Publikationen

Publikationen

EventBreak: Analyzing the Responsiveness of User Interfaces through Performance-Guided Test Generation
Pradel, Michael; Schuh, Parker; Necula, George; Sen, Koushik
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.33-47
[Conference Proceedings]


Pretty Understandable Democracy 2.0
Neumann, Stephan; Feier, Christian; Sahin, Perihan; Fach, Sebastian
6th International Conference on Electronic Voting (EVOTE), p.69 - 72
[Conference Proceedings]


i3QL: Language-Integrated Live Data Views
Mitschke, Ralf; Erdweg, Sebastian; Köhler, Mirko; Mezini, Mira; Salvaneschi, Guido
Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, p.417-432
[Conference Proceedings]


Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, Oksana; Feier, Christian; Köster, Thorben
6th International Conference on Electronic Voting - EVOTE 2014, p.1-10
[Conference Proceedings]


The Cubic Simple Matrix Encryption Scheme
Ding, Jintai; Petzoldt, Albrecht; Wang, Lih-Chung
PQCrypto 2014, p.76-87
[Conference Proceedings]


A Multi-Party Protocol for Privacy-Preserving Cooperative Linear System of Equations
Dagdelen, Özgür; Venturi, Daniele
BalkancryptSec 2014 - International Conference on Cryptography and Information security, p.161-172
[Conference Proceedings]


Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, Jurlind; Renaud, Karen; Volkamer, Melanie; Woide, Marcel
6th International Conference on Electronic Voting (EVOTE), p.1 - 8
[Conference Proceedings]


Nearest Planes in Practice
Buchmann, Johannes; Bischof, Christian; Dagdelen, Özgür; Fitzpatrick, Robert; Göpfert, Florian; Mariano, Artur
International Conference on Cryptography and Information security -BalkanCryptSec 2014
[Conference Proceedings]


Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication
Braun, Johannes
IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session)
[Conference Proceedings]


Poster: On the Resilience of DNS Infrastructure
Shulman, Haya; Ezra, Shiran
ACM Conference on Computer and Communications Security (ACM CCS)
[Conference Proceedings]


What Deters Jane from Preventing Identification and Tracking on the Web?
Shirazi, Fatemeh; Volkamer, Melanie
13th ACM Workshop on Privacy in the Electronic Society (WPES 2014), p.107-116
[Conference Proceedings]


Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
Miettinen, Markus; Asokan, N.; Nguyen, Thien Duc; Sadeghi, Ahmad-Reza; Sobhani, Majid
Proc. ACM Conference on Computer and Communications Security
[Conference Proceedings]


Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM
Karvelas, Nikolaos; Peter, Andreas; Katzenbeisser, Stefan; Tews, Erik; Hamacher, Kay
Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, p.25-35
[Conference Proceedings]


SAML Privacy-Enhancing Profile
Horsch, Moritz; Tuengerthal, Max; Wich, Tobias
Open Identity Summit 2014, p.11-22
[Conference Proceedings]


HbbTV – aktueller Stand 2014
Ghiglieri, Marco
FKT - Die Fachzeitschrift für Fernsehen, Film und elektronische Medien
[Conference Proceedings]


RAID-PIR: Practical Multi-Server PIR
Demmler, Daniel; Herzberg, Amir; Schneider, Thomas
6. ACM Cloud Computing Security Workshop (CCSW'14)
[Conference Proceedings]


From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
Araujo, Frederico; Hamlen, Kevin; Biedermann, Sebastian; Katzenbeisser, Stefan
Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, p.942-953
[Conference Proceedings]


An efficient time-stamping solution for long-term digital archiving
Vigil, Martín; Weinert, Christian; Demirel, Denise; Buchmann, Johannes
IEEE 33rd International Performance Computing and Communications Conference (IPCCC), p.1-8
[Conference Proceedings]


Authentication Schemes - Comparison and Effective Password Spaces
Mayer, Peter; Volkamer, Melanie; Kauer, Michaela
Information Systems Security, p.204--225
[Conference Proceedings]


Less is More: Cipher-Suite Negotiation for DNSSEC
Herzberg, Amir; Shulman, Haya; Crispo, Bruno
Computer Security Applications Conference (ACM ACSAC)
[Conference Proceedings]


DNS Authentication as a Service: Preventing Amplifikation Attacks
Herzberg, Amir; Shulman, Haya
30th Annual Computer Security Applications Conference, p.356-365
[Conference Proceedings]


Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation
Günther, Felix; Manulis, Mark; Peter, Andreas
Cryptology and Network Security (13th International Conference, CANS 2014), p.321-336
[Conference Proceedings]


Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
Fischlin, Marc; Günther, Felix
CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p.12
[Conference Proceedings]


Positive but skeptical - A study of attitudes towards Internet voting in Sweden
Faraon, Montathar; Stenberg, Georg J. H.; Budurushi, Jurlind; Kaipainen, Mauri
CeDEM Asia 2014: Proceedings of the International Conference for E-Democracy and Open Government, p.191-205
[Conference Proceedings]


Fast, Expressive Top-k Matching
Culhane, William; Jayaram, K. R.; Eugster, Patrick
Proceedings of the 15th International Middleware Conference, p.73-84
[Conference Proceedings]


Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Brzuska, Christina; Mittelbach, Arno
Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings., p.142-161
[Conference Proceedings]


Hot-Hardening: Getting More Out of Your Security Settings
Biedermann, Sebastian; Katzenbeisser, Stefan; Szefer, Jakub
Proceedings of the 30th Annual Computer Security Applications Conference, p.6-15
[Conference Proceedings]


Automatic Protocol Selection in Secure Two-Party Computations
Kerschbaum, Florian; Schneider, Thomas; Schröpfer, Axel
20th Network and Distributed System Security Symposium (NDSS'13)
[Conference Proceedings]


Poster: Content and Context for Browser Warnings - Achieving Security using Cartoons and Humor
Northrop, Erik; Lipford, Heather Richter; Bartsch, Steffen; Volkamer, Melanie
[Conference Proceedings]


Poster: On the Usability of Secure GUIs
Nas, Aysegül; Filyanov, Atanas; Volkamer, Melanie; Winandy, Marcel
[Conference Proceedings]