Publikationen
Publikationen
TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications
Christin, Delphine; Pons-Sorolla, Daniel Rodriguez; Hollick, Matthias; Kanhere, Salil
International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), p.1-6
[Journal Article]
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, Jurlind; Jöris, Roman; Volkamer, Melanie
Journal of Information Security and Applications, p.1-10
[Journal Article]
Salvaging Indifferentiability in a Multi-stage Setting
Mittelbach, Arno
Advances in Cryptology – EUROCRYPT 2014. 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings., p.603-621
[Conference Proceedings]
Automated analysis of security protocols with global state
Kremer, Steve; Künnemann, Robert
Proceedings of the 2014 IEEE Symposium on Security and Privacy, p.163-178
[Conference Proceedings]
Incorrect HTTPS Certificate Validation in Samsung Smart TVs
Ghiglieri, Marco
[Report]
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, Jurlind; Volkamer, Melanie
International Conference for E-Democracy and Open Government 2014, p.141-152
[Conference Proceedings]
Using Indistinguishability Obfuscation via UCEs
Brzuska, Christina; Mittelbach, Arno
Advances in Cryptology – ASIACRYPT 2014. 20th International Conference on the Theory and Application of Cryptology and Information Security., p.22-141
[Conference Proceedings]
Expert Knowledge for Contextualized Warnings
Bartsch, Steffen; Volkamer, Melanie
[Report]
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT"
Schneider, Matthias; Schneider, Thomas
IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, p.432-440
[Conference Proceedings]
Enhancing a Location-based Recommendation System by Enrichment with Structured Data from the Web
Schmachtenberg, Max; Strufe, Thorsten; Paulheim, Heiko
Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14)
[Conference Proceedings]
ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, Karen; Volkamer, Melanie; Maguire, Joseph
Human Aspects of Information Security, Privacy, and Trust, p.183-194
[Conference Proceedings]
You Can Call But You Can't Hide: Detecting Caller ID Spoofing Attacks
Mustafa, Hossen; Sadeghi, Ahmad-Reza; Schulz, Steffen; Xu, Wenyuan
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
[Conference Proceedings]
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award)
Miettinen, Markus; Heuser, Stephan; Kronz, Wiebke; Sadeghi, Ahmad-Reza; Asokan, N.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Conference Proceedings]
MDoctor: A Mobile Malware Prognosis Application
Lagerspetz, E.; Truong, Hien Thi Thu; Tarkoma, S.; Asokan, N.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, p.201-206
[Conference Proceedings]
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs
Kong, Joonho; Koushanfar, Farinaz; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Wachsmann, Christian
Design Automation Conference (DAC) 2014, p.1-6
[Conference Proceedings]
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, Nina; Bartsch, Steffen; Volkamer, Melanie; Vogt, Joachim
Human Aspects of Information Security, Privacy, and Trust. HAS 2014. Lecture Notes in Computer Science
[Conference Proceedings]
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation
Davi, Lucas; Koeberl, Patrick; Sadeghi, Ahmad-Reza
51st Design Automation Conference (DAC) - Special Session: Trusted Mobile Embedded Computing
[Conference Proceedings]
Paper Audit Trails and Voters' Privacy Concerns
Budurushi, Jurlind; Stockhardt, Simon; Woide, Marcel; Volkamer, Melanie
Human Aspects of Information Security, Privacy and Trust, p.400-409
[Conference Proceedings]
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification
Bringer, Julien; Chabanne, Hervé; Favre, Mélanie; Patey, Alain; Schneider, Thomas; Zohner, Michael
IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, p.187-198
[Conference Proceedings]
CA Trust Management for the Web PKI
Braun, Johannes; Volk, Florian; Classen, Jiska; Buchmann, Johannes; Mühlhäuser, Max
Journal of Computer Security, p.913-959
[Journal Article]
Long Term Confidentiality: a Survey
Braun, Johannes; Buchmann, Johannes; Mullan, Ciaran; Wiesmaier, Alexander
Designs, Codes and Cryptography, p.459-478
[Journal Article]
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes
Arzt, Steven; Bodden, Eric
International Conference on Software Engineering(ICSE) 2014, p.288-298
[Conference Proceedings]
Why doesn't Jane protect her privacy?
Volkamer, Melanie; Renaud, Karen; Renkema-Padmos, Arne
Privacy Enhancing Technologies - 14th International Symposium, PETS, p.244-262
[Conference Proceedings]
An Empirical Study of Injected versus Actual Interface Errors
Suri, Neeraj; Lanzaro, Anna; Natella, Roberto; Winter, Stefan; Cotroneo, Domenico
Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA)
[Conference Proceedings]
Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, Arne; Baum, Jerome; Renaud, Karen; Volkamer, Melanie
Proceedings of the eighth international symposium on human aspects of information security and assurance
[Conference Proceedings]
Citizen Electronic Identities using {TPM} 2.0
Nyman, Thomas; Ekberg, Jan-Erik; Asokan, N.
CoRR, p.37-48
[Journal Article, Conference Proceedings]
The Untapped Potential of Trusted Execution Environments on Mobile Devices
Ekberg, Jan-Erik; Kostiainen, Kari; Asokan, N.
Security Privacy, IEEE, p.29-37
[Journal Article]
Security Analysis of Mobile Two-Factor Authentication Schemes
Dmitrienko, Alexandra; Liebchen, Christopher; Rossow, Christian; Sadeghi, Ahmad-Reza
Intel Technology Journal, ITJ66 Identity, Biometrics, and Authentication Edition
[Journal Article]
A Survey on Tor and I2P
Conrad, Bernd; Shirazi, Fatemeh
Ninth International Conference on Internet Monitoring and Protection (ICIMP2014)
[Conference Proceedings]
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments
Suri, Neeraj; Vateva-Gurova, Tsvetoslava; Luna, Jesus; Pellegrino, Giancarlo
Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT)
[Conference Proceedings]