Publikationen

Publikationen

The Influence of SME Constraints in an Organizational IT Security Context
Heidt, Margareta; Gerlach, Jin
International Conference on Information Systems (ICIS), 13.-16.12.2018, San Francisco, USA.
[Conference Proceedings]


Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java
Reif, Michael; Eichberg, Michael; Kübler, Florian; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.107-112
[Conference Proceedings]


Lattice Based Modularization of Static Analyses
Eichberg, Michael; Kübler, Florian; Helm, Dominik; Reif, Michael; Salvaneschi, Guido; Mezini, Mira
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, p.113-118
[Conference Proceedings]


ELSA: Efficient Long-Term Secure Storage of Large Datasets
Geihs, Matthias; Buchmann, Johannes
Information Security and Cryptology- ICISC 2018, p.269-286
[Conference Proceedings]


Coalition-Resistant Peer Rating for Long-Term Confidentiality
Traverso, Giulia; Butin, Denis; Buchmann, Johannes; Palesandro, Alex
PST 2018 - 16th Annual Conference on Privacy, Security and Trust
[Conference Proceedings]


SocialML: EUD im Maschine Learning zur Analyse sozialer Medien
Scholl, Simon; Reuter, Christian; Ludwig, Thomas; Kaufhold, Marc-André
Mensch und Computer 2018 Tagungsband, p.443-446
[Conference Proceedings]


From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse
Riebe, Thea; Pätsch, Katja; Kaufhold, Marc-André; Reuter, Christian
Mensch und Computer 2018: Workshopband MuC 2018, p.595-603
[Conference Proceedings]


Resiliente Digitalisierung der kritischen Infrastruktur Landwirtschaft - mobil, dezentral, ausfallsicher
Reuter, Christian; Schneider, Wolfgang; Eberz, Daniel; Bayer, Markus; Hartung, Daniel; Kaygusuz, Cemal
Mensch und Computer 2018: Workshopband MuC 2018, p.623-632
[Conference Proceedings]


5. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Geisler, Stefan; Ludwig, Thomas; Pipek, Volkmar; Pottebaum, Jens
Mensch und Computer 2018: Workshopband MuC 2018, p.565-569
[Conference Proceedings]


ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
Reuter, Christian; Backfried, Gerhard; Kaufhold, Marc-André; Spahr, Fabian
ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management, p.445-458
[Conference Proceedings]


112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS 2018)
[Conference Proceedings]


Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; Radziewski, Elmar von
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]


Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]


Advances and Throwbacks in Hardware-assisted Security: Special Session
Brasser, Ferdinand; Davi, Lucas; Dhavlle, Abhijitt; Frassetto, Tommaso; Dinakarrao, Sai Manoj Pudukotai; Rafatirad, Setareh; Sadeghi, Ahmad-Reza; Sasan, Avesta; Sayadi, Hossein; Zeitouni, Shaza; Homayoun, Houman
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
[Conference Proceedings]


Efficient Circuit-based PSI via Cuckoo Hashing
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
37. Advances in Cryptology -- EUROCRYPT 2018
[Conference Proceedings]


Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices
Carpent, Xavier; Eldefrawy, Karim; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
Design Automation Conference
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, p.340-350
[Conference Proceedings]


Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
crypto day matters: Beiträge vom 29. Kryptotag
[Conference Proceedings]


General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.949-966
[Conference Proceedings]


FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
[Conference Proceedings]


Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
[Conference Proceedings]


Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
Proceedings: 21st IEEE International Conference on Computational Science and Engineering: CSE 2018
[Conference Proceedings]


Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF), p.76-90
[Conference Proceedings]


Call Graph Construction for Java Libraries
Reif, Michael; Eichberg, Michael; Mezini, Mira
Software Engineering und Software Management 2018
[Conference Proceedings]


A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices
Steinmetzer, Daniel; Wegemer, Daniel; Hollick, Matthias
3rd NSF Millimeter-Wave RCN Workshop
[Conference Proceedings]


Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices
Palacios, Joan; Steinmetzer, Daniel; Loch, Adrian; Hollick, Matthias; Widmer, Joerg
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking
[Conference Proceedings]


Private Function Evaluation with Universal Circuits
Günther, Daniel
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
[Conference Proceedings]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
32nd European Conference on Object-Oriented Programming (ECOOP 2018), p.10:1-10:27
[Conference Proceedings]


Privacy-Preserving Genomics on a Large Scale
Tkachenko, Oleksandr
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
[Conference Proceedings]


Path MTU Discovery Considered Harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems
[Conference Proceedings]