Publications

Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Language: German
[Journal Article]

Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
Language: English
[Journal Article]

Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und He­raus­for­de­rung­en für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian
Language: German
[Book Article]

Kommunikation als Gefahr: Nutzerreaktion auf Nachrichten mit verdächtigen Links per E-Mail und Facebook
Gassmann, F.; Benenson, Z.; Landwirth, R.
Language: German
[Journal Article]

Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
eprint
Language: English
[Journal Article]

Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
ePrint
Language: English
[Journal Article]

Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation
Günther, Daniel; Kiss, Ágnes; Scheidel, Lukas; Schneider, Thomas
ACM CCS 2019
Language: English
[Conference Proceedings]

Simple Refreshing in the Noisy Leakage Model
Dziembowski, Stefan; Faust, Sebastian; Zebrowski, Karol
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
Language: English
[Conference Proceedings]

Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, Vol.18, p.1-25
Language: English
[Journal Article]

On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, Luca; Damer, Naser; Moseguí Saladié, Alexandra; Rathgeb, Christian; Scherhag, Ulrich; Busch, Christoph; Kirchbuchner, Florian; Uhl, Andreas
International Conference on Image Analysis and Processing (ICIAP) <20, 2019, Trento>
Language: English
[Conference Paper]

A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems
Language: English
[Journal Article]

Secure and Private Function Evaluation with Intel SGX
Felsen, Susanne; Kiss, Ágnes; Schneider, Thomas; Weinert, Christian
CCSW 2019 - The ACM Cloud Computing Security Workshop
Language: English
[Conference Proceedings]

A Formal Treatment of Deterministic Wallets
Das, Poulami; Faust, Sebastian; Loss, Julian
ACM CCS 2019 - Symposium on Computer and Communications Security
Language: English
[Conference Proceedings]

DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC - 35th Annual Computer Security Applications Conference
Language: English
[Conference Proceedings]

Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
Language: English
[Conference Proceedings]

Sponges Resist Leakage: The Case of Authenticated Encryption
Degabriele, Jean Paul; Janson, Christian; Struck, Patrick
ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
Language: English
[Conference Proceedings]

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
Language: English
[Conference Proceedings]

Privacy vs. Security: Privacy Enhancing Technologies in Social Media in Security relevant Situations
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Language: English
[Conference Proceedings]

Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband
Language: German
[Conference Proceedings]

Dual-Use in der IT: Bewertung in der Softwareentwicklung
Riebe, Thea; Reuter, Christian
Wissenschaft & Frieden, p.46-48
Language: German
[Journal Article]

Accessing Dual Use in IT Development
Riebe, Thea; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Language: English
[Conference Proceedings]

Werte und Wertekonflikte in sozialen Medien für die Vernetzung ungebundener Helfer in Krisensituationen – Ein Value-Sensitive Design Ansatz
Riebe, Thea; Langer, Amanda; Kaufhold, Marc-André; Kretschmer, Nina Katharina; Reuter, Christian
Mensch und Computer 2019
Language: German
[Conference Proceedings]

Threat Intelligence Application for Cyber Attribution
Riebe, Thea; Kaufhold, Marc-André; Kumar, Tarun; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Language: English
[Conference Proceedings]

6. Workshop Mensch-Maschine-Interaktion in sicherheitskritischen Systemen - Neue digitale Realitäten
Reuter, Christian; Mentler, Tilo; Nestler, Simon; Herczeg, Michael; Ludwig, Thomas; Pottebaum, Jens; Kaufhold, Marc-André
Mensch und Computer 2019
Language: German
[Conference Proceedings]

Between Effort and Security: User Assessment of the Adequacy of Security Mechanisms for App Categories
Reuter, Christian; Häusser, Katja; Bien, Mona; Herbert, Franziska
Mensch und Computer 2019
Language: English
[Conference Proceedings]