Publikationen

Publikationen

On Message-based Consensus and Network Coding
Braun, M.; Wiesmaier, A.; Alnahawi, N.; Geißler, J.
NoF 2021 —- 12th International Conference on Network of the Future
[Conference Proceedings]


On the State of Post-Quantum Cryptography Migration
Alnahawi, N.; Wiesmaier, A.; Graßmeyer, T.; Geißler, J.; Zeier, A.; Bauspieß, P.; Heinemann, A.
INFORMATIK 21 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


Microgrid Systems: Towards a Technical Performance Assessment Frame
Marchand, Sophie; Monsalve, Cristian; Reimann, Thorsten; Heckmann, Wolfram; Ungerland, Jakob; Lauer, Hagen; Ruhe, Stephan; Krauß, Christoph
Energies, Vol.14, p.23
[Journal Article]


Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods
Zelle, Daniel; Lauser, Timm; Kern, Dustin; Krauß, Christoph
The 16th International Conference on Availability, Reliability and Security, ARES
[Conference Proceedings]


Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Chevalier, Yannick; Fenzl, Florian; Kolomeets, Maxim; Rieke, Roland; Chechulin, Andrey; Krauß, Christoph
Informatics and Automation, Vol.20, p.845-868
[Journal Article]


Implementing a Security Architecture for Safety-Critical Railway Infrastructure
Eckel, Michael; Kuzhiyelil, Don; Krauß, Christoph; Zhdanova, Maria; Katzenbeisser, Stefan; Cosic, Jasmin; Drodt, Matthias; Pitrolle, Jean-Jacques
International Symposium on Secure and Private Execution Environment Design (SEED), p.215-226
[Conference Proceedings]


Analysis of E-Mobility-Based Threats to Power Grid Resilience
Kern, Dustin; Krauß, Christoph
Computer Science in Cars Symposium
[Conference Proceedings]


Hornung/Schallbruch (Hrsg.): IT-Sicherheitsrecht. Praxishandbuch.
Margraf, Marian; Heinemann, Andreas
[Book Article]


On the State of Post-Quantum Cryptography Migration
Alnahawi, Nouri; Grasmeyer, Alexander WiesmaierAND Tobias; Geißler, Julian; Zeier, Alexander; Bauspieß, Pia; Heinemann, Andreas
INFORMATIK 2021 —- PQKP-Workshop, p.907-941
[Conference Proceedings]


It is not as simple as that: Playing out password security trainings in order to nudge password changes
Sterk, Fabian; Heinemann, Andreas
EICC 21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021, p.20-25
[Conference Proceedings]


The Exact Security of BIP32 Wallets
Das, Poulami; Erwig, Andreas; Faust, Sebastian; Loss, Julian; Riahi, Siavash
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.1020-1042
[Conference Proceedings]


Evaluating a Smart Car Interface in Terms of Usability, User Experience and User Acceptance
Avramidis, Mario; Kellner, Christiane; Staudt, Josephine; Zimmermann, Verena; Gerber, Nina
i-com, p.161-175
[Conference Proceedings]


Taking on driving tasks yourself? That was yesterday! How drivers would like to be supported by assistance systems
Zankel, Lisa Marie; Gerber, Paul; Zimmermann, Verena; Gerber, Nina
Adjunct Proceedings: 13th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, p.71-76
[Conference Proceedings]


Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
Brendel, Jacqueline; Fiedler, Rune; Günther, Felix; Janson, Christian; Stebila, Douglas
[Report]


On Derandomizing Yao’s Weak-to-Strong OWF Construction
Brzuska, Christina; Couteau, Geoffrey; Karanko, Phila; Rohrbach, Felix
Theory of Cryptography, p.429-456
[Conference Proceedings]


RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints
Surminski, Sebastian; Niesler, Christian; Brasser, Ferdinand; Davi, Lucas; Sadeghi, Ahmad-Reza
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, p.2890-2905
[Conference Proceedings]


IT-Rettung 2017: IT-Unterstützung in Emergency Management & Response
Pottebaum, Jens; Erfurth, Christian; Reuter, Christian
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1281-1282
[Conference Proceedings]


Social Media Analytics: Eine Marktstudie im Krisenmanagement
Kaufhold, Marc-André; Reuter, Christian; Ludwig, Thomas; Scholl, Simon
Informatik 2017 : 25.- 29. September 2017 Chemnitz, p.1325-1338
[Conference Proceedings]


User-Centered Design of Visualizations for Software Vulnerability Reports
Reynolds, Steven Lamarr; Mertz, Tobias; Arzt, Steven; Kohlhammer, Jörn
Symposium on Visualization for Cyber Security (VizSec) 18, 2021, Online>
[Conference Paper]


Resilience in Security and Crises through Adaptions and Transitions
Kalle, Timo; Kaufhold, Marc-André; Kuntke, Franz; Reuter, Christian; Rizk, Amr; Steinmetz, Ralf
50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft : Workshopbeiträge der 49. Jahrestagung der Gesellschaft für Informatik, p.571-584
[Conference Proceedings]


Perception or capability? - An empirical investigation of the factors influencing the adoption of social media and public cloud in German SMEs
Hassan, Sohaib S.; Reuter, Christian; Bzhalava, Levan
International Journal of Innovation Management
[Journal Article]


Python Crypto Misuses in the Wild
Wickert, Anna-Katharina; Baumgärtner, Lars; Breitfelder, Florian; Mezini, Mira
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21)
[Conference Proceedings]


On Security Guidelines and Policy Compliance: Considering Users’ Need for Autonomy
Olt, Christian M.; große Deters, Fenne
[Conference Proceedings]


SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation
Patra, Arpita; Schneider, Thomas; Suresh, Ajith; Yalame, Mohammad Hossein
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
[Conference Proceedings]


Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography
Weber, Alexandra; Nikiforov, Oleg; Sauer, Alexander; Schickel, Johannes; Alber, Gernot; Mantel, Heiko; Walther, Thomas
26th European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]


Privacy-preserving density-based clustering
Bozdemir, Beyza; Canard, Sebastian; Ermis, Orhan; Möllering, Helen; Önen, Melek; Schneider, Thomas
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21)
[Conference Proceedings]


Verifying Post-Quantum Signatures in 8kB of RAM
Gonzalez, Ruben; Hülsing, Andreas; Kannwischer, Matthias; Krämer, Juliane; Lange, Tanja; Stöttinger, Marc; Waitz, Elisabeth; Wiggers, Thom; Yang, Bo-Yin
Post-Quantum Cryptography, p.215-233
[Conference Proceedings]


Quantum Indistinguishability for Public Key Encryption
Gagliardoni, Tommaso; Krämer, Juliane; Struck, Patrick
Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings
[Conference Proceedings]


FastZIP: faster and more secure zero-interaction pairing
Fomichev, Mikhail; Hesse, Julia; Almon, Lars; Lippert, Timm; Han, Jun; Hollick, Matthias
MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, p.440-452
[Conference Proceedings]


PrivInferVis: Towards Enhancing Transparency over Attribute Inference in Online Social Networks
Simo, Hervais; Shulman, Haya; Schufrin, Marija; Reynolds, Steven Lamarr; Kohlhammer, Jörn
Conference on Computer Communications (INFOCOM) 2021, Online>
[Conference Paper]