Publikationen

Publikationen

ISCRAM turns 15: A Trend Analysis of Social Media Papers 2004-2017
Reuter, Christian; Backfried, Gerhard; Kaufhold, Marc-André; Spahr, Fabian
ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management, p.445-458
[Conference Proceedings]


Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion
Reuter, Christian; Aal, Konstantin; Beham, Frank; Boden, Alexander; Brauner, Florian; Ludwig, Thomas; Lukosch, Stephan; Fiedrich, Frank; Fuchs-Kittowski, Frank; Geisler, Stefan; Gennen, Klaus; Herrmann, Dominik; Kaufhold, Marc-André; Klafft, Michael; Lipprandt, Myriam; Lo Iacono, Luigi; Pipek, Volkmar; Pottebaum, Jens; Mentler, Tilo; Nestler, Simon; Stieglitz, Stefan; Sturm, Christian; Rusch, Gebhard; Sackmann, Stefan; Volkamer, Melanie; Wulf, Volker
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.621-630


Sicherheitskritische Mensch-Computer-Interaktion – Einleitung und überblick
Reuter, Christian
Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement, p.3-14


IANUS am FiF und darüber hinaus: Die Bedeutung natur- und ingenieurwissenschaftlicher Friedensforschung für die TU Darmstadt
Nordmann, Alfred; Reuter, Christian; Lederer, Markus
10 Jahre Forum interdisziplinäre Forschung an der TU Darmstadt


112.SOCIAL: Design and Evaluation of a Mobile Crisis App for Bidirectional Communication between Emergency Services and Citizen
Kaufhold, Marc-André; Rupp, Nicola; Reuter, Christian; Amelunxen, Christoph; Cristaldi, Massimo
Proceedings of the European Conference on Information Systems (ECIS 2018)
[Conference Proceedings]


Business Continuity Management in Micro Enterprises: Perception, Strategies and Use of ICT
Kaufhold, Marc-André; Riebe, Thea; Reuter, Christian; Hester, Julian; Jeske, Danny; Knüver, Lisa; Richert, Viktoria
International Journal of Information Systems for Crisis Response and Management (IJISCRAM), p.1-19
[Journal Article]


Design eines BCM-Dashboards für kleine und mittlere Unternehmen
Kaufhold, Marc-André; Reuter, Christian; Riebe, Thea; Radziewski, Elmar von
Mensch und Computer 2018: Workshopband, p.579-586
[Conference Proceedings]


Interaktionsdesign eines Risiko-Bewertungskonzepts für KMU
Kaufhold, Marc-André; Reuter, Christian; Ermert, Tobias
Mensch und Computer 2018 Tagungsband, p.309-312
[Conference Proceedings]


Environmental Peacebuilding in the Middle East
Ide, Tobias; Sumer, Vakur; Aldehoff, Larissa
Routledge Handbook of Environmental Conflict and Peacebuilding


Advances and Throwbacks in Hardware-assisted Security: Special Session
Brasser, Ferdinand; Davi, Lucas; Dhavlle, Abhijitt; Frassetto, Tommaso; Dinakarrao, Sai Manoj Pudukotai; Rafatirad, Setareh; Sadeghi, Ahmad-Reza; Sasan, Avesta; Sayadi, Hossein; Zeitouni, Shaza; Homayoun, Houman
Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems
[Conference Proceedings]


International Journal of Human–Computer Interaction : Special Issue: Social Media in Crisis Management


Sicherheitskritische Mensch-Computer-Interaktion: Interaktive Tech­no­logien und Soziale Medien im Krisen- und Sicherheitsmanagement
[Book]


Journal of Contingencies and Crisis Management : Special Issue: Human-Computer-Interaction and Social Media in Safety-Critical Systems


Efficient Circuit-based PSI via Cuckoo Hashing
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
37. Advances in Cryptology -- EUROCRYPT 2018
[Conference Proceedings]


Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices
Carpent, Xavier; Eldefrawy, Karim; Rattanavipanon, Norrathep; Sadeghi, Ahmad-Reza; Tsudik, Gene
Design Automation Conference
[Conference Proceedings]


A unified lattice model and framework for purity analyses
Helm, Dominik; Kübler, Florian; Eichberg, Michael; Reif, Michael; Mezini, Mira
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, p.340-350
[Conference Proceedings]


Examining Leakage of Access Counts in ORAM Constructions
Karvelas, Nikolaos; Treiber, Amos; Katzenbeisser, Stefan
crypto day matters: Beiträge vom 29. Kryptotag
[Conference Proceedings]


General State Channel Networks
Dziembowski, Stefan; Faust, Sebastian; Hostakova, Kristina
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.949-966
[Conference Proceedings]


FairSwap: How to fairly exchange digital goods
Dziembowski, Stefan; Eckey, Lisa; Faust, Sebastian
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
[Conference Proceedings]


Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas; Burger, Michael; Nguyen, Giang Nam
CSE-2018
[Conference Proceedings]


A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
Wunderer, Thomas
Journal of Mathematical Cryptology (JMC)
[Journal Article]


Exploring the Performance Envelope of the LLL Algorithm
Burger, Michael; Bischof, Christian; Calotoiu, Alexandru; Wunderer, Thomas; Wolf, Felix
Proceedings: 21st IEEE International Conference on Computational Science and Engineering: CSE 2018
[Conference Proceedings]


Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Fischlin, Marc; Mazaheri, Sogol
2018 IEEE 31st Computer Security Foundations Symposium (CSF), p.76-90
[Conference Proceedings]


Call Graph Construction for Java Libraries
Reif, Michael; Eichberg, Michael; Mezini, Mira
Software Engineering und Software Management 2018
[Conference Proceedings]


A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices
Steinmetzer, Daniel; Wegemer, Daniel; Hollick, Matthias
3rd NSF Millimeter-Wave RCN Workshop
[Conference Proceedings]


M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Schulz, Steffen; Mühlhäuser, Max
[Report, Journal Article]


Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
[Journal Article]


Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices
Palacios, Joan; Steinmetzer, Daniel; Loch, Adrian; Hollick, Matthias; Widmer, Joerg
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking
[Conference Proceedings]


Private Function Evaluation with Universal Circuits
Günther, Daniel
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag)
[Conference Proceedings]


CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Krüger, Stefan; Späth, Johannes; Ali, Karim; Bodden, Eric; Mezini, Mira
32nd European Conference on Object-Oriented Programming (ECOOP 2018), p.10:1-10:27
[Conference Proceedings]