Publikationen

Publikationen

An Efficient and Secure Coding-based Authenticated Encryption
Meziani, Mohammed; Bansarkhani, Rachid El
7th DPM International Workshop on Data Privacy Management (DPM 2012)
[Conference Proceedings]


The Influence of trustworthiness of website layout on security perception of websites
Kauer, Michaela; Kiesel, Florian; Ueberschaer, Felix; Volkamer, Melanie; Bruder, Ralph
Current Issues in IT Security 2012, p.215-220
[Conference Proceedings]


On the design and implementation of the Open eCard App
Hühnlein, Detlef; Petrautzki, Dirk; Schmölz, Johannes; Wich, Tobias; Horsch, Moritz; Wieland, Thomas; Eichholz, Jan; Wiesmaier, Alexander; Braun, Johannes; Feldmann, Florian; Potzernheim, Simon; Schwenk, Jörg; Kahlo, Christian; Kühne, Andreas; Veit, Heiko
GI SICHERHEIT 2012 Sicherheit - Schutz und Zuverlässigkeit
[Conference Proceedings]


Verteilte Dienstnutzung mit dem neuen Personalausweis
Horsch, Moritz; Braun, Johannes; Wiesmaier, Alexander; Schaaf, Joachim; Baumöller, Claas
D-A-CH Security 2012, 25. - 26. September
[Conference Proceedings]


Integrating Indicators of Trustworthiness into Reputation-Based Trust Models
Hauke, Sascha; Volk, Florian; Habib, Sheikh Mahbub; Mühlhäuser, Max
Proceedings of the 6th International Conference on Trust Management (IFIPTM 2012)
[Conference Proceedings]


An Efficient Lattice-based Secret Sharing Construction
Bansarkhani, Rachid El; Meziani, Mohammed
WISTP - Workshop in Information Security Theory and Practice 2012
[Conference Proceedings]


Robust Resampling Detection in Digital Images
Cuong, N.; Katzenbeisser, Stefan
Conference on Communications and Multimedia Security (CMS 2012), p.3-15
[Conference Proceedings]


How Users Bypass Access Control – and Why: The Impact of Authorization Problems on Individuals and the Organization
Bartsch, Steffen; Sasse, Angela
Proceedings of the 21st European Conference on Information Systems (ECIS 2013)
[Conference Proceedings]


Guiding Decisions on Authorization Policies: A Participatory Approach to Decision Support
Bartsch, Steffen; Sasse, Angela
Proceedings of the 27th Annual ACM Symposium on Applied Computing, p.1502-1507
[Conference Proceedings]


Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption
Armknecht, F.; Katzenbeisser, S.; Peter, A.
International Conference on Cryptology in Africa (AFRICACRYPT 2012), p.234-251
[Conference Proceedings]


Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt
[Conference Proceedings]


Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs
Herrewege, Anthony van; Katzenbeisser, Stefan; Maes, Roel; Peeters, Roel; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Wachsmann, Christian
Financial Cryptography (FC) 2012, p.374-389
[Conference Proceedings]


Softer Smartcards: Usable Cryptographic Tokens with Secure Execution
Schulz, Steffen; Brasser, Ferdinand; Filyanov, Atanas
Financial Cryptography and Data Security (FC)
[Conference Proceedings]


Post-Quantum Signaturverfahren Heute
Hülsing, Andreas; Petzoldt, Albrecht; Schneider, Michael; Yousfi Alaoui, Sidi Mohamed el
22. SIT-Smartcard Workshop 2012
[Conference Proceedings]


MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones
Davi, Lucas; Dmitrienko, Alexandra; Egele, Manuel; Fischer, Thomas; Holz, Thorsten; Hund, Ralf; Nürnberger, Stefan; Sadeghi, Ahmad-Reza
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


Towards Taming Privilege-Escalation Attacks on Android
Bugiel, Sven; Davi, Lucas; Dmitrienko, Alexandra; Fischer, Thomas; Sadeghi, Ahmad-Reza; Shastry, Bhargava
19th Annual Network & Distributed System Security Symposium (NDSS)
[Conference Proceedings]


It is not about the design – it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, Michaela; Pfeiffer, Thomas; Volkamer, Melanie; Theuerling, Heike; Bruder, Ralph
Sicherheit, p.187-198
[Conference Proceedings]


POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC
Das, Amitabh; Kocabaş, Ünal; Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid
Conference on Digital Automation and Test Europe (DATE)
[Conference Proceedings]


Tetherway: A Framework for Tethering Camouflage
Schulz, Steffen; Sadeghi, Ahmad-Reza; Zhdanova, Maria; Xu, Wenyuan; Mustafa, Hossen; Varadharajan, Vijay
Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[Conference Proceedings]


Unsafe Exposure Analysis of Mobile In-App Advertisements
Jiang, Xuxian; Grace, Michael; Sadeghi, Ahmad-Reza; Zhou, Wu
to appear at WiSec
[Conference Proceedings]


Educational Interfaces, Software and Technology: 3rd Workshop on UI Technologies and Educational Pedagogy
Tse, Edward; Marentette, Lynn; Ahmed, Syed Ishtiaque; Thayer, Alex; Huber, Jochen; Kim, Si Jung; Brown, Quincy; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2691-2694
[Conference Proceedings]


Massively distributed authorship of academic papers
Ständer, Marcus
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.11-20
[Conference Proceedings]


EDA for Secure and Dependable Cybercars: Challenges and Opportunities
Seudié, Hervé; Koushanfar, Farinaz; Sadeghi, Ahmad-Reza
ACM/IEEE Design Automation Conference (DAC)
[Conference Proceedings]


C4PS: colors for privacy settings
Paul, Thomas; Stopczynski, Martin; Puscher, Daniel; Volkamer, Melanie; Strufe, Thorsten
Proceedings of the 21st international conference companion on World Wide Web, p.585--586
[Conference Proceedings]


Formal Treatment of Distributed Trust in Electronic Voting
Neumann, Stephan; Volkamer, Melanie
The Seventh International Conference on Internet Monitoring and Protection (ICIMP2012), Vol.ICIMP 2012, The Seventh I, p.30-39
[Conference Proceedings]


Interacting with Videos On Paper-like Displays
Lissermann, Roman; Olberding, Simon; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2579-2584
[Conference Proceedings]


Occlusion-aware Interaction Techniques for Tabletop Systems
Khalilbeigi, Mohammadreza; Schmittat, Patrik; Steimle, Jürgen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2531-2536
[Conference Proceedings]


LightBeam: Nomadic Pico Projector Interaction with Real World Objects
Huber, Jochen; Steimle, Jürgen; Liao, Chunyuan; Liu, Qiong; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2513-2518
[Conference Proceedings]


Toward a Theory of Interaction in Mobile Paper-Digital Ensembles
Heinrichs, Felix; Schreiber, Daniel; Huber, Jochen; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.1897-1900
[Conference Proceedings]


Leveraging the Palm Surface as an Eyes-free TV Remote Control
Dezfuli, Niloofar; Khalilbeigi, Mohammadreza; Huber, Jochen; Müller, Florian; Mühlhäuser, Max
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems, p.2483-2488
[Conference Proceedings]