Publikationen
Publikationen
iOracle: Automated Evaluation of Access Control Policies in iOS
Deaconescu, Razvan; Carabas, Costin; Manda, Iulia; Enck, William; Chiroiu, Mihai; Li, Ninghui; Sadeghi, Ahmad-Reza
13th ASIA Conference on Information, Computer and Communications Security
[Conference Proceedings]
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
Wunderer, Thomas; Wang, Yuntao
ISPEC 2018
[Conference Proceedings]
Function-Dependent Commitments for Verifiable Multi-Party Computation
Schabhüser, Lucas; Butin, Denis; Demirel, Denise; Buchmann, Johannes
Information Security - 21st International Conference, ISC 2018
[Conference Proceedings]
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18)
[Conference Proceedings]
How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
ESORICS 2018
[Conference Proceedings]
Differential Power Analysis of XMSS and SPHINCS
Kannwischer, Matthias; Genêt, Aymeric; Butin, Denis; Krämer, Juliane; Buchmann, Johannes
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018)
[Conference Proceedings]
Faster Privacy-Preserving Location Proximity Schemes
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
Cryptology and Network Security, p.3-22
[Conference Proceedings]
PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
[Conference Proceedings]
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Fischlin, Marc; Harasser, Patrick
Applied Cryptography and Network Security - ACNS 2018, p.202-220
[Conference Proceedings]
Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy
[Conference Proceedings]
Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
[Conference Proceedings]
Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]
IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
Proceedings of the 27th USENIX Security Symposium, p.83-97
[Conference Proceedings]
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]
VoiceGuard: Secure and Private Speech Processing
Brasser, Ferdinand; Frassetto, Tommaso; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Weinert, Christian
Interspeech 2018
[Conference Proceedings]
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
Büscher, Niklas; Demmler, Daniel; Katzenbeisser, Stefan; Kretzmer, David; Schneider, Thomas
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.847-861
[Conference Proceedings]
Anti-Forensic Capacity and Detection Rating of Hiding Data in the ext4 Filesystem
Göbel, Thomas; Baier, Harald
14th Annual IFIP WG 11.9 International Conference on Digital Forensics
[Conference Proceedings]
Neighbor distance ratios and dynamic weighting in multi-biometric fusion
Damer, Naser; Alkhatib, Wael; Braun, Andreas; Kuijper, Arjan
Iberian Conference on Pattern Recognition and Image Analysis (IbPRIA) 2017
[Conference Paper]
Opportunities for biometric technologies in smart environments
Henniger, Olaf; Damer, Naser; Braun, Andreas
European Conference on Ambient Intelligence (AmI) 2017
[Conference Paper]
Indexing of single and multi-instance iris data based on LSH-forest and rotation invariant representation
Damer, Naser; Terhörst, Philipp; Braun, Andreas; Kuijper, Arjan
International Conference on Computer Analysis of Images and Patterns (CAIP) 2017
[Conference Paper]
Trust the biometric mainstream: Multi-biometric fusion and score coherence
Damer, Naser; Rhaibani, Chadi Izzou; Braun, Andreas; Kuijper, Arjan
European Signal Processing Conference (EUSIPCO) 2017
[Conference Paper]
Talis - a design study for a wearable device to assist people with depression
Siegmund, Dirk; Hörr, Oliver; Chiesa, Laura; Gabler, Frank; Braun, Andreas; Kuijper, Arjan
Annual Computer Software and Applications Conference (COMPSAC) 2017
[Conference Paper]
Towards enhancing the visual analysis of interdomain routing
Ulmer, Alex; Kohlhammer, Jörn; Shulman, Haya
International Joint Conference on Computer Vision and Computer Graphics Theory and Applications (VISIGRAPP) 2017
[Conference Paper]
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER)
Alexopoulos, Nikolaos; Vasilomanolakis, Emmanouil; Ivanko, Natalia Reka; Frieß, Tamara; Mühlhäuser, Max
26th USENIX Security Symposium
[Conference Proceedings]
Constrained PET Composition for Measuring Enforced Privacy
Funke, Sebastian; Wiesmaier, Alexander; Daubert, Jörg
Proceedings of the 12th International Conference on Availability, Reliability and Security, p.1-16
[Conference Proceedings]
On Using TLS to Secure In-Vehicle Networks
Zelle, Daniel; Krauß, Christoph; Strauß, Hubert; Schmidt, Karsten
Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES)
[Conference Proceedings]
Runtime Firmware Product Lines using TPM2.0
Fuchs, Andreas; Krauß, Christoph; Repp, Jürgen
Proceedings of the 32th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
[Conference Proceedings]
A Privacy-aware Data Access System for Automotive Applications
Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Lange, Benjamin; Mauthofer, Sebastian; Walter, Jonas; Abendroth, Bettina; Robrahn, Rasmus; von Pape, Thilo; Decke, Hendrik
15th Embedded Security in Cars (escar)
[Conference Proceedings]
Design and Implementation Aspects of Mobile Derived Identities
Träder, Daniel; Zeier, Alexander; Heinemann, Andreas
Open Identity Summit, p.147-152
[Conference Proceedings]