Publikationen

Smart and Secure Cross-Device Apps for the Internet of Advanced Things
Busold, Christoph; Heuser, Stephan; Rios, Jon; Sadeghi, Ahmad-Reza; Asokan, Nadarajah
Financial Cryptography and Data Security
Sprache: German
[Conference Proceedings]

Hybrid Communication Architecture for Emergency Response - An Implementation in Firefighter’s Use Case
Nguyen, The An Binh; Englert, Frank; Farr, Simon; Gottron, Christian; Böhnstedt, Doreen; Steinmetz, Ralf
International Workshop on Pervasive Networks for Emergency Management (PerNEM)
Sprache: German
[Conference Proceedings]

Cloud-based IoT Analytics for the Smart Grid: Experiences from a 3-year Pilot
Hasan, T.; Kikiras, Panayotis; Leonardi, Alessandro; Ziekow, Holger; Daubert, Jörg
Proceedings of the 10th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM), p.1-10
Sprache: English
[Conference Proceedings]

A View on Privacy & Trust in IoT
Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis
IEEE International Conference on Communication (ICC), International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), p.2665-2670
Sprache: English
[Conference Proceedings]

A probabilistic kernel method for human mobility prediction with smartphones
Do, Trinh Minh Tri; Dousse, Olivier; Miettinen, Markus; Gatica-Perez, Daniel
Sprache: German
[Journal Article]

End-2-End Privacy Architecture for IoT
Funke, Sebastian; Daubert, Jörg; Wiesmaier, Alexander; Kikiras, Panayotis; Mühlhäuser, Max
IEEE Conference on Communications and Network Security (CNS), poster proceedings, p.705-706
Sprache: German
[Conference Proceedings]

Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)
Fehr, Victoria; Fischlin, Marc
Sprache: English
[Journal Article]

An Automatic Inference of Minimal Security Types
Bollmann, Dominik; Lortz, Steffen; Mantel, Heiko; Starostin, Artem
Proceedings of the 11th International Conference on Information Systems Security (ICISS)
Sprache: English
[Conference Proceedings]

Towards Secure Integration of Cryptographic Software
Arzt, Steven; Nadi, Sarah; Ali, Karim; Bodden, Eric; Erdweg, Sebastian; Mezini, Mira
Sprache: English
[Conference Proceedings]

Universality in random quantum networks
Novotny, Jaroslav; Alber, Gernot; Jex, Igor
Sprache: English
[Journal Article]

Authenticated Key Exchange from Ideal Lattices
Zhang, Jiang; Zhang, Zhenfeng; Ding, Jintai; Snook, Michael; Dagdelen, Özgür
EUROCRYPT 2015
Sprache: English
[Conference Proceedings]

Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, Simon; Reinheimer, Benjamin; Volkamer, Melanie
Usable Security and Privacy Workshop in conjunction with Mensch und Computer 2015, p.647-655
Sprache: German
[Conference Proceedings]

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? - Keynote -
Sadeghi, Ahmad-Reza; Davi, Lucas; Larsen, Per
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
Sprache: German
[Conference Proceedings]

I know where you are: Proofs of Presence resilient to malicious provers
Miettinen, Markus; Asokan, N.; Koushanfar, Farinaz; Nguyen, Thien Duc; Rios, Jon; Sadeghi, Ahmad-Reza; Sobhani, Majid; Yellapantula, Sudha
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
Sprache: German
[Conference Proceedings]

IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Krauß, Christoph; Waidner, Michael
Sprache: German
[Journal Article]

Time to Rethink: Trust Brokerage using Trusted Execution Environments
Koeberl, Patrick; Phegade, Vinay; Rajan, Anand; Schneider, Thomas; Schulz, Steffen; Zhdanova, Maria
8. International Conference on Trust and Trustworthy Computing (TRUST'15), p.181-190
Sprache: English
[Conference Proceedings]

On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax
Geihs, Matthias; Demirel, Denise; Buchmann, Johannes
Codes, Cryptology and Information Security
Sprache: 1
[Conference Proceedings]

Lattice Basis Reduction Attack against Physically Unclonable Functions
Ganji, Fatemeh; Krämer, Juliane; Seifert, Jean-Pierre; Tajik, Shahin
22nd ACM Conference on Computer and Communications Security (CCS 2015)
Sprache: 1
[Conference Proceedings]

A Distributed Reputation System for Certification Authority Trust Management
Classen, Jiska; Braun, Johannes; Volk, Florian; Hollick, Matthias; Buchmann, Johannes; Mühlhäuser, Max
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)
Sprache: 1
[Conference Proceedings]

A Guide to End-to-End Privacy Accountability
Butin, Denis; Métayer, Daniel Le
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015)
Sprache: 1
[Conference Proceedings]

Real-World Post-Quantum Digital Signatures
Butin, Denis; Gazdag, Stefan-Lukas; Buchmann, Johannes
Cybersecurity & Privacy Innovation Forum (CSP Forum 2015)
Sprache: 1
[Conference Proceedings]

Zertifizierte Apps
Maseberg, Sönke; Bodden, Eric; Kus, Mehmet; Brucker, Achim; Rasthofer, Siegfried; Berger, Bernhard; Huber, Stephan; Sohr, Karsten; Gerber, Paul; Volkamer, Melanie
Risiken kennen, He­raus­for­de­rung­en annehmen, Lösungen gestalten, Tagungsband zum 14. Deutscher IT-Sicherheitskongress des BSI 2015, p.505-516
Sprache: German
[Conference Proceedings]

PriMSED - Privacy-Friendly Measurement of Smart Entertainment Devices
Ghiglieri, Marco
IEEE CCNC
Sprache: 1
[Conference Proceedings]

Augmented Learning with Errors: The Untapped Potential of the Error Term
El Bansarkhani, Rachid; Dagdelen, Özgür; Buchmann, Johannes
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, p.20
Sprache: 1
[Conference Proceedings]

High Performance Lattice-based CCA-secure Encryption
El Bansarkhani, Rachid; Buchmann, Johannes
Sprache: German
[Journal Article]