; Fischlin, Marc
Cryptography
[Journal Article]


An Overview of the Botnet Si­mu­la­tion Framework
Böck, Leon; Shankar, Karuppayah; Mühlhäuser, Max; Emmanouil, Vasilomanolakis
The Journal on Cybercrime & Digital Investigations, p.1-10
[Journal Article]


Benefits of formalized computational modeling for understanding user behavior in online privacy research
Schürmann, Tim; Gerber, Nina; Gerber, Paul
Journal of Intellectual Capital, p.431-458
[Journal Article]


Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, Oksana; Gerber, Nina; Hilt, Annika; Volkamer, Melanie
Journal of Cybersecurity
[Journal Article]


Language-Integrated Privacy-Aware Distributed Queries
Salvaneschi, Guido; Köhler, Mirko; Sokolowski, Daniel; Haller, Philipp; Erdweg, Sebastian; Mezini, Mira
Proceedings of the ACM on Programming Languages, p.1-30
[Journal Article]


How to nudge in cyber security
Renaud, Karen; Zimmermann, Verena
Network Security, p.20-20
[Journal Article]


Exploring User Expectations of Proactive AI Systems
Meurisch, Christian; Mihale-Wilson, Cristina; Hawlitschek, Adrian; Giger, Florian; Müller, Florian; Hinz, Oliver; Mühlhäuser, Max
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
[Journal Article]


LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]


Risikokulturen bei der Nutzung Sozialer Medien in Katastrophenlagen
Reuter, Christian; Kaufhold, Marc-André; Schmid, Stefka
BBK Bevölkerungsschutz, p.14-17
[Journal Article]


Rapid relevance classification of social media posts in disasters and emergencies: A system and evaluation featuring active, incremental and online learning
Kaufhold, Marc-André; Bayer, Markus; Reuter, Christian
Information Processing & Management
[Journal Article]


Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala
Weisenburger, Pascal; Salvaneschi, Guido
The Art, Science, and Engineering of Programming, p.17:1-17:29
[Journal Article]


Empirical Insights for Designing Information and Communication Technology for International Disaster Response
Stute, Milan; Maass, Max; Schons, Tom; Kaufhold, Marc-André; Reuter, Christian; Hollick, Matthias
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


Emergency service staff and social media – A comparative empirical study of the attitude by Emergency Services staff in Europe in 2014 and 2017
Reuter, Christian; Kaufhold, Marc-André; Spahr, Fabian; Spielhofer, Thomas; Hahne, Anna Sophie
International Journal of Disaster Risk Reduction (IJDRR)
[Journal Article]


The Tip of the Iceberg: On the Merits of Finding Security Bugs
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
ACM Transactions on Privacy and Security
[Journal Article]


A survey of multitier programming
Salvaneschi, Guido; Wirth, Johannes; Weisenburger, Pascal
ACM Computing Surveys
[Journal Article]


RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies
Stute, Milan; Kohnhäuser, Florian; Baumgärtner, Lars; Almon, Lars; Hollick, Matthias; Katzenbeisser, Stefan; Freisleben, Bernd
Transactions on Dependable and Secure Computing
[Journal Article]


Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation
Nieminen, Raine; Järvinen, Kimmo
IEEE Transactions on Mobile Computing
[Journal Article]


With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design
Dessouky, Ghada; Frassetto, Tommaso; Jauernig, Patrick; Sadeghi, Ahmad-Reza
IEEE Security & Privacy
[Journal Article]


Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators
Stojanovic, Vladimir M.
Physical Review Letters, p.190504
[Journal Article]


Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models
Stojanovic, Vladimir M.
Physical Review B
[Journal Article]


LIDOR: A Lightweight DoS-Resilient Communication Protocol for Safety-Critical IoT Systems
Stute, Milan; Agarwal, Pranay; Kumar, Abhinav; Asadi, Arash; Hollick, Matthias
IEEE Internet of Things Journal, p.6802-6816
[Journal Article]


Trusted Execution Environments: Properties, Applications, and Challenges
Jauernig, Patrick; Sadeghi, Ahmad-Reza; Stapf, Emmanuel
IEEE Security & Privacy, p.56-60
[Journal Article]


Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
Sauer, Alexander; Alber, Gernot
Cryptography, Vol.4
[Journal Article]


Deterministic twirling with low resources
Stonner, David Jakob; Kysela, Jaroslav; Weir, Graeme; Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Physics letters A
[Journal Article]


The password is dead, long live the password – A laboratory study on user perceptions of authentication schemes
Zimmermann, Verena; Gerber, Nina
International Journal of Human-Computer Studies, p.26-44
[Journal Article]


A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems, p.543-546
[Journal Article]


Social media in conflicts and crises
Reuter, Christian; Stieglitz, Stefan; Imran, Muhammad
Behaviour & Information Technology (BIT), p.241-251
[Journal Article]