Publikationen

Optical scheme for cryptographic commitments with physical unclonable keys
Nikolopoulos, Georgios M.
Optical Express, Vol.27, p.29367-29379
Sprache: English
[Journal Article]

Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
Fladung, Lukas; Nikolopoulos, Georgios M.; Alber, Gernot; Fischlin, Marc
Cryptography, Vol.3
Sprache: English
[Journal Article]

Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet
Wittmer, Sandra; Steinebach, Martin
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Sprache: German
[Conference Paper, Electronic Publication]

An Unsophisticated Neural Bots and Gender Profiling System: Notebook for PAN at CLEF 2019
Halvani, Oren; Marquardt, Philipp
Conference and Labs of the Evaluation Forum (CLEF) <2019, Lugano>
Sprache: English
[Conference Paper, Electronic Publication]

He­raus­for­de­rung­en für die Anonymisierung von Daten
Winter, Christian; Battis, Verena; Halvani, Oren
Gesellschaft für Informatik (GI Fachtagung) <2019, Kassel>
Sprache: German
[Conference Paper, Electronic Publication]

Assessing the Applicability of Authorship Verification Methods
Halvani, Oren; Winter, Christian; Graner, Lukas
International Conference on Availability, Reliability and Security (ARES) <14, 2019, Canterbury>
Sprache: English
[Conference Paper, Electronic Publication]

Verschlüsselung in der Cloud
Herfert, Michael; Lange, Benjamin; Spychalski, Dominik
Sprache: German
[Journal Article]

Privacy-preserving PLDA speaker verification using outsourced secure computation
Treiber, Amos; Nautsch, Andreas; Kolberg, Jascha; Schneider, Thomas; Busch, Christoph
Speech Communication
Sprache: English
[Journal Article]

Intrusion Detection - Systeme für vernetzte Fahrzeuge - Konzepte und He­raus­for­de­rung­en für Privatheit und Cyber-Sicherheit
Simo, Hervais; Waidner, Michael; Geminn, Christian
Sprache: German
[Book Article]

Kommunikation als Gefahr: Nutzerreaktion auf Nachrichten mit verdächtigen Links per E-Mail und Facebook
Gassmann, F.; Benenson, Z.; Landwirth, R.
Sprache: German
[Journal Article]

Modeling Memory Faults in Signature and Encryption Schemes
Fischlin, Marc; Günther, Felix
eprint
Sprache: English
[Journal Article]

Security Reductions for White-Box Key-Storage in Mobile Payments
Bock, Estuardo Alpirez; Brzuska, Chris; Fischlin, Marc; Janson, Christian; Michiels, Wil
ePrint
Sprache: English
[Journal Article]

Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation
Günther, Daniel; Kiss, Ágnes; Scheidel, Lukas; Schneider, Thomas
ACM CCS 2019
Sprache: English
[Conference Proceedings]

Simple Refreshing in the Noisy Leakage Model
Dziembowski, Stefan; Faust, Sebastian; Zebrowski, Karol
The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
Sprache: English
[Conference Proceedings]

Cryptographic one-way function based on boson sampling
Nikolopoulos, Georgios M.
Quantum Information Processing, Vol.18, p.1-25
Sprache: English
[Journal Article]

On the Detection of GAN-Based Face Morphs Using Established Morph Detectors
Debiasi, Luca; Damer, Naser; Moseguí Saladié, Alexandra; Rathgeb, Christian; Scherhag, Ulrich; Busch, Christoph; Kirchbuchner, Florian; Uhl, Andreas
International Conference on Image Analysis and Processing (ICIAP) <20, 2019, Trento>
Sprache: English
[Conference Paper]

A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"
Schneider, Thomas; Treiber, Amos
IEEE Transactions on Parallel and Distributed Systems
Sprache: English
[Journal Article]

Secure and Private Function Evaluation with Intel SGX
Felsen, Susanne; Kiss, Ágnes; Schneider, Thomas; Weinert, Christian
CCSW 2019 - The ACM Cloud Computing Security Workshop
Sprache: English
[Conference Proceedings]

A Formal Treatment of Deterministic Wallets
Das, Poulami; Faust, Sebastian; Loss, Julian
ACM CCS 2019 - Symposium on Computer and Communications Security
Sprache: English
[Conference Proceedings]

DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization
Brasser, Ferdinand; Capkun, Srdjan; Dmitrienko, Alexandra; Frassetto, Tommaso; Kostiainen, Kari; Sadeghi, Ahmad-Reza
ACSAC - 35th Annual Computer Security Applications Conference
Sprache: English
[Conference Proceedings]

Efficiently Stealing your Machine Learning Models
Reith, Robert Nikolai; Schneider, Thomas; Tkachenko, Oleksandr
Proceedings of the 2019 Workshop on Privacy in the Electronic Society
Sprache: English
[Conference Proceedings]

Sponges Resist Leakage: The Case of Authenticated Encryption
Degabriele, Jean Paul; Janson, Christian; Struck, Patrick
ASIACRYPT 2019 - the 25th Annual International Conference on the Theory and Application of Cryptology and Information Security
Sprache: English
[Conference Proceedings]

Bluemergency: Mediating Post-disaster Communication Systems using the Internet of Things and Bluetooth Mesh
Álvarez, Flor; Almon, Lars; Radtki, Hauke; Hollick, Matthias
9th IEEE Global Humanitarian Technology Conference (IEEE GHTC 2019)
Sprache: English
[Conference Proceedings]

Privacy vs. Security: Privacy Enhancing Technologies in Social Media in Security relevant Situations
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
SCIENCE PEACE SECURITY '19 - Proceedings of the Interdisciplinary Conference on Technical Peace and Security Challenges
Sprache: English
[Conference Proceedings]

Ein Kampf gegen Windmühlen: qualitative Studie über Informatikabsolventinnen und ihre Datenprivatheit
Schmidbauer-Wolf, Gina Maria; Herbert, Franziska; Reuter, Christian
Mensch und Computer 2019 - Workshopband
Sprache: German
[Conference Proceedings]