List of Publications


2022
PhD Theses
Consistent View-Based Management of Variability in Space and Time. PhD dissertation
Ananieva, S.
2022, July 26. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148819
Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements. PhD dissertation
Seifermann, S.
2022, July 20. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148748
Formal Foundations for Anonymous Communication. PhD dissertation
Kuhn, C.
2022, April 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144491
Master's Theses
Provably Quantum-Secure Message Authentication Code. master’s thesis
Nguyen, J.
2022, March 30. Karlsruher Institut für Technologie (KIT)
Anomaly Detection in 3D Space for Autonomous Driving. master’s thesis
Schilling, M.
2022, June 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148848
Architectural Generation of Context-based Attack Paths. master’s thesis
Schenkenberger, J.
2022, May 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148755
Dynamic Extraction of Multi-Round Knowledge Argument Systems. master’s thesis
Fickel, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146729
Modelling and Enforcing Access Control Requirements for Smart Contracts. master’s thesis
Töberg, J.-P.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000144204
Bachelor's Theses
Coreference Resolution for Software Architecture Documentation. bachelor’s thesis
Dao, Q. N.; Hey, T.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148262
Assessing Word Similarity Metrics For Traceability Link Recovery. bachelor’s thesis
Werber, K.
2022. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000148261
Konsistenzerhaltung von Feature-Modellen durch externe Sichten. bachelor’s thesis
Ateş, A.
2022, February 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143212
Journal Articles
Scalability testing automation using multivariate characterization and detection of software performance antipatterns
Avritzer, A.; Britto, R.; Trubiani, C.; Camilli, M.; Janes, A.; Russo, B.; Hoorn, A. van; Heinrich, R.; Rapp, M.; Henß, J.; Chalawadi, R. K.
2022. Journal of Systems and Software, Art.-Nr.: 111446. doi:10.1016/j.jss.2022.111446
Decentralized Review and Attestation of Software Attribute Claims
Stengele, O.; Westermeyer, C.; Hartenstein, H.
2022. IEEE Access. doi:10.1109/ACCESS.2022.3185046
Family-Based and Product-Based Development of Correct-by-Construction Software Product Lines
Bordis, T.; Runge, T.; Schultz, D.; Schaefer, I.
2022. Journal of Computer Languages, 70, Art.-Nr.: 101119. doi:10.1016/j.cola.2022.101119
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Private Function Evaluation with Cards
Koch, A.; Walzer, S.
2022. New Generation Computing. doi:10.1007/s00354-021-00149-9
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2022. The journal of systems and software, 184, Art.-Nr. 111138. doi:10.1016/j.jss.2021.111138
Book Chapters
The Karlsruhe Java Verification Suite
Klamroth, J.; Lanzinger, F.; Pfeifer, W.; Ulbrich, M.
2022. The Logic of Software. A Tasting Menu of Formal Methods – Essays Dedicated to Reiner Hähnle on the Occasion of His 60th Birthday. Ed.: W. Ahrendt, 290–312, Springer International Publishing. doi:10.1007/978-3-031-08166-8_14
Traits: Correctness-by-Construction for Free
Runge, T.; Potanin, A.; Thüm, T.; Schaefer, I.
2022. Formal Techniques for Distributed Objects, Components, and Systems – 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13–17, 2022, Proceedings. Ed.: M. Mousavi, 131–150, Springer International Publishing. doi:10.1007/978-3-031-08679-3_9
Die Regulierungsperspektive von KI/BigData in der Wissenschaft
Spiecker genannt Döhmann, I.
2022. Künstliche Intelligenz in der Forschung. Hrsg.: C.F. Gethmann, 147–172, Springer Verlag. doi:10.1007/978-3-662-63449-3_6
Conference Papers
Feature-based Investigation of Simulation Structure and Behaviour [in press]
Koch, S.; Hamann, E.; Heinrich, R.; Reussner, R.
2022. 16th European Conference on Software Architecture (ECSA), Prague, 19 - 23 September 2022, Springer
Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
Borcherding, A.; Takacs, P.; Beyerer, J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy, 334–344, SciTePress. doi:10.5220/0010806300003120
Towards a Better Understanding of Machine Learning based Network Intrusion Detection Systems in Industrial Networks
Borcherding., A.; Feldmann., L.; Karch., M.; Meshram., A.; Beyerer., J.
2022. Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 314–325, SciTePress. doi:10.5220/0010795900003120
A Comprehensive Study of k-Portfolios of Recent SAT Solvers
Bach, J.; Iser, M.; Böhm, K.
2022. 25th International Conference on Theory and Applications of Satisfiability Testing (SAT 2022). Hrsg.: Kuldeep S. Meel, 2:1–2:18, Schloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH (LZI). doi:10.4230/LIPIcs.SAT.2022.2
MPER - a Motion Profiling Experiment and Research system for human body movement
Rettlinger, S.; Knaus, B.; Wieczorek, F.; Ivakko, N.; Hanisch, S.; Nguyen, G. T.; Strufe, T.; Fitzek, F. H. P.
2022. 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 21-25 March 2022, 88–90, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComWorkshops53856.2022.9767484
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Duezguen, R.; Noah, N.; Mayer, P.; Das, S.; Volkamer, M.
2022. International Conference on Availability, Reliability and Security, ARES 2022, August 23 - August 26, 2022, Vienna, Austria. doi:10.1145/3538969.3539011
Leveraging Distributed Ledger Technology for Decentralized Mobility-as-a-Service Ticket Systems
Leinweber, M.; Kannengießer, N.; Hartenstein, H.; Sunyaev, A.
2022. Towards the New Normal in Mobility. Ed.: H. Proff
Replication Package of "Evaluation Methods and Replicability of Software Architecture Research Objects"
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; Al-Doori, M.; Boltz, N.; Ehl, M.; Fuchs, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), S. 58, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00021
Architectural Pen-Test Generation and Vulnerability Prediction for Cyber-Physical Systems
Walter, T.
2022. ICSA 2022 – Journal First Track Papers: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 45–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00016
Non-Uniform Adversarially Robust Pruning
Zhao, Q.; Königl, T.; Wressnegger, C.
2022. Proc. of the 1st International Conference on Automated Machine Learning (AutoML)
Certified Verification of Relational Properties
Blatter, L.; Kosmatov, N.; Prevosto, V.; Le Gall, P.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 86–105, Springer International Publishing. doi:10.1007/978-3-031-07727-2_6
Formal Specification and Verification of JDK’s Identity Hash Map Implementation
Boer, M. de; Gouw, S. de; Klamroth, J.; Jung, C.; Ulbrich, M.; Weigl, A.
2022. Integrated Formal Methods – 17th International Conference, IFM 2022, Lugano, Switzerland, June 7–10, 2022, Proceedings. Ed.: M. ter Beek, 45–62, Springer International Publishing. doi:10.1007/978-3-031-07727-2_4
Classification of Software Engineering Contributions to Support Validation Techniques and Research Applications
Kaplan, A.
2022. The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 323–328, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535345
Evaluation Methods and Replicability of Software Architecture Research Objects
Konersmann, M.; Kaplan, A.; Kuhn, T.; Heinrich, R.; Koziolek, A.; Reussner, R.; Jurjens, J.; al-Doori, M.; Boltz, N.; Ehl, M.; Fuchs, D.; Groser, K.; Hahner, S.; Keim, J.; Lohr, M.; Saglam, T.; Schulz, S.; Toberg, J.-P.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), Honolulu, HI, USA, 12-15 March 2022, 157–168, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00023
Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 12 -15 March 2022, Honolulu, HI, USA, 59, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C54293.2022.00022
Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
Walter, M.; Heinrich, R.; Reussner, R.
2022. 2022 IEEE 19th International Conference on Software Architecture (ICSA), 12 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA53651.2022.00009
Verifying Payment Channels with TLA+
Grundmann, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–3, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805487
On the Peer Degree Distribution of the Bitcoin P2P Network
Grundmann, M.; Baumstark, M.; Hartenstein, H.
2022. IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2nd –5th May 2022, Virtual Conference, 1–5, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICBC54727.2022.9805511
Reproducibility and Replicability of Web Measurement Studies
Demir, N.; Große-Kampmann, M.; Urban, T.; Wressnegger, C.; Holz, T.; Pohlmann, N.
2022. WWW ’22: Proceedings of the ACM Web Conference 2022. Ed.: F. Laforest, 533–544, Association for Computing Machinery (ACM). doi:10.1145/3485447.3512214
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Bayreuther, S.; Jacob, F.; Grotz, M.; Kartmann, R.; Peller-Konrad, F.; Paus, F.; Hartenstein, H.; Asfour, T.
2022. SACMAT ’22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesJune 2022, New York NY USA, June 8 - 10, 2022. Ed.: S. Dietrich, 185–194, Association for Computing Machinery (ACM). doi:10.1145/3532105.3535018
Performance-Detective: Automatic Deduction of Cheap and Accurate Performance Models
Schmid, L.; Copik, M.; Calotoiu, A.; Werle, D.; Reiter, A.; Selzer, M.; Koziolek, A.; Hoefler, T.
2022. ACM International Conference on Supercomputing (ICS ’22), Virtual Event, June 28-30, 2022, Association for Computing Machinery (ACM). doi:10.1145/3524059.3532391
On CRDTs in Byzantine Environments : Conflict Freedom, Equivocation Tolerance, and the Matrix Replicated Data Type
Jacob, F.; Bayreuther, S.; Hartenstein, H.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit. Hrsg.: C. Wressnegger, 113–128, Gesellschaft für Informatik e.V.  (GI)
Introducing an Evaluation Method for Taxonomies
Kaplan, A.; Kühn, T.; Hahner, S.; Benkler, N.; Keim, J.; Fuchß, D.; Corallo, S.; Heinrich, R.; Corallo, S.; Heinrich, R.
2022. EASE 2022: The International Conference on Evaluation and Assessment in Software Engineering 2022. Ed.: M. Staron, 311–316, Association for Computing Machinery (ACM). doi:10.1145/3530019.3535305
Inferring Interval-Valued Floating-Point Preconditions
Krämer, J.; Blatter, L.; Darulova, E.; Ulbrich, M.
2022. Tools and Algorithms for the Construction and Analysis of Systems – 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I. Ed.: D. Fisman, 303–321, Springer International Publishing. doi:10.1007/978-3-030-99524-9_16
Enhancing Girls’ Feeling of Belonging to Computer Science : Possibilities of Interdisciplinary Online Courses to Increase Diversity of Learning
Marquardt, K.
2022. Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2022). Vol. 2, Association for Computing Machinery (ACM). doi:10.1145/3502717.3532108
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Unified Operations for Variability in Space and Time
Ananieva, S.; Greiner, S.; Krueger, J.; Linsbauer, L.; Gruener, S.; Kehrer, T.; Kuehn, T.; Seidl, C.; Reussner, R.
2022. Proceedings of the 16th International Working Conference on Variability Modelling of Software-Intensive Systems, 1–10, Association for Computing Machinery (ACM). doi:10.1145/3510466.3510483
Continuous Secure Software Development and Analysis
Schulz, S.; Reiche, F.; Hahner, S.; Schiffl, J.
2022. Symposium on Software Performance 2021 : Short Paper Proceedings of Symposium on Software Performance, Leipzig, Germany, November 9.-10., 2021. Ed.: D. G. Reichelt, R. Müller, S. Becker, W. Hasselbring, A. v. Hoorn, S. Kounev, A. Koziolek, R. Reussner, RWTH Aachen
German voters’ attitudes towards voting online with a verifiable system
Kulyk, O.; Volkamer, M.; Fuhrberg, N.; Berens, B.; Krimmer, R.
2022. Workshop on Advances in Secure Electronic Voting (VOTING), Grenada, February 18, 2022
Phishing awareness and education – When to best remind?
Berens, B. M.; Dimitrova, K.; Mossano, M.; Volkamer, M.
2022. Symposium on Usable Security and Privacy (USEC), San Diego, CA, April 23, 2022
Recent Developments in the Context of Online Elections and Digital Polls in Germany
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik e.V.  (GI)
Dos and Don’ts of Machine Learning in Computer Security
Arp, D.; Quiring, E.; Pendlebury, F.; Warnecke, A.; Pierazzi, F.; Wressnegger, C.; Cavallaro, L.; Rieck, K.
2022. Proc. of the USENIX Security Symposium 2022
Towards a Formal Approach for Data Minimization in Programs (Short Paper)
Lanzinger, F.; Weigl, A.
2022. Data Privacy Management, Cryptocurrencies and Blockchain Technology : ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 161–169, Springer International Publishing. doi:10.1007/978-3-030-93944-1_11
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Hawaii International Conference on System Sciences (HICSS)
2021
PhD Theses
Formal Specification and Verification for Automated Production Systems. PhD dissertation
Weigl, A. S.
2021, December 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140942
Architectural Alignment of Access Control Requirements Extracted from Business Processes. PhD dissertation
Pilipchuk, R.
2021, December 13. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000140856
On Foundations of Protecting Computations. PhD dissertation
Agrikola, T.
2021, June 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Building Transformation Networks for Consistent Evolution of Interrelated Models. PhD dissertation
Klare, H.
2021, June 9. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133724
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications. PhD dissertation
Gotin, M.
2021, June 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133328
Master's Theses
Estimating the Cost of Superposition Attacks on Lightweight Cryptography on Fault-Tolerant Quantum Systems. master’s thesis
Hägele, F.
2021, December 23. Karlsruher Institut für Technologie (KIT)
Ein Rahmenwerk für Evaluierung von Interdisziplinären Lerneinheiten für den Informatikunterricht. master’s thesis
Marquardt, K.
2021, December 8. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000143548
Derivation of Change Sequences from State-Based File Differences for Delta-Based Model Consistency. master’s thesis
Wittler, J. W.
2021, June 25. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141972
Securing Process Execution by Verifying the Inner Process State Through Recording and Replaying on Different Platforms. master’s thesis
Schäfer, M.
2021, December 14. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000141188
Verifiable Random Oracles. master’s thesis
Diekhoff, K.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000135426
FortifiedIPS: Increasing the Security of Multi-Party Computation by Diverse Redundancy. master’s thesis
Vogl, J.
2021, February 22. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131909
Bachelor's Theses
Ein Datensatz handgezeichneter UML-Klassendiagramme für maschinelle Lernverfahren. bachelor’s thesis
Schumacher, P. N.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000146736
Enabling the Information Transfer between Architecture and Source Code for Security Analysis. bachelor’s thesis
Häring, J.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000142571
Analyse von Entwurfsentscheidungen in natürlichsprachiger Softwarearchitekturdokumentation. bachelor’s thesis
Sauer, B.
2021, October 7. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139681
Komposition von Trace Link Recovery Ansätzen. bachelor’s thesis
Winter, I.
2021, October 15. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139680
Einfluss dynamischer Kontexterweiterungen auf die Schlussfolgerungsfähigkeiten neuronaler Sprachmodelle. bachelor’s thesis
Schmitt, S.
2021, August 23. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139679
Design Space Evaluation for Confidentiality under Architectural Uncertainty. bachelor’s thesis
Liu, O.
2021, September 10. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139590
On the Impossibility of Unconditionally Secure Quantum Bit Commitment. bachelor’s thesis
Haizmann, F.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000132586
The Feasibility of Limiting Access to Fingerprintable Surfaces in Web Browsers. bachelor’s thesis
Gretenkort, J.
2021, March 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131038
Journal Articles
On the Security of IIoT Deployments: An Investigation of Secure Provisioning Solutions for OPC UA
Kohnhäuser, F.; Meier, D.; Patzer, F.; Finster, S.
2021. IEEE access, 9, 99299–99311. doi:10.1109/ACCESS.2021.3096062
Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review
Yari, I. A.; Dehling, T.; Kluge, F.; Geck, J.; Sunyaev, A.; Eskofier, B.
2021. Journal of Medical Internet Research, 23 (11), e24460. doi:10.2196/24460
Online-Wahlen zu Parlamenten als modernes Instrument demokratischer Partizipation in Zeiten von Pandemie und Digitalisierung
Bretthauer, S.
2021. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 104 (1), 3–33. doi:10.5771/2193-7869-2021-1-3
Scalability and Precision by Combining Expressive Type Systems and Deductive Verification
Lanzinger, F.; Weigl, A.; Ulbrich, M.; Dietl, W.
2021. Proceedings of the ACM on programming languages, 5 (OOPSLA), Article no: 143. doi:10.1145/3485520
A Step Towards Global Counterfactual Explanations: Approximating the Feature Space Through Hierarchical Division and Graph Search
Fraunhofer IOSB; Becker, M.; Burkart, N.; Birnstill, P.; Beyerer, J.
2021. Advances in Artificial Intelligence and Machine Learning, 1 (2), 90–110. doi:10.54364/aaiml.2021.1107
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193
Ein Netzwerk für Europas Cybersicherheit
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker gen. Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103
Challenges and Common Solutions in Smart Contract Development
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2021. IEEE transactions on software engineering. doi:10.1109/TSE.2021.3116808
Secure and privacy-respecting documentation for interactive manufacturing and quality assurance
Wagner, P. G.; Lengenfelder, C.; Holzbach, G.; Becker, M.; Birnstill, P.; Voit, M.; Bejhad, A.; Samorei, T.; Beyerer, J.
2021. Applied Sciences (Switzerland), 11 (16), Art.-Nr.: 7339. doi:10.3390/app11167339
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?
Fraunhofer IOSB; Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654
Analysis of the Matrix Event Graph Replicated Data Type
Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333. doi:10.1109/ACCESS.2021.3058576
Datensouveränität für Patienten im Gesundheitswesen
Bretthauer, S.; Appenzeller, A.; Birnstill, P.
2021. Datenschutz und Datensicherheit, 45 (3), 173–179. doi:10.1007/s11623-021-1413-6
Token Economy
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1
Efficient communication protection of many-core systems against active attackers
Moriam, S.; Franz, E.; Walther, P.; Kumar, A.; Strufe, T.; Fettweis, G.
2021. Electronics, 10 (3), Art.-Nr.: 238. doi:10.3390/electronics10030238
Enabling consistency in view-based system development - The Vitruvius approach
Klare, H.; Kramer, M. E.; Langhammer, M.; Werle, D.; Burger, E.; Reussner, R.
2021. The journal of systems and software, 171, Article no: 110815. doi:10.1016/j.jss.2020.110815
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2021. IEEE transactions on software engineering, 47 (4), 775–800. doi:10.1109/TSE.2019.2903797
Books
Tactile Internet : with Human-in-the-Loop
Fitzek, F. H. P.; Speidel, S.; Simsek, M.; Li, S.-C.; Strufe, T.; Reisslein, M. (Eds.)
2021. Academic Press. doi:10.1016/C2019-0-01386-6
Electronic Voting: 6th International Joint Conference, E-Vote-ID 2021, Virtual Event, October 5–8, 2021: proceedings
Krimmer, R.; Volkamer, M.; Duenas-Cid, D.; Kulyk, O.; Rønne, P.; Solvak, M.; Germann, M. (Eds.)
2021. Springer Nature. doi:10.1007/978-3-030-86942-7
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft
Book Chapters
Challenges in the Evolution of Palladio—Refactoring Design Smells in a Historically-Grown Approach to Software Architecture Analysis
Heinrich, R.; Henss, J.; Koch, S.; Reussner, R.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 235–257, Springer International Publishing. doi:10.1007/978-3-030-81915-6_11
Integration and Orchestration of Analysis Tools
Heinrich, R.; Bousse, E.; Koch, S.; Rensink, A.; Riccobene, E.; Ratiu, D.; Sirjani, M.
2021. Composing Model-Based Analysis Tools. Ed.: R. Heinrich, 71–95, Springer International Publishing. doi:10.1007/978-3-030-81915-6_5
Security
Sengupta, S.; Goethem, T. V.; Demir, N.
2021. The 2021 Web Almanac, 775 S., HTTP Archive
Our (in)Secure Web: Understanding Update Behavior of Websites and Its Impact on Security
Demir, N.; Urban, T.; Wittek, K.; Pohlmann, N.
2021. Passive and active measurement : 22nd international conference, PAM 2021, virtual event, March 29 - April 1, 2021 : proceedings . Ed.: O. Hohlfeld, 76–92, Springer International Publishing. doi:10.1007/978-3-030-72582-2_5
Tactile computing: Essential building blocks for the Tactile Internet
Aßmann, U.; Baier, C.; Dubslaff, C.; Grzelak, D.; Hanisch, S.; Hartono, A. P. P.; Köpsell, S.; Lin, T.; Strufe, T.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 293–317, Academic Press. doi:10.1016/B978-0-12-821343-8.00025-3
Intelligent networks
Cabrera G., J. A.; Fitzek, F. H. P.; Hanisch, S.; Itting, S. A. W.; Zhang, J.; Zimmermann, S.; Strufe, T.; Simsek, M.; Fetzer, C. W.
2021. Tactile Internet. Ed.: F. H.P. Fitzek, 131–149, Academic Press. doi:10.1016/B978-0-12-821343-8.00017-4
Befugnisse des Staates nach dem Infektionsschutzgesetz
Bretthauer, S.
2021. Religionsfreiheit in Seuchenzeiten. Hrsg.: S. Mückl, 61–83, Duncker & Humblot
§ 23: Informationsverwaltung
Spiecker gen. Döhmann, I.
2021. Handbuch des Verwaltungsrechts. Hrsg.: W. Kahl. Bd. 1, 891–938, C.F. Müller
The legal framework for access to data from a data protection viewpoint - especially under GDPR
Spiecker gen. Döhmann, I.
2021. Data Access, Consumer Interests and Public Welfare, 175–208, Nomos Verlagsgesellschaft. doi:10.5771/9783748924999-175
Governance im lernenden Gesundheitssystem : Anforderungen an eine gesamtheitliche Steuerung von Plattformen
Spiecker gen. Döhmann, I.
2021. Perspektive Gesundheit 2030. Hrsg.: J. Baas, 45–53, Medizinisch Wissenschaftliche Verlagsgesellschaft mbH & Co. KG (MWV)
Staatliche oder private Algorithmenregulierung?
Spiecker gen. Döhmann, I.
2021. Bitburger Gespräche : Jahrbuch 2020. Hrsg. von der Stiftung Gesellschaft für Rechtspolitik, Trier und dem Institut für Rechtspolitik an der Universität Trier, 37–57, Beck
Section II: Health protection and personal data protection in selected Member States, The impact of EU Regulation 2016/679 on the German health system
Spiecker gen. Döhmann, I.
2021. The protection of personal data concerning health at the European level: a comparative analysis. Ed.: G. Fares, 83–100, G. Giapichelli
§ 4 HDSIG - Videoüberwachung öffentlich zugänglicher Räume
Spiecker gen. Döhmann, I.
2021. Hessisches Datenschutz- und Informationsfreiheitsgesetz. Hrsg.: A. Roßnagel, 107–117, Nomos Verlagsgesellschaft
§ 24 Europäisches Datenschutzrecht
Spiecker gen. Döhmann, I.; Benecke, A.
2021. Verwaltungsrecht der Europäischen Union. Hrsg.: J. Tierhechte, Nomos Verlagsgesellschaft
Dynamic Model Based Detection of Cyberattacks in Industrial Facilities
Reibelt, K.; Keller, H. B.; Hagenmeyer, V.; Matthes, J.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Ed.: M. Türkay, 1339–1344, Elsevier. doi:10.1016/B978-0-323-88506-5.50206-0
Human Factors in Security
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden. doi:10.1007/978-3-658-32795-8_5
Information Management
Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr
Conference Papers
Towards Managing and Organizing Research Activities
Kaplan, A.; Rapp, M.; Ananieva, S.; Hajiabad, H.; Kühn, R.; Mazkatli, M.; Schmid, L.; Singh, S.
2021. 8th ACM Celebration of Women in Computing: womENcourage 2021
Aspect-Oriented Adaptation of Access Control Rules
Bures, T.; Gerostathopoulos, I.; Hnetynka, P.; Seifermann, S.; Walter, M.; Heinrich, R.
2021. 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 363–370, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA53835.2021.00054
Consistent management of variability in space and time
Ananieva, S.
2021. Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume B, 7–12, Association for Computing Machinery (ACM). doi:10.1145/3461002.3473067
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2021. A. Koziolek, I. Schaefer & C. Seidl (Eds.), Software Engineering 2021 : Fachtagung 22.-26. Februar 2020 Braunschweig/Virtuell / Anne Koziolek, Ina Schaefer, Christoph Seidl, 43–44, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/SE2021_10
Towards the Co-Evolution of Models and Artefacts of Industrial Tools Through External Views
Sağlam, T.; Kühn, T.
2021. 2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, J, October 10-15, 2021, 410–416, IEEEXplore. doi:10.1109/MODELS-C53483.2021.00064
Attack Forecast and Prediction
Kaiser, F.; Budig, T.; Goebel, E.; Fischer, T.; Muff, J.; Wiens, M.; Schultmann, F.
2021. C&ESAR 2021: Automation in Cybersecurity ; Proceedings of the 28th Computer & Electronics Security Application Rendezvous co-located with the 6th European Cyber Week (ECW 2021) ; Rennes, France, November 16-17, 2021. Ed.: G. Le Guernic, 77–97, CEUR-WS.org
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
Upper Bound Computation of Information Leakages for Unbounded Recursion
Bechberger, J.; Weigl, A.
2021. Software Engineering and Formal Methods: 19th International Conference, SEFM 2021, Virtual Event, December 6–10, 2021, Proceedings. Ed.: R. Calinescu, 160–177, Springer Verlag. doi:10.1007/978-3-030-92124-8_10
ETHTID: Deployable Threshold Information Disclosure on Ethereum
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Onion Routing with Replies
Kuhn, C.; Hofheinz, D.; Rupp, A.; Strufe, T.
2021. Advances in Cryptology – ASIACRYPT 2021 – 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 573–604, Springer International Publishing. doi:10.1007/978-3-030-92075-3_20
Black-Box Accumulation Based on Lattices
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Architecture Matters: Investigating the Influence of Differential Privacy on Neural Network Design
Morsbach, F.; Dehling, T.; Sunyaev, A.
2021. Presented at NeurIPS 2021 Workshop on Privacy in Machine Learning (PriML 2021), 14.12.2021. doi:10.48550/arXiv.2111.14924
Angriffserkennungssysteme in ICS Netzwerken
Kippe, J.; Karch, M.
2021. Deutschland, Digital, Sicher : 30 Jahre BSI : Tagungsband zum 17. Deutschen IT-Sicherheitskongress, 1–11, SecuMedia Verlag
Generative Machine Learning for Resource-Aware 5G and IoT Systems
Piatkowski, N.; Mueller-Roemer, J. S.; Hasse, P.; Bachorek, A.; Werner, T.; Birnstill, P.; Morgenstern, A.; Stobbe, L.
2021. 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada, 14-23 June 2021, 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICCWorkshops50388.2021.9473625
A Secure Cell-Attachment Procedure of LDACS
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, M.; Schmitt, C.; Rodosek, G. D.
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Side-Channel Attacks on Query-Based Data Anonymization
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Mitigating Internal, Stealthy DoS Attacks in Microservice Networks
Osman, A.; Born, J.; Strufe, T.
2021. Stabilization, Safety, and Security of Distributed Systems : 23rd International Symposium, SSS 2021, Virtual Event, November 17–20, 2021, Proceedings. Ed.: C. Johnen, 500–504, Springer. doi:10.1007/978-3-030-91081-5_37
Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance
Arias-Cabarcos, P.; Habrich, T.; Becker, K.; Becker, C.; Strufe, T.
2021. Proceedings of the 30th USENIX Security Symposium : August 11-13, 2021, 55–72, USENIX Association
2PPS – Publish/Subscribe with Provable Privacy
Abdelwahab Gaballah, S.; Coijanovic, C.; Strufe, T.; Mühlhäuser, M.
2021. 40th International Symposium on Reliable Distributed Systems (SRDS), Chicago, IL, USA, 20-23 Sept. 2021. Vol.: 1, 198–209, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SRDS53918.2021.00028
On Expected Polynomial Runtime in Cryptography
Klooß, M.
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Classifying and Avoiding Compatibility Issues in Networks of Bidirectional Transformations
Sağlam, T.; Klare, H.
2021. STAF 2021 Workshop Proceedings: 9th International Workshop on Bidirectional Transformations. Hrsg.: Ludovico Lovino, Lars Michael Kristensen, 34–53, CEUR-WS.org
Tackling Problems of Maintenance and Evolution in Industry 4.0 Scenarios Using a Distributed Architecture
Koch, S.; Wunderlich, T.; Hansert, J.; Heinrich, R.; Schlegel, T.
2021. SE-SE 2021 - Software Engineering 2021 Satellite Events - Workshops and Tools & Demos - Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22 - 26, 2021. Ed.: S. Götz, CEUR-WS
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
Broadnax, B.; Mechler, J.; Müller-Quade, J.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Frontiers of transdisciplinary research in tactile Internet with Human-in-the-Loop
Fitzek, F. H. P.; Li, S.-C.; Speidel, S.; Strufe, T.; Seeling, P.
2021. 2021 17th International Symposium on Wireless Communication Systems (ISWCS): 6-9 September 2021, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISWCS49558.2021.9562223
Identifying confidentiality violations in architectural design using palladio
Seifermann, S.; Walter, M.; Hahner, S.; Heinrich, R.; Reussner, R.
2021. W. D. W. D. Heinrich R. Mirandola R. (Ed.), 15th European Conference on Software Architecture - Companion, ECSA-C 2021, Virtual, Online, 13 September 2021 through 17 September 2021. Ed.: R. Heinrich, Code 172547, CEUR-WS.org
Deductive Verification of Floating-Point Java Programs in KeY
Abbasi, R.; Schiffl, J.; Darulova, E.; Ulbrich, M.; Ahrendt, W.
2021. Tools and Algorithms for the Construction and Analysis of Systems : 27th International Conference, TACAS 2021, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021, Proceedings, Part II. Ed.: J. F. Groote, 242–261, Springer International Publishing. doi:10.1007/978-3-030-72013-1_13
Knowledge-based Sense Disambiguation of Multiword Expressions in Requirements Documents
Hey, T.; Keim, J.; Tichy, W. F.
2021. 2021 IEEE 29th International Requirements Engineering Conference Workshops (REW), Notre Dame, IN, USA, 20-24 Sept. 2021, 70–76, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REW53955.2021.00017
Usable Verifiable Secrecy-Preserving E-Voting
Kulyk, O.; Ludwig, J.; Volkamer, M.; Koenig, R. E.; Locher, P.
2021. 6th Joint International Conference on Electronic Voting, E-Vote-ID 2021, 5-8 October 2021. Ed.: R. Krimmer ; M. Volkamer, 337–353, University of Tartu Press
Effective Notification Campaigns on the Web : A matter of Trust, Framing, and Support
Maass, M.; Stöver, A.; Pridöhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker gen. Döhmann, I.
2021. Proceedings of the 30th USENIV Security Symposium, 2489–2506, USENIX Association
Recht und Technik: Datenschutz im Diskurs
Grimm, R.; Hornung, G.; Sorge, C.; Spiecker gen. Döhmann, I.
2021. Informatik 2020: Fachtagung vom 28. September–2. Oktober 2020 Karlsruhe. Hrsg.: R. H. Reussner, 813–814, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/inf2020_72
Coupling Smart Contracts: A Comparative Case Study
Friebe, S.; Stengele, O.; Hartenstein, H.; Zitterbart, M.
2021. 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), 27-30 Sept. 2021, 137–144, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BRAINS52497.2021.9569830
Sketches and Natural Language in Agile Modeling
Fuchß, D.
2021. ECSA-C 2021 : Companion Proceedings of the 15th European Conference on Software Architecture, Virtual (originally: Växjö, Sweden), 13-17 September, 2021. ECSA 2021 Companion Volume. Ed.: R. Heinrich, Paper-ID: 94
Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
Patzer, F.; Beyerer, J.
2021. Proceedings of the 7th International Conference on Information Systems Security and Privacy. Hrsg:. Paolo Mori, Gabriele Lenzini, Steven Furnell, 550–557, SciTePress. doi:10.5220/0010285305500557
Architectural Access Control Policy Refinement and Verification under Uncertainty
Hahner, S.
2021. Companion Proceedings of the 15th European Conference on Software Architecture, RWTH Aachen
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Dealing with Uncertainty in Architectural Confidentiality Analysis
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik e.V.  (GI)
Quantifying Software Reliability via Model-Counting
Teuber, S.; Weigl, A.
2021. Quantitative Evaluation of Systems: 18th International Conference, QEST 2021, Paris, France, August 23–27, 2021, Proceedings. Ed.: A. Abate, 59–79, Springer Verlag. doi:10.1007/978-3-030-85172-9_4
Trace Link Recovery for Software Architecture Documentation
Keim, J.; Schulz, S.; Fuchß, D.; Kocher, C.; Speit, J.; Koziolek, A.
2021. Software Architecture: 15th European Conference, ECSA 2021, Virtual Event, Sweden, September 13-17, 2021, Proceedings. Ed.: S. Biffl, 101–116, Springer Verlag. doi:10.1007/978-3-030-86044-8_7
Plausible Deniability for Anonymous Communication
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021, 17–32, Association for Computing Machinery (ACM). doi:10.1145/3463676.3485605
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021, 796–811, Association for Computing Machinery (ACM). doi:10.1145/3485832.3485911
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/inf2020_76
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)
SMILE - Smart eMaIl Link domain Extractor
Mossano, M.; Berens, B.; Heller, P.; Beckmann, C.; Aldag, L.; Mayer, P.; Volkamer, M.
2021. Computer Security : ESORICS 2021 International Workshops : CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4–8, 2021. Ed.: S. Katsikas, 403–412, Springer. doi:10.1007/978-3-030-95484-0
Adversarial Robust Model Compression using In-Train Pruning
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing. doi:10.1007/978-3-030-81652-0_11
Reconstructing z3 proofs in KeY: There and back again
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421
Challenges in aligning enterprise application architectures to business process access control requirements in evolutional changes
Pilipchuk, R.; Seifermann, S.; Heinrich, R.; Reussner, R.
2021. Proceedings of the 18th International Conference on e-Business, ICE-B 2021, Virtual, Online, 7 July 2021 - 9 July 2021, 13–24, SciTePress. doi:10.5220/0010511800130024
Lower Bounds and Hardness Magnification for Sublinear-Time Shrinking Cellular Automata
Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer Verlag. doi:10.1007/978-3-030-79416-3_18
A unified model to detect information flow and access control violations in software architectures
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037
Runtime Verification of Generalized Test Tables
Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer Verlag. doi:10.1007/978-3-030-76384-8_22
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites
Krisam, C.; Dietmann, H.; Volkamer Melanie; Kulyk, O.
2021. EuroUSEC ’21: European Symposium on Usable Security 2021, Karlsruhe Germany, October 11 - 12, 2021, 8 S., Association for Computing Machinery (ACM). doi:10.1145/3481357.3481516
How to Increase Smart Home Security and Privacy Risk Perception
Duezguen, R.; Mayer, P.; Berens, B.; Beckmann, C.; Aldag, L.; Mossano, M.; Volkamer, M.; Strufe, T.
2021. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 18 - 20 Augus 2021, Shenyang, China, 997–1004, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom53373.2021.00138
Vision: What Johnny learns about Password Security from Videos posted on YouTube
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, 124–128, Association for Computing Machinery (ACM). doi:10.1145/3481357.3481528
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Eighteenth Symposium on Usable Privacy and Security, August 7–9, 2022, Boston, MA, USA
Evaluation der interaktiven NoPhish Präsenzschulung
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 - Workshopband. Hrsg.: C. Wienrich, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2021-mci-wsc-394
A classification for managing software engineering knowledge
Kaplan, A.; Walter, M.; Heinrich, R.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 340–346, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463357
Towards an automated classification approach for software engineering research
Kaplan, A.; Keim, J.
2021. EASE 2021: Evaluation and Assessment in Software Engineering. Ed.: R. Chitchyan, 347–352, Association for Computing Machinery (ACM). doi:10.1145/3463274.3463358
Classifying Usage Control and Data Provenance Architectures
Wagner, P. G.
2021. Proceedings of the 2020 Joint Workshop of Fraunhofer IOSB and Institute for Anthropomatics, Vision and Fusion Laboratory. Ed.: J. Beyerer; T. Zander, 135–154, KIT Scientific Publishing
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574
A Literature Review on Virtual Reality Authentication
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
Modeling Data Flow Constraints for Design-Time Confidentiality Analyses
Hahner, S.; Seifermann, S.; Heinrich, R.; Walter, M.; Bures, T.; Hnetynka, P.
2021. Proceedings IEEE 18th International Conference on Software Architecture - Companion: ICSA-C 2021 ; 22 - 26 March 2021 ; virtual conference, 15–21, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C52384.2021.00009
Enabling Consistency between Software Artefacts for Software Adaption and Evolution
Monschein, D.; Mazkatli, M.; Heinrich, R.; Koziolek, A.
2021. Proceedings IEEE 18th International Conference on Software Architecture: 22-26 March 2021 ; virtual conference, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA51549.2021.00009
TagVet: Vetting Malware Tags using Explainable Machine Learning
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
Finding a Universal Execution Strategy for Model Transformation Networks
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021
Meldepflicht von IT-Sicherheits- und Datenschutzvorfällen durch Mitarbeitende - Betrachtung möglicher arbeitsrechtlicher Konsequenzen
Müllmann, D.; Volkamer, M.
2021. Informatik 2020 - Back to the future. Hrsg.: R. H. Reussner, 829–840, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/inf2020_74
2020
PhD Theses
Advanced Cryptographic Techniques for Protecting Log Data. PhD dissertation
Hartung, G. R.
2020, March 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Secure and Usable User Authentication. PhD dissertation
Mayer, P.
2020, March 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Combining Static and Dynamic Program Analysis Techniques for Checking Relational Properties. PhD dissertation
Herda, M.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000104496
Bachelor's Theses
Optimizations of Isogeny-based Key Exchange. bachelor’s thesis
Reichert, P.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133155
Journal Articles
Resiliente soziotechnische Prozesse im industriellen Internet der Dinge
Henrich, V.; Struwe, S.; Koch, S.; Hansert, J.; Schlegel, T.
2020. Zeitschrift für wirtschaftlichen Fabrikbetrieb, 115 (3), 131–135. doi:10.3139/104.112243
Comparing the Perception of Privacy for Medical Devices and Devices With Medical Functionality
Kaiser, F.; Wiens, M.; Schultmann, F.
2020. International journal of privacy and health information management, 8 (1), 52–69. doi:10.4018/IJPHIM.2020010103
Has the GDPR hype affected users’ reaction to cookie disclaimers?
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1), Article: tyaa022. doi:10.1093/cybsec/tyaa022
IT Sicherheitsgesetz 2.0 und das Vorbild USA
Müllmann, D.; Ebert, A.; Reissner, L.
2020. Computer und Recht, 36 (9), 584–592
Privatsphärengerechte intelligente Mobilitätssteuerung
Bretthauer, S.; Schmitt, A. A.
2020. Zeitschrift für Datenschutz : ZD, (7), 341–347
Die rechtliche Zulässigkeit einer Onlinewahl zur Sozialwahl
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Neue Zeitschrift für Sozialrecht, 2020 (7), 241–247
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. Technikfolgenabschätzung, Theorie und Praxis, 29 (1), 16–22. doi:10.14512/tatup.29.1.16
Biggest Failures in Security (Dagstuhl Seminar 19451)
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
Books
40 Klausuren aus dem Verwaltungsrecht
Bretthauer, S.; Collin, P.; Egidy, S.; Spiecker gen. Döhmann, I.
2020. Vahlen
Book Chapters
Industrial Security by Design – Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2020. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 139–162, Springer. doi:10.1007/978-3-662-52979-9_8
Security for mobile edge cloud
Hanisch, S.; Osman, A.; Li, T.; Strufe, T.
2020. Computing in Communication Networks. Ed.: F.H.P. Fitzek, 371–385, Academic Press. doi:10.1016/B978-0-12-820488-7.00038-4
jhgjg
Test
2020. Test
Fundamental Properties of the Layer Below a Payment Channel Network
Grundmann, M.; Hartenstein, H.
2020. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 409–420, Springer International Publishing. doi:10.1007/978-3-030-66172-4_26
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference
Beckert, B.; Herda, M.; Kirsten, M.; Tyszberowicz, S.
2020. Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY. Ed.: W. Ahrendt, 287–312, Springer. doi:10.1007/978-3-030-64354-6_12
Ein europäisches Netzwerk für Cybersicherheit
Müllmann, D.; Wintzingerode, C. von
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 475–492, OlWIR Verlag für Wirtschaft
Homeland Security Act vs. BSIG - Eine rechtsvergleichende Betrachtung der IT-Sicherheit kritischer Infrastrukturen in den USA und Deutschland
Müllmann, D.; Ebert, A.; Reißner, L.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 459–473, OlWIR Verlag für Wirtschaft
Herausforderungen im Datenschutz von Unternehmen
Spiecker gen. Döhmann, I.; Benecke, A.
2020. Handbuch Industrie 4.0 : Recht, Technik, Gesellschaft. Hrsg.: W. Frenz, 181–200, Springer
Perspektiven des Europäischen Katastrophenschutzrechts - Herausforderungen eines vernachlässigten Rechtsgebiets
Bretthauer, S.
2020. Zehn Jahre Vertrag von Lissabon. Hrsg.: S. Martini, 133–150, Nomos Verlag
A European and German Perspective on data protection law in a digitalized world
Bretthauer, S.
2020. Comparative Privacy and Defamation. Ed.: A. Koltay, 199–215, Edward Elgar Publishing
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Conference Papers
Architektur-basierte Analyse von Änderungsausbreitung in Software-intensiven Systemen
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R. H.; Vogel-Heuser, B.
2020. Software Engineering 2020, Fachtagung des GI-Fachbereichs Softwaretechnik. Hrsg.: Felderer, Michael; Hasselbring, Wilhelm; Rabiser, Rick; Jung, Reiner, 45–46, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/SE2020_10
Third International Workshop on Variability and Evolution of Software-Intensive Systems (VariVolution 2020)
Krüger, J.; Ananieva, S.; Gerling, L.; Walkingshaw, E.
2020. Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A, 1, Association for Computing Machinery (ACM). doi:10.1145/3382025.3414944
SoK on Performance Bounds in Anonymous Communication
Kuhn, C.; Kitzing, F.; Strufe, T.
2020. Proceedings of the 19th Workshop on Privacy in the Electronic Society, 21–39, Association for Computing Machinery (ACM). doi:10.1145/3411497.3420218
Transparent Microsegmentation in Smart Home IoT Networks
Osman, A.; Wasicek, A.; Köpsell, S.; Strufe, T.
2020. 3rd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 20), USENIX Association
Inference Attacks on Physical Layer Channel State Information
Walther, P.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 935–942, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00125
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing
Becher, K.; Lagodzinski, J. A. G.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 998–1005, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00133
Practical Trade-Offs in Integrity Protection for Binaries via Ethereum
Stengele, O.; Droll, J.; Hartenstein, H.
2020. Middleware ’20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 9–10, Association for Computing Machinery (ACM). doi:10.1145/3429358.3429374
On Pseudorandom Encodings
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Exploiting Decryption Failures in Mersenne Number Cryptosystems
Tiepelt, M.; D’Anvers, J.-P.
2020. 7th ACM Workshop on Asia Public-Key Cryptography, APKC 2020, held in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2020, Taipei, Taiwan, 6 October 2020 (05.-09.2020). Ed.: K. Emura; N. Yanai, 45–54. doi:10.1145/3384940.3388957
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption
Becher, K.; Strufe, T.
2020. 2020 IEEE Symposium on Computers and Communications (ISCC), 7-10 July 2020, Rennes, France, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISCC50000.2020.9219588
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation
Walther, P.; Strufe, T.
2020. 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 31 August - 3 September 2020, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PIMRC48278.2020.9217278
Modular Verification of JML Contracts Using Bounded Model Checking
Beckert, B.; Kirsten, M.; Klamroth, J.; Ulbrich, M.
2020. ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium (ISoLA 2020), 60–80, Springer. doi:10.1007/978-3-030-61362-4_4
Browsing unicity: On the limits of anonymizing web tracking data
Deuser, C.; Passmann, S.; Strufe, T.
2020. Proceedings 2020 IEEE Symposium on Security and Privacy SP 2020, San Francisco, California, USA, 18-21 May 2020. Ed.: P. Kellenberger, 777–790. doi:10.1109/SP40000.2020.00018
The german-speaking twitter community reference data set
Pflugmacher, J.; Escher, S.; Reubold, J.; Strufe, T.
2020. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 6-9 July 2020, online, 1172–1177, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFOCOMWKSHPS50562.2020.9162728
Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML
Appenzeller, A.; Krempel, E.; Birnstill, P.; Beyerer, J.
2020. Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, 21-25 September 2020 (Teilkonferenz von SPIE Security + Defence Digital Forum 2020). Ed.: H. Bouma, Art.-Nr.: 1154207, SPIE. doi:10.1117/12.2570824
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems
Borcherding, A.; Pfrang, S.; Haas, C.; Weiche, A.; Beyerer, J.
2020. SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8-10, 2020 (SECRYPT is part of ICETE, the 17th International Joint Conference on e-Business and Telecommunications). Vol. 3. Ed.: P. Samarati, 27–38, SciTePress. doi:10.5220/0009517800270038
Context-Based Confidentiality Analysis for Industrial IoT
Boltz, N.; Walter, M.; Heinrich, R.
2020. Proceedings - 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). Ed.: A. Martini, 589–596, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA51224.2020.00096
A Taxonomy of Dynamic Changes Affecting Confidentiality
Walter, M.; Seifermann, S.; Heinrich, R.
2020. 11th Workshop Design For Future – Langlebige Softwaresysteme
Dynamische personale Identitäten als Schutzgegenstand der DSGVO und technische Gestaltungsvorgabe
Steinbrück, A.
2020. Den Wandel begleiten - IT-rechtliche Herausforderung der Digitalisierung : DSRI-Tagungsband Herbstakademie 2020. Hrsg.: J. Taeger, 73–86, OIWIR
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2020. Security and Trust Management. Ed.: K. Markantonakis, 73–89, Springer Nature. doi:10.1007/978-3-030-59817-4_5
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
Identification and Localization of Cyber-Attacks in Industrial Facilities
Reibelt, K.; Matthes, J.; Keller, H. B.; Hagenmeyer, V.
2020. ESCAPE 30, 30th European Symposium on Computer Aided Process Engineering, Milan, Italy, 30 August 2020 – 2 September 2020. Ed.: S. Pierucci, 1747–1752, Elsevier
Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks
Patzer, F.; Lüdtke, P.; Meshram, A.; Beyerer, J.
2020. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 137–161, Springer Verlag. doi:10.1007/978-3-030-49443-8_7
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools
Grashöfer, J.; Titze, C.; Hartenstein, H.
2020. 2020 IEEE Conference on Communications and Network Security (CNS), 9 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS48642.2020.9162332
An investigation of phishing awareness and education over time: When and how to best remind users
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; Landesberger, T. von; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Enabling Data Sovereignty for Patients through Digital Consent Enforcement
Appenzeller, A.; Rode, E.; Krempel, E.; Beyerer, J.
2020. PETRA ’20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 30 June - 3 July 2020, Article No.: 33, Association for Computing Machinery (ACM). doi:10.1145/3389189.3393745
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
Agrikola, T.; Couteau, G.; Hofheinz, D.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
Agrikola, T.; Hofheinz, D.; Kastner, J.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Smart Contracts: Application Scenarios for Deductive Program Verification
Beckert, B.; Schiffl, J.; Ulbrich, M.
2020. Formal Methods. FM 2019 International Workshops : Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: Emil Sekerinski, 293–298, Springer. doi:10.1007/978-3-030-54994-7_21
Verified Construction of Fair Voting Rules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2020. Logic-Based Program Synthesis and Transformation : 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers. Ed.: M. Gabbrielli, 90–104, Springer International Publishing. doi:10.1007/978-3-030-45260-5_6
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
A meta model for a comprehensive description of network protocols improving security tests
Pfrang, S.; Meier, D.; Fleig, A.; Beyerer, J.
2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Ed.: S. Furnell, 671–682, SciTePress
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
2019
PhD Theses
Cryptographic Protocols from Physical Assumptions. PhD dissertation
Koch, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains. PhD dissertation
Neudecker, T.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000089033
Master's Theses
Incentivized Privacy-Preserving Participatory Sensing. master’s thesis
Lauser, T.
2019, December 18. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000124803
Modular Verification of JML Contracts Using Bounded Model Checking. master’s thesis
Klamroth, J.
2019, March 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000122228
UC-sichere private Schnittmengenberechnung mit transparenten Enklaven. master’s thesis
Zinkina, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000099120
Journal Articles
Digitale Mobilität
Spiecker gen. Döhmann, I.
2019. Gewerblicher Rechtsschutz und Urheberrecht, 341–352
Können Algorithmen diskriminieren
Spiecker gen. Döhmann, I.; Fröhlich, W.
2019. Zeitschrift des Deutschen Juristinnenbundes : djbZ, 22, 91–93
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Game-theoretical model on the GDPR: Market for lemons?
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Journal of intellectual property, information technology and electronic commerce law, 10 (2), 200–208
Modeling and control of multimodal and hybrid energy systems (Editorial)
Wolter, M.; Hagenmeyer, V.
2019. Automatisierungstechnik, 67 (11), 891–892. doi:10.1515/auto-2019-0112
Web Application Security (Dagstuhl Seminar 18321)
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Datenschutz und Datensicherheit, 43 (5), 270–275. doi:10.1007/s11623-019-1106-6
Sichere Instant Messaging Apps
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Ralf Reussner
2019. Communications in computer and information science, 977, 109–124. doi:10.1007/978-3-030-25109-3_6
Mehr als nur Whistleblowing: das Gesetz zum Schutz von Geschäftsgeheimnissen
Müllmann, D.
2019. Zeitschrift für Rechtspolitik, (1), 25–26
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
An extensible approach to implicit incremental model analyses
Hinkel, G.; Heinrich, R.; Reussner, R.
2019. Software and systems modeling, 18 (5), 3151–3187. doi:10.1007/s10270-019-00719-y
Books
Managed Software Evolution
Reussner, R.; Goedicke, M.; Hasselbring, W.; Vogel-Heuser, B.; Keim, J.; Märtin, L. (Eds.)
2019. Springer Nature. doi:10.1007/978-3-030-13499-0
Gesundheitsversorgung in Zeiten der DSGVO
Spiecker gen. Döhmann, I.; Wallrabenstein, A. (Eds.)
2019. Lang. doi:10.3726/b15795
Datenschutzrecht DSGVO mit BDSG
Simitis, S.; Albrecht, J. P.
2019. (Spiecker gen. Döhmann & G. Hornung, Eds.), Nomos Verlagsgesellschaft
Book Chapters
Formal Verification of Evolutionary Changes
Beckert, B.; Mund, J.; Ulbrich, M.; Weigl, A.
2019. Managed Software Evolution. Hrsg.: Ralf H. Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, 309–332, Springer. doi:10.1007/978-3-030-13499-0_11
Challenges of Using Trusted Computing for Collaborative Data Processing
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2019. Security and Trust Management – 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings. Ed.: S. Mauw, 107–123, Springer. doi:10.1007/978-3-030-31511-5_7
TEE-based distributed watchtowers for fraud protection in the Lightning Network
Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H.
2019. Data privacy management, cryptocurrencies and blockchain technology. Ed.: C. Pérez-Solà, 177–194, Springer Nature. doi:10.1007/978-3-030-31500-9_11
Verfassungsrechtliche Grundlagen des Europäischen und nationalen Datenschutzrechts
Bretthauer, S.
2019. Handbuch europäisches und deutsches Datenschutzrecht. Hrsg.: L. Specht, 7–37, Verlag C.H.Beck
Conference Papers
Towards a Correspondence Model for the Reuse of Software in Multiple Domains
Koch, S.; Reiche, F.
2019. 10. Workshop „Design For Future – Langlebige Softwaresysteme“, 41–42, Softwaretechnik-Trends
Towards Reverse Engineering for Component-Based Systemswith Domain Knowledge of the Technologies Used
Schneider, Y. R.; Koziolek, A.
2019. Proceedings of the 10th Symposium on Software Performance (SSP), 35–37, Gesellschaft für Informatik e.V.  (GI)
Towards a conceptual model for unifying variability in space and time
Ananieva, S.; Kehrer, T.; Klare, H.; Koziolek, A.; Lönn, H.; Ramesh, S.; Burger, A.; Taentzer, G.; Westfechtel, B.
2019. Proceedings of the 23rd International Systems and Software Product Line Conference volume B - SPLC ’19, 1–5, ACM Digital Library. doi:10.1145/3307630.3342412
Detecting Parametric Dependencies for Performance Models Using Feature Selection Techniques
Grohmann, J.; Eismann, S.; Elflein, S.; Kistowski, J. V.; Kounev, S.; Mazkatli, M.
2019. 2019 IEEE 27th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 309–322, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MASCOTS.2019.00042
Heuristic Inference of Model Transformation Definitions from Type Mappings
Gerking, C.; Budde, I.
2019. 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems companion : 15-20 September 2019, Munich, Germany : proceedings. Ed.: L. Burgueño, 182–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS-C.2019.00031
Component-Based Refinement and Verification of Information-Flow Security Policies for Cyber-Physical Microservice Architectures
Gerking, C.; Schubert, D.
2019. IEEE International Conference on Software Architecture : ICSA 2019 : 25-29 March 2019, Hamburg, Germany : proceedings. Ed.: Matthias Riebisch, 61–70, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00015
Physical Layer Privacy in Broadcast Channels
Lin, P.-H.; Kuhn, C.; Strufe, T.; Jorswieck, E. A.
2019. 2019 IEEE International Workshop on Information Forensics and Security (WIFS), 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WIFS47025.2019.9035093
SeCoNetBench: A modular framework for Secure Container Networking Benchmarks
Osman, A.; Hanisch, S.; Strufe, T.
2019. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17-19 June 2019, 21–28, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00009
Sandnet: Towards High Quality of Deception in Container-Based Microservice Architectures
Osman, A.; Bruckner, P.; Salah, H.; Fitzek, F. H. P.; Strufe, T.; Fischer, M.
2019. ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20-24 May 2019, 1–7, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICC.2019.8761171
Detasyr: Decentralized Ticket-based Authorization with Sybil Resistance
Friebe, S.; Martinat, P.; Zitterbart, M.
2019. 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14-17 Oct. 2019, 60–68, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN44214.2019.8990773
Unpatchable? - Der gesetzliche Umgang mit von menschlichem Verhalten ausgehenden Risiken für die IT-Sicherheit kritischer Infrastrukturen
Müllmann, D.
2019. Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI : Tagungsband Herbstakademie 2019. Hrsg.: J. Taeger, 245–260, OlWIR
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
The Industrie 4.0 Asset Administration Shell as Information Source for Security Analysis
Patzer, F.; Volz, F.; Usländer, T.; Blöcher, I.; Beyerer, J.
2019. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) : Paraninfo Building, University of Zaragoza, Zaragoza, Spain, 10-13 September, 2019 : proceedings, 420–427, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2019.8869059
Formal Property-Oriented Design of Voting Rules Using Composable Modules
Diekhoff, K.; Kirsten, M.; Krämer, J.
2019. Algorithmic Decision Theory - 6th International Conference, ADT 2019, Durham, NC, USA, October 25–27, 2019, Proceedings. Ed.: S. Pekeč, 164–166, Springer. doi:10.1007/978-3-030-31489-7
Card-Based Cryptography Meets Formal Verification
Koch, A.; Schrempp, M.; Kirsten, M.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik e.V.  (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin
Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 84–92, Springer International Publishing. doi:10.1007/978-3-030-32101-7_6
Quantum LLL with an application to mersenne number cryptosystems
Tiepelt, M.; Szepieniec, A.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Using Relational Verification for Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2019. Software Engineering and Formal Methods – 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ed.: P. Ölveczky, 353–372, Springer. doi:10.1007/978-3-030-30446-1_19
Understanding Counterexamples for Relational Properties with DIbugger
Herda, M.; Kirsten, M.; Brunner, E.; Plewnia, J.; Scheler, U.; Staudenmaier, C.; Wagner, B.; Zwick, P.; Beckert, B.
2019. Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning (EPTCS), Prague, Czech Republic, 6-7th April 2019. Ed.: E. De Angelis, 6–13, Open Publishing Association. doi:10.4204/EPTCS.296.4
Why Johnny Fails to Protect his Privacy
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Towards Consistency Checking Between Software Architecture and Informal Documentation
Keim, J.; Koziolek, A.
2019. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), Hamburg, 25.-29. März 2019, 250–253, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C.2019.00052
PerOpteryx: Automated Improvement of Software Architectures
Busch, A.; Fuchß, D.; Koziolek, A.
2019. IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019. Tool Demo Track, 162–165. doi:10.1109/ICSA-C.2019.00036
Access Control for Binary Integrity Protection using Ethereum
Stengele, O.; Baumeister, A.; Birnstill, P.; Hartenstein, H.
2019. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT ’19), Toronto, CDN, June 4-6, 2019, 3–12, Association for Computing Machinery (ACM). doi:10.1145/3322431.3325108
Data-driven software architecture for analyzing confidentiality
Seifermann, S.; Heinrich, R.; Reussner, R.
2019. 2019 IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019, Art. Nr.: 8703910, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00009
Verification-based test case generation for information-flow properties
Herda, M.; Müssig, J.; Tyszberowicz, S.; Beckert, B.
2019. 34th Annual ACM Symposium on Applied Computing, SAC 2019; Limassol; Cyprus; 8 April 2019 through 12 April 2019, 2231–2238, Association for Computing Machinery (ACM). doi:10.1145/3297280.3297500
On Tightly Secure Primitives in the Multi-instance Setting
Hofheinz, D.; Nguyen, N. K.
2019. 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019. Ed.: D. Lin, 581–611, Springer. doi:10.1007/978-3-030-17253-4_20
Single underlying models for projectional, multi-view environments
Meier, J.; Klare, H.; Tunjic, C.; Atkinson, C.; Burger, E.; Reussner, R.; Winter, A.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 119–130, SciTePress. doi:10.5220/0007396401190130
Automated incident response for industrial control systems leveraging software-defined networking
Patzer, F.; Meshram, A.; Heß, M.
2019. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 319–327, SciTePress
Applying metamodel-based tooling to object-oriented code
Klare, H.; Saglam, T.; Burger, E.; Reussner, R.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 219–230, SciTePress. doi:10.5220/0007246202190230
Balancing Performance Characteristics of Hierarchical Heavy Hitters
Heseding, H.; Glöckle, J.; Bauer, R.; Zitterbart, M.
2019. IFIP NETWORKING 2019, Warsaw, Poland, May 20-22, 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/IFIPNetworking.2019.8816832
Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin
Grundmann, M.; Leinweber, M.; Hartenstein, H.
2019. Proceedings of 1st IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), Seoul, Südkorea, 14 - 17 Mai 2019, 268–276, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BLOC.2019.8751394
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
Towards computer-aided security life cycle management for critical industrial control systems
Patzer, F.; Meshram, A.; Birnstill, P.; Haas, C.; Beyerer, J.
2019. 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018; Kaunas; Lithuania; 24 September 2018 through 26 September 2018. Ed.: E. Luiijf, 45–56, Springer. doi:10.1007/978-3-030-05849-4_4
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin
Grundmann, M.; Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, (FC 2018), Nieuwpoort, CU, March 2, 2018. Ed.: A. Zohar, 113–126, Springer Verlag. doi:10.1007/978-3-662-58820-8_9
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
2018
PhD Theses
A Framework for Non-Interference in Component-Based Systems. PhD dissertation
Greiner, S.
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000082042
Journal Articles
Auswirkungen der Industrie 4.0 auf den Schutz von Betriebs- und Geschäftsgeheimnissen
Müllmann, D.
2018. Wettbewerb in Recht und Praxis, (10), 1177–1183
Schutz von Geschäftsgeheimnissen
Müllmann, D.
2018. Neue juristische Wochenschrift, (39), 14
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Tobias Hilt
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Systematisierung des IT-Sicherheitsrechts
Raabe, O.; Schallbruch, M.; Steinbrück, A.
2018. Computer und Recht / International, 34 (11), 706–715. doi:10.9785/cr-2018-341105
Der Arbeitnehmer 4.0? Automatisierte Arbeitgeberentscheidungen durch Sensorik am smarten Arbeitsplatz
Brecht, C.; Steinbrück, A.; Wagner, M.
2018. Privacy in Germany : PinG ; Datenschutz und Compliance, 2018 (1), 10–15
Applicability of generalized test tables: a case study using the manufacturing system demonstrator xPPU
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. Automatisierungstechnik, 66 (10), 834–848. doi:10.1515/auto-2018-0028
Enhancing neural non-intrusive load monitoring with generative adversarial networks
Bao, K.; Ibrahimov, K.; Wagner, M.; Schmeck, H.
2018. Energy Informatics, S1 (18), 295–302. doi:10.1186/s42162-018-0038-y
The influence of differential privacy on short term electric load forecasting
Eibl, G.; Bao, K.; Grassal, P.-W.; Bernau, D.; Schmeck, H.
2018. Energy Informatics, S1 (48), 93–113. doi:10.1186/s42162-018-0025-3
Modeling flexibility using artificial neural networks
Förderer, K.; Ahrens, M.; Bao, K.; Mauser, I.; Schmeck, H.
2018. Energy Informatics, S1 (21), 73–91. doi:10.1186/s42162-018-0024-4
Architecture-based change impact analysis in cross-disciplinary automated production systems
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R.; Vogel-Heuser, B.
2018. The journal of systems and software, 146, 167–185. doi:10.1016/j.jss.2018.08.058
IT-Sicherheit - ein rechtsfreier Raum?
Hackenjos, T.; Mechler, J.; Rill, J.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Network Layer Aspects of Permissionless Blockchains
Neudecker, T.; Hartenstein, H.
2018. IEEE communications surveys & tutorials, 21 (1), 838–857. doi:10.1109/COMST.2018.2852480
Low-deterministic security for low-nondeterministic programs
Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2018. Journal of computer security, 26, 335–366. doi:10.3233/JCS-17984
Concern-oriented language development (COLD): Fostering reuse in language engineering
Combemalee, B.; Kienzle, J.; Mussbacher, G.; Barais, O.; Bousse, E.; Cazzola, W.; Collet, P.; Degueule, T.; Heinrich, R.; Jézéquel, J.-M.; Leduc, M.; Mayerhofer, T.; Mosser, S.; Schöttle, M.; Strittmatter, M.; Wortmann, A.
2018. Computer languages, systems and structures, 54, 139–155. doi:10.1016/j.cl.2018.05.004
Books
Dokumentation zum Datenschutzrecht mit Informationsfreiheitsrecht
Spiecker gen. Döhmann, I.; Bretthauer, S. (Eds.)
2018. Nomos Verlagsgesellschaft
Book Chapters
Industrial Security by Design : Nachverfolgbare Informationssicherheit für Cyber-Physische Produktionssysteme
Gerking, C.; Bodden, E.; Schäfer, W.
2018. Handbuch Gestaltung digitaler und vernetzter Arbeitswelten. Hrsg.: G. W. Maier, 1–24, Springer. doi:10.1007/978-3-662-52903-4_8-1
Schutz von Betriebs- und Geschäftsgeheimnissen in Industrie 4.0-Umgebungen
Müllmann, D.
2018. Rechtsfragen digitaler Transformation - Gestaltung digitaler Veränderungsprozesse durch Recht. Tagungsband der Deutsche Stiftung für Recht und Informatik (DSRI). Hrsg.: J. Taeger, 697–711, OlWIR
Illi Isabellistes Se Custodes Egregios Praestabant
Bischof, S.; Breitner, J.; Lohner, D.; Snelting, G.
2018. Principled Software Development – Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Ed.: P. Müller, 267–282, Springer International Publishing. doi:10.1007/978-3-319-98047-8_17
Reusing Tamper-Proof Hardware in UC-Secure Protocols
Mechler, J.; Müller-Quade, J.; Nilges, T.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Human Factors in Security
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Conference Papers
Towards Semantic Composition of Event-Based Simulation
Koch, S.
2018. Softwaretechnik-Trends. Berichte aus den Fachgruppen und Arbeitskreisen FG SRE: 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) und 9. Workshop "Design for Future" des GI-Arbeitskreises "Langlebige Softwaresysteme" (L2S2), Bad-Honnef, 59–50, Softwaretechnik-Trends
Specification of Information Flow Security Policies in Model-Based Systems Engineering
Gerking, C.
2018. M. Mazzara, I. Ober & G. Salaün (Eds.), Software technologies: applications and foundations: STAF 2018 collocated workshops, Toulouse, France, June 25-29, 2018 : revised selected papers. Ed.: Manuel Mazzara, 617–632, Springer. doi:10.1007/978-3-030-04771-9_47
Towards ensuring security by design in cyber-physical systems engineering processes
Geismann, J.; Gerking, C.; Bodden, E.
2018. M. Kuhrmann, R. V. O’Connor & D. Houston (Eds.), Proceedings of the 2018 International Conference on Software and System Process (ICSSP ’18) : Gothenburg, Sweden, May 26 - 27, 2018. Ed.: Marco Kuhrmann, 123–127, Association for Computing Machinery (ACM). doi:10.1145/3202710.3203159
Model Checking the Information Flow Security of Real-Time Systems
Gerking, C.; Schubert, D.; Bodden, E.
2018. M. Payer, A. Rashid & J. M. Such (Eds.), Engineering Secure Software and Systems : 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings. Ed.: Mathias Payer, 27–43, Springer. doi:10.1007/978-3-319-94496-8_3
Towards Preserving Information Flow Security on Architectural Composition of Cyber-Physical Systems
Gerking, C.; Schubert, D.
2018. C. E. Cuesta, D. Garlan & J. Pérez (Eds.), Software Architecture : 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018, Proceedings. Ed. by Carlos E. Cuesta, David Garlan, Jennifer Pérez, 147–155, Springer. doi:10.1007/978-3-030-00761-4_10
Interactively Secure Groups from Obfuscation
Agrikola, T.; Hofheinz, D.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Tailored quality modeling and analysis of software-intensive systems
Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 336–341, Knowledge Systems Institute. doi:10.18293/SEKE2018-020
Modeling and Simulation of Load Balancing Strategies for Computing in High Energy Physics
Caspart, R.; Firnkes, P.; Giffels, M.; Koziolek, A.; Quast, G.; Reussner, R.; Stemmer-Grabow, M.
2018. CHEP 2018 - 23rd International Conference on Computing in High Energy and Nuclear Physics, Sofia, BG, July 9-13,2018. Ed.: P. Hristov, EDP Sciences
Considering Not-quantified Quality Attributes in an Automated Design Space Exploration
Busch, A.; Koziolek, A.
2018. Software Engineering 2018 - Fachtagung des GI-Fachbereichs Softwaretechnik (SE 20108), Ulm, 06.-09. März 2018, Gesellschaft für Informatik e.V.  (GI)
A Cross-Disciplinary Language for Change Propagation Rules
Busch, K.; Werle, D.; Loper, M.; Heinrich, R.; Reussner, R.; Vogel-Heuser, B.
2018. IEEE 14th International Conference on Automation Science and Engineering (CASE 2018), München, 20.-24. August 2018, 1099–1104, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560364
Automated Analysis of the Co-evolution of Software Systems and Business Processes
Busch, K.; Heinrich, R.; Busch, A.; Reussner, R. H.
2018. Software Engineering und Software Management 2018, Ulm, 5.-9. März 2018. Hrsg.:M. Tichy, 159–160, Gesellschaft für Informatik e.V.  (GI)
Rapid Testing of IaaS Resource Management Algorithms via Cloud Middleware Simulation
Stier, C.; Domaschka, J.; Koziolek, A.; Krach, S.; Krzywda, J.; Reussner, R.
2018. Proceedings of the 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 184–191, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184428
An approach to requirement analysis in automated production systems
Maier, T.; Busch, K.; Reussner, R.
2018. 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) - 9. Workshop „Design for Future“des GI-Arbeitskreises „Langlebige Softwaresysteme“ (L2S2), Bad-Honnef, 02.-04. Mai 2018
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Reussner, R.
2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, P, January 22-24, 2018. Ed.: P. Mori. Vol. 1, 74–82, SciTePress. doi:10.5220/0006606200740082
A Methodology for Domain-Spanning Change Impact Analysis
Heinrich, R.; Busch, K.; Koch, S.
2018. 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2018), Prague, CZ, August 29-31, 2018, 326–330, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00060
Investigating Performance Metrics for Scaling Microservices in CloudIoT-Environments
Gotin, M.; Lösch, F.; Heinrich, R.; Reussner, R.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 09.-13. April 2018, 157–167, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184430
A Model-Based Approach to Calculate Maintainability Task Lists of PLC Programs for Factory Automation
Busch, K.; Rätz, J.; Koch, S.; Heinrich, R.; Reussner, R.; Cha, S.; Seitz, M.; Vogel-Heuser, B.
2018. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON 2018), Washington DC, October 20-23, 2018, 2949–2954, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2018.8591302
Predicting the Perceived Modularity of MOF-based Metamodels
Hinkel, G.; Strittmatter, M.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 48–58, SciTePress
Automated Consistency Preservation in Electronics Development of Cyber-Physical Systems
Zimmermann, D.; Reussner, R. H.
2018. Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops,Toulouse, France, June 25–29, 2018. Ed.: M. Mazzara, 506–511, Springer Nature. doi:10.1007/978-3-030-04771-9_36
Formal Specification and Verification of Hyperledger Fabric Chaincode
Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J.
2018. 3rd Symposium on Distributed Ledger Technology (SDLT-2018) co-located with ICFEM 2018: the 20th International Conference on Formal Engineering Methods, Gold Coast, Australia, November 12, 2018, 44–48, Institute for Integrated and Intelligent Systems
Towards automatic argumentation about voting rules
Kirsten, M.; Cailloux, O.
2018. 4ème conférence sur les Applications Pratiques de l’Intelligence Artificielle, APIA 2018, Nancy, France, July 2-3, 2018., Ed.: S. Bringay, J. Mattioli
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems
Birnstill, P.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, (PETRA), Corfu, Greece, June 26-29, 2018, 292–296, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201563
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2018. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, 85–91, Association for Computing Machinery (ACM). doi:10.1145/3205977.3205990
The EU General Data Protection Regulation and its Effects on Designing Assistive Environments
Krempel, E.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018, 327–330, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201567
Achieving delta description of the control software for an automated production system evolution
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. 14th IEEE International Conference on Automation Science and Engineering, CASE 2018; Technical University MunichMunich; Germany; 20 August 2018 through 24 August 2018, 1170–1176, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560588
Assistance in Daily Password Generation Tasks
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Towards Application of Cuckoo Filters in Network Security Monitoring
Grashöfer, J.; Jacob, F.; Hartenstein, H.
2018. 14th International Conference on Network and Service Management (CNSM), Rome, Italy, Nov. 5 - Nov. 9, 2018, 373–377, Institute of Electrical and Electronics Engineers (IEEE)
Using dependence graphs to assist verification and testing of information-flow properties
Herda, M.; Tyszberowicz, S.; Beckert, B.
2018. Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings. Ed. by Catherine Dubois, Burkhart Wolff, 83–102, Springer. doi:10.1007/978-3-319-92994-1_5
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode
Hamann, T.; Herda, M.; Mantel, H.; Mohr, M.; Schneider, D.; Tasch, M.
2018. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018; Proceedings. Ed.: N. Gruschka, 437–453, Springer Nature. doi:10.1007/978-3-030-03638-6_27
Relational Equivalence Proofs Between Imperative and MapReduce Algorithms
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. Verified Software: Theories, Tools, and Experiments; 10th International Conference, VSTTE 2018; Oxford, UK, July 18–19, 2018; Revised Selected Papers. Ed.: R. Piskac, 248–266, Springer Nature. doi:10.1007/978-3-030-03592-1_14
Guidance of architectural changes in technical systems with varying operational modes
Märtin, L.; Forjahn, N.-A.; Koziolek, A.; Reussner, R.
2018. Software Architecture: 12th European Conference on Software Architecture (ECSA 2018), Madrid, E, September 24-28, 2018; Proceedings. Ed.: C.E. Cuesta, 37–45, Springer Nature. doi:10.1007/978-3-030-00761-4_3
Using informal knowledge for improving software quality trade-off decisions
Schneider, Y.; Busch, A.; Koziolek, A.
2018. Software Architecture: 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018; Proceedings, 265–283, Springer Nature. doi:10.1007/978-3-030-00761-4_18
Categories of change triggers in business processes
Kaplan, A.; Busch, K.; Koziolek, A.; Heinrich, R.
2018. Euromicro Conference on Software Engineering and Advanced Applications 2018 (SEAA 2018), Prague, CZ, August 29-31, 2018. Ed.: T. Bures, 252–259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00049
A model-based approach for build avoidance
Neumann, M.; Busch, K.; Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 104–109, KSI. doi:10.18293/SEKE2018-030
Using theorem provers to increase the precision of dependence analysis for information flow control
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2018. 20th International Conference on Formal Engineering Methods, ICFEM 2018; Gold Coast; Australia; 12 November 2018 through 16 November 2018. Ed.: J. Sun, 284–300, Springer. doi:10.1007/978-3-030-02450-5_17
Modularizing and layering metamodels with the modular EMF designer
Kechaou, A.; Strittmatter, M.
2018. 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2018), Copenhagen, DK, October 14-19, 2018, 32–36, Association for Computing Machinery (ACM). doi:10.1145/3270112.3270119
Towards a notion of coverage for incomplete program-correctness proofs
Beckert, B.; Herda, M.; Kobischke, S.; Ulbrich, M.
2018. 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018; Limassol; Cyprus; 5 November 2018 through 9 November 2018. Ed.: T. Margaria, 53–63, Springer. doi:10.1007/978-3-030-03421-4_4
Aligning Business Process Access Control Policies with Enterprise Architecture
Pilipchuk, R.; Seifermann, S.; Heinrich, R.
2018. Proceedings of the Central European Cybersecurity Conference 2018 (CECC 2018), Ljubljana, SLO, November 15-16, 2018, Article no 17, Association for Computing Machinery (ACM). doi:10.1145/3277570.3277588
Modeling of dynamic trust contracts for industry 4.0 systems
Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Seifermann, S.; Walter, M.
2018. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings (ECSA 2018), Madrid, E, September 24-28, 2018, 45:1–45:4, Association for Computing Machinery (ACM). doi:10.1145/3241403.3241450
Towards a metamodel for modular simulation environments
Koch, S.; Reiche, F.; Heinrich, R.
2018. ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS), Kopenhagen, DK, October 14-19, 2018. Ed.: R. Hebig
Integrating semantically-related legacy models in vitruvius
Mazkatli, M.; Burger, E.; Quante, J.; Koziolek, A.
2018. 10th ACM/IEEE International Workshop on Modelling in Software Engineering, MiSE 2018; Gothenburg; Sweden; 27 May 2018 through 28 May 2018, 41–48, Association for Computing Machinery (ACM). doi:10.1145/3193954.3193961
Identifying Microservices Using Functional Decomposition
Tyszberowicz, S.; Heinrich, R.; Liu, B.; Liu, Z.
2018. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2018), Beijing, CHN, September 4-6, 2018, 50–65, Springer. doi:10.1007/978-3-319-99933-3_4
Refinements and structural decompositions in generated code
Hinkel, G.; Busch, K.; Heinrich, R.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 303–310, SciTePress
Continuous integration of performance model
Mazkatli, M.; Koziolek, A.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018) Berlin, 9.-13. April 2018, 153–158, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186285
Diagnosis of privacy and performance problems in the context of mobile applications
Monschein, D.; Heinrich, R.; Heger, C.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 167–172, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186283
Branchenreport UX/Usability 2018
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Non-malleability vs. CCA-Security: The Case of Commitments
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2018-ws08-0542
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
Stengele, O.; Hartenstein, H.
2018. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Ed.: J. Garcia-Alfaro, 85–93, Springer International Publishing. doi:10.1007/978-3-030-00305-0_7
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
The palladio-bench for modeling and simulating software architectures
Heinrich, R.; Werle, D.; Klare, H.; Reussner, R.; Kramer, M.; Becker, S.; Happe, J.; Koziolek, H.; Krogmann, K.
2018. 40th ACM/IEEE International Conference on Software Engineering (ICSE 2018), Gothenburg, S, May 27 June 3, 2018, 37–40, Association for Computing Machinery (ACM). doi:10.1145/3183440.3183474
Developing and Evaluating a Five Minute Phishing Awareness Video
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
Proving equivalence between imperative and MapReduce implementations using program transformations
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018; Thessaloniki; Greece; 20 April 2018. Ed.: R. van Glabbeek, 185–199, Open Publishing Association. doi:10.4204/EPTCS.268.7
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Variants and Versions Management for Models with Integrated Consistency Preservation
Ananieva, S.; Klare, H.; Burger, E.; Reussner, R.
2018. Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems (VAMOS 2018), Madrid, E, February 7-9, 2018, 3–10, Association for Computing Machinery (ACM). doi:10.1145/3168365.3168377
2017
PhD Theses
Specification Languages for Preserving Consistency between Models of Different Languages. PhD dissertation
Kramer, M. E.
2017. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000069284
Journal Articles
Supporting the Development of Interdisciplinary Product Lines in the Manufacturing Domain
Kowal, M.; Ananieva, S.; Thüm, T.; Schaefer, I.
2017. IFAC-PapersOnLine, 50 (1), 4336–4341. doi:10.1016/j.ifacol.2017.08.870
Auf dem Weg zu datenschutzfreundlichen Dashcams - Technische Maßnahmen zur Erhögung des Datenschutzes
Bretthauer, S.; Wagner, P. G.; Birnstill, P.; Krempel, E.
2017. Datenschutz und Datensicherheit, 41 (3), 159–164
Coercion-resistant proxy voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Maintenance effort estimation with KAMP4aPS for cross-disciplinary automated PLC-based Production Systems - a collaborative approach
Vogel-Heuser, B.; Heinrich, R.; Cha, S.; Rostami, K.; Ocker, F.; Koch, S.; Reussner, R.; Ziegltrum, S.
2017. IFAC-PapersOnLine, 50 (1), 4360–4367. doi:10.1016/j.ifacol.2017.08.877
Automating regression verification of pointer programs by predicate abstraction
Klebanov, V.; Rümmer, P.; Ulbrich, M.
2017. Formal methods in system design, 1–31. doi:10.1007/s10703-017-0293-8
A survey on design and implementation of protected searchable data in the cloud
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
A threat analysis of the vehicle-to-grid charging protocol ISO 15118
Bao, K.; Valev, H.; Wagner, M.; Schmeck, H.
2017. Computer science - research and development, 33 (1-2), 3–12. doi:10.1007/s00450-017-0342-y
Sicherheit relativ definieren
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Smart Meter im Spannungsfeld zwischen Europäischer Datenschutzgrundverordnung und Messstellenbetriebsgesetz
Bretthauer, S.
2017. Zeitschrift für das gesamte Recht der Energiewirtschaft, (3), 56–61
Big und Smart Data: Zweckbindung zwecklos?
Spiecker gen. Döhmann, I.
2017. Spektrum der Wissenschaft, 2017 (1), 56–62
A Privacy-Aware Fall Detection System for Hospitals and Nursing Facilities
Krempel, E.; Birnstill, P.; Beyerer, J.
2017. European Journal for Security Research. doi:10.1007/s41125-017-0016-6
Using internal domain-specific languages to inherit tool support and modularity for model transformations
Hinkel, G.; Goldschmidt, T.; Burger, E.; Reussner, R.
2017. Software and systems modeling, 18 (1), 129–155. doi:10.1007/s10270-017-0578-9
Integrating business process simulation and information system simulation for performance prediction
Heinrich, R.; Merkle, P.; Henss, J.; Paech, B.
2017. Software and systems modeling, 16 (1), 257–277. doi:10.1007/s10270-015-0457-1
Book Chapters
Reference Scenarios for Self-aware Computing
Kephart, J. O.; Maggio, M.; Diaconescu, A.; Giese, H.; Hoffmann, H.; Kounev, S.; Koziolek, A.; Lewis, P.; Robertsson, A.; Spinner, S.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 87–106, Springer International Publishing. doi:10.1007/978-3-319-47474-8_4
Assessing Self-awareness
Esterle, L.; Bellman, K. L.; Becker, S.; Koziolek, A.; Landauer, C.; Lewis, P.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 465–481, Springer International Publishing. doi:10.1007/978-3-319-47474-8_15
An Architectural Model-Based Approach to Quality-Aware DevOps in Cloud Applicationsc
Heinrich, R.; Jung, R.; Zirkelbach, C.; Hasselbring, W.; Reussner, R.
2017. Software Architecture for Big Data and the Cloud. Ed.: I. Mistrik, 69–89, Elsevier
An Introduction to Voting Rule Verification
Beckert, B.; Bormer, T.; Goré, R.; Kirsten, M.; Schürmann, C.
2017. Trends in Computational Social Choice. Ed by.: Ulle Endriss, 269–287, AI Access
Automatic Margin Computation for Risk-Limiting Audits
Beckert, B.; Kirsten, M.; Klebanov, V.; Schürmann, C.
2017. Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Ed.: R. Krimmer, M. Volkamer, J. Barrat, J. Benaloh, N. J. Goodman, P. Y. A. Ryan, V. Teague, 18–35, Springer International Publishing. doi:10.1007/978-3-319-52240-1_2
Guided Information Markets by the latest European Court of Justice decisions - the Google Spain, Weltimmo and Schrems (Safe Harbor) Decisions
Spiecker gen. Döhmann, I.
2017. Privacy in a Digital Age: Perspectives from Two Continents. Ed.: R. L. Weaver; S. I. Friedland, W. Gilles; I. Bouhadana, 17–46, Carolina Academic Press
Security by Delegation für Industrie 4.0
Jung, M.
2017. Kommunikation und Bildverarbeitung in der Automation. Ed.: J. Jasperneite, Lohweg V., 73–84, Springer Verlag. doi:10.1007/978-3-662-55232-2_6
Smart Home, Smart Grid, Smart Meter - digitale Konzepte und das Recht an Daten
Spiecker gen. Döhmann, I.
2017. Herausforderung Utility 4.0 - Wie sich die Energiewirtschaft im Zeitalter der Digitalisierung verändert. Hrsg.: O. Doleski, 285–300, Springer Verlag. doi:10.1007/978-3-658-15737-1_15
Die technischen Grenzen des Rechts: Recht durch Technik und Technik durch Recht
Spiecker gen. Döhmann, I.
2017. Formate der Rechtswissenschaft. Hrsg.: A. Funke, 181–207, Velbrück Wissenschaft
Kommentierung zu §§ 49, 50 MsbG
Raabe, O.
2017. Berliner Kommentar zum Energierecht : Messstellenbetriebsgesetz (MsbG), Band 5. Hrsg.: F. J. Säcker, 896 S., Deutscher Fachverlag GmbH
Conference Papers
How to Efficiently Build a Front-End Tool for UPPAAL: A Model-Driven Approach
Schivo, S.; Yildiz, B. M.; Ruijters, E.; Gerking, C.; Kumar, R.; Dziwok, S.; Rensink, A.; Stoelinga, M.
2017. Dependable software engineering : theories, tools, and applications$dThird International Symposium, SETTA 2017, Changsha, China, October 23-25, 2017 : proceedings. Ed.: K. G. Larsen, 319–336, Springer. doi:10.1007/978-3-319-69483-2_19
Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities
Gerking, C.; Schubert, D.; Budde, I.
2017. E. Guerra & M. van den Brand (Eds.), 10th International Conference, ICMT 2017, held as part of STAF 2017, Marburg, Germany, July 17-18, 2017 : proceedings, 19–34, Springer. doi:10.1007/978-3-319-61473-1_2
Towards the modelling of complex communication networks in AutomationML
Patzer, F.; Sarkar, A.; Birnstill, P.; Schleipen, M.; Beyerer, J.
2017. 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12-15 Sept. 2017, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2017.8247571
Automotive Systems Modelling with Vitruvius
Mazkatli, M.; Burger, E.; Koziolek, A.; Reussner, R. H.
2017. INFORMATIK 2017. Tagung, Chemnitz, 25.- 29. September 2017. Hrsg.: M. Eibl, 1487–1498, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/in2017_148
Reconstructing Development Artifacts for Change Impact Analysis
Rostami, K.; Langhammer, M.; Busch, A.; Gleitze, J.; Heinrich, R.; Reussner, R.
2017. 19. Workshop Software-Reengineering & Evolution, Bad Honnef, 08.-10.05.2017
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses
Stier, C.; Koziolek, A.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 99–100, Gesellschaft für Informatik e.V.  (GI)
Change Impact Analysis by Ar chitectur e-based Assessment and Planning
Rostami, K.; Stammel, J.; Heinrich, R.; Reussner, R.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 69–70, Gesellschaft für Informatik e.V.  (GI)
Welthandel mit Daten
Spiecker gen. Döhmann, I.
2017. Globalisierung und Datenschutz. 22. Wiesbadener Forum Datenschutz, 23.10.2017, Wiesbaden. Hrsg.: M. Ronellenfitsch
Defining a Security-Oriented Evolution Scenario for the CoCoME Case Study
Pilipchuk, R.; Seifermann, S.; Taspolatoglu, E.
2017. 4nd Collaborative Workshop on Evolution and Maintenance of Long-Living Software Systems (EMLS’17), Hannover, 21. Februar 2017, 70–73, Universität Duisburg-Essen
Supporting software architecture evolution by functional decomposition
Faitelson, D.; Heinrich, R.; Tyszberowicz, S. S.
2017. MODELSWARD 2017 : Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, Porto, P, February 19-21, 2017. Ed.: L. Pires. Vol. 1, 435–442, SciTePress. doi:10.5220/0006206204350442
On using sarkar metrics to evaluate the modularity of metamodels
Hinkel, G.; Strittmatter, M.
2017. MODELSWARD 2017 : proceedings of the 5th International Conference on Model-Driven Engineering and Software Development : Porto, P, February 19-21, 2017. Ed.: L. Pires, 253–260, SciTePress. doi:10.5220/0006105502530260
Branchenreport UX/Usability 2017
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Architecture-driven reduction of specification overhead for verifying confidentiality in component-based software systems
Yurchenko, K.; Behr, M.; Klare, H.; Kramer, M.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017. Ed.: L. Burgueño, 321–323, RWTH Aachen
Proving JDK’s Dual Pivot Quicksort Correct
Beckert, B.; Schiffl, J.; Schmitt, P. H.; Ulbrich, M.
2017. Verified Software : Theories, Tools, and Experiments, Proceedings of the 9th International Conference, VSTTE 2017, Revised Selected Papers, Heidelberg, Germany, 22nd - 23th July 2017. Ed.: A. Paskevich, 35–48, Springer. doi:10.1007/978-3-319-72308-2_3
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools
Klare, H.; Burger, E.; Kramer, M.; Langhammer, M.; Saglam, T.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017, 221–228, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS.2017.30
User-Centric Secure Data Sharing: Exploration of Concepts and Values
Grashöfer, J.; Degitz, A.; Raabe, O.
2017. Informatik 2017 : 25.-29. September 2017 Chemnitz, Deutschland. Bd. 2. Hrsg.: M. Eibl, 1243–1258, Gesellschaft für Informatik e.V.  (GI). doi:10.18420/in2017_126
The Minimum Number of Cards in Practical Card-Based Protocols
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
A Non-Invasive Cyberrisk in Cooperative Driving
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Attacks on Secure Logging Schemes
Hartung, G.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Automatic Evaluation of Complex Design Decisions in Component-based Software Architectures
Scheerer, M.; Busch, A.; Koziolek, A.
2017. MEMOCODE ’17 : Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, Vienna, Austria, 29th September - 2nd October 2017, 67–76, Association for Computing Machinery (ACM). doi:10.1145/3127041.3127059
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Could Network Information Facilitate Address Clustering in Bitcoin?
Neudecker, T.; Hartenstein, H.
2017. Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7th April 2017. Ed.: M. Brenner, 155–169, Springer. doi:10.1007/978-3-319-70278-0_9
An interaction concept for program verification systems with explicit proof object
Beckert, B.; Grebing, S.; Ulbrich, M.
2017. Hardware and Software : Verification and Testing, 13th International Haifa Verification Conference, Haifa, Israel, 13th - 15th November 2017. Ed.: O. Strichman, 163–178, Springer. doi:10.1007/978-3-319-70389-3_11
Towards Realising Oblivious Voting
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Computing Exact Loop Bounds for Bounded Program Verification
Liu, T.; Tyszberowicz, S.; Beckert, B. ..; Taghdiri, M.
2017. Dependable Software Engineering : Theories, Tools, and Applications, 3rd International Symposium, SETTA 2017, Proceedings, Changsha, China, 23rd - 25th October. Ed.: O. Sokolsky, 147–163, Springer. doi:10.1007/978-3-319-69483-2_9
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Anonymous coinjoin transactions with arbitrary values
Maurer, F. K.; Neudecker, T.; Florian, M.
2017. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; Sydney; Australia; 1 August 2017 through 4 August 2017, 522–529, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.280
Generalised Test Tables : A Practical Specification Language for Reactive Systems
Beckert, B.; Cha, S.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 129–144, Springer. doi:10.1007/978-3-319-66845-1_9
SemSlice : Exploiting Relational Verification for Automatic Program Slicing
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 312–319, Springer. doi:10.1007/978-3-319-66845-1_20
Deriving Power Models for Architecture-Level Energy Efficiency Analyses
Stier, C.; Werle, D.; Koziolek, A.
2017. Computer Performance Engineering : 14th European Workshop, EPEW 2017, Berlin, Germany, 7th - 8th September 2017. Ed.: P. Reinecke, 214–229, Springer International Publishing. doi:10.1007/978-3-319-66583-2_14
Modular verification of information flow security in component-based systems
Greiner, S.; Mohr, M.; Beckert, B.
2017. 15th IEEE International Conference on Software Engineering and Formal Methods, Trento, Italy, 4th - 8th September 2017. Ed.: A. Cimatti, 300–315, Springer. doi:10.1007/978-3-319-66197-1_19
CASPA : A platform for comparability of architecture-based software performance engineering approaches
Dullmann, T. F.; Heinrich, R.; Van Hoorn, A.; Pitakrat, T.; Walter, J.; Willnecker, F.
2017. 2017 IEEE International Conference on Software Architecture Workshops (ICSAW 2017), Gothenburg, S, Apriel 3-7, 2017, 294–297, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSAW.2017.26
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Generalized Test Tables: A Powerful and Intuitive Specification Language for Reactive Systems
Weigl, A.; Wiebe, F.; Ulbrich, M.; Ulewicz, S.; Cha, S.; Kirsten, M.; Beckert, B.; Birgit Vogel-Heuser
2017. 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, July 24-26 2017, Institute of Electrical and Electronics Engineers (IEEE)
Architecture-Based Change Impact Analysis in Information Systems and Business Processes
Rostami, K.; Heinrich, R.; Busch, A.; Reussner, R.
2017. ICSA 2017 : 2017 IEEE International Conference on Software Architecture : proceedings : 3-7 April 2017, Gothenburg, Sweden, 179–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2017.17
Anomaly Detection in Industrial Networks using Machine Learning : A Roadmap
Meshram, A.; Haas, C.
2017. Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016. Ed.: J. Beyerer, 65–72, Springer Verlag. doi:10.1007/978-3-662-53806-7_8
Combining Graph-Based and Deduction-Based Information-Flow Analysis
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2017. ETAPS 2017: 5th Workshop on Hot Issues in Security Principles and Trust : Hotspot 2017, Uppsala, Sweden, 22-29 April 2017, 6–25, Theoretical Foundations of Security Analysis and Design (IFIP WG 1.7)
Performance Engineering for Microservices: Research Challenges and Directions
Heinrich, R.; Van Hoorn, A.; Knoche, H.; Li, F.; Lwakatare, L. E.; Pahl, C.; Schulte, S.; Wettinger, J.
2017. 8th ACM/SPEC on International Conference on Performance Engineering (ICPE 2017), L’Aquila, I, April 22-26, 2017, 223–226, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053653
A Generic Platform for Transforming Monitoring Data into Performance Models
Kunz, J.; Heger, C.; Heinrich, R.
2017. 8th ACM/SPEC International Conference on Performance Engineering, L’Aquila, I, April 22-26, 2017, 151–156, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053635
Concurrently composable security with shielded super-polynomial simulators
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Adaptive partitioning
Hofheinz, D.
2017. Advances in Cryptology – EUROCRYPT 2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017. Ed.: J.-S. Coron, 489–518, Springer. doi:10.1007/978-3-319-56617-7_17
Capturing ambiguity in artifacts to support requirements engineering for self-adaptive systems
Muñoz-Fernández, J. C.; Knauss, A.; Castañeda, L.; Derakhshanmanesh, M.; Heinrich, R.; Becker, M.; Taherimakhsousi, N.
2017. Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, 27. Februar 2017. Ed.: E. Knauss, RWTH Aachen
A database adapter for secure outsourcing
Dowsley, R.; Gabel, M.; Yurchenko, K.; Zipf, V.
2017. 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, L, December 12-15, 2016, 503–508, IEEE Computer Society. doi:10.1109/CloudCom.2016.0088
2016
Journal Articles
Challenges in Secure Software Evolution - The Role of Software Architecture
Seifermann, S.; Taspolatoglu, E.; Reussner, R. H.; Heinrich, R.
2016. Softwaretechnik-Trends, 36 (1)
Challenges to Trading-Off Performance and Privacy of Component-Based Systems
Seifermann, S.; Yurchenko, K.; Kramer, M. E.
2016. Softwaretechnik-Trends, 36 (4)
Spot the phish by checking the pruned URL
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
A Framework for a Uniform Quantitative Description of Risk with Respect to Safety and Security
Beyerer, J.; Geisler, J.
2016. European Journal for Security Research, 1 (2), 135–150. doi:10.1007/s41125-016-0008-y
Zweckkonforme und zweckändernde Weiternutzung
Müllmann, D.
2016. Neue Zeitschrift für Verwaltungsrecht, 35 (23), 1692–1696
The regulation of commercial profiling - a comparative analysis
Spiecker gen. Döhmann, I.; Tambou, O.; Bernal, P.; Hu, M.; Molinaro, C.; Negre, E.; Sarlet, I.; Schertel Mendes, L.; Witzleb, N.; Yger, F.
2016. European Data Protection Law Review, 2 (4), 535–554
Industry 4.0: Legal Systems, the Social Contract and Health Care
Spiecker gen. Döhmann, I.
2016. Society for Computers and Law, (6/7), 26–28
7 Irrtümer zum Datenschutz im Kontext von Smart Data
Wagner, M.; Raabe, O.
2016. Datenbank-Spektrum, 16 (2), 173–178. doi:10.1007/s13222-016-0218-5
Datenschutz und Datenanalyse
Steinbach, M.; Krempel, E.; Jung, C.; Hoffmann, M.
2016. Datenschutz und Datensicherheit, 40 (7), 440–445
Establishing location privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2016. Ad hoc Networks, 37, Part 1, SI (February), 110–121. doi:10.1016/j.adhoc.2015.07.015
Architectural run-time models for performance and privacy analysis in dynamic cloud applications
Heinrich, R.
2016. ACM SIGMETRICS performance evaluation review, 43 (4), 13–22. doi:10.1145/2897356.2897359
Zuverlässige und sichere Software offener Automatisierungssysteme der Zukunft – Herausforderungen und Lösungswege
Keller, H. B.; Schneider, O.; Matthes, J.; Hagenmeyer, V.
2016. Automatisierungstechnik, 64 (12), 930–947. doi:10.1515/auto-2016-0060
Integrierte Entwicklung zuverlässiger Software
Schneider, O.; Keller, H. B.
2016. Softwaretechnik-Trends, 36 (3), 12–16
Software-based smart factory networking
Bauer, R.; Bless, R.; Haas, C.; Jung, M.; Zitterbart, M.
2016. Automatisierungstechnik, 64 (9), 765–773. doi:10.1515/auto-2016-0072
Tightly secure signatures and public-key encryption
Hofheinz, D.; Jager, T.
2016. Designs, Codes and Cryptography, 80 (1), 29–61. doi:10.1007/s10623-015-0062-x
Information and communication technology in energy lab 2.0: Smart energies system simulation and control center with an open-street-map-based power flow simulation example
Hagenmeyer, V.; Cakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Waczowicz, S.; Mikut, R.
2016. Energy Technology, 4 (1), 145–162. doi:10.1002/ente.201500304
Books
Modeling and Simulating Software Architectures – The Palladio Approach
Reussner, R. H.; Becker, S.; Happe, J.; Heinrich, R.; Koziolek, A.; Koziolek, H.; Kramer, M.; Krogmann, K. (Eds.)
2016. MIT Press
Book Chapters
Praxis der Forschung. Eine Lehrveranstaltung des forschungsnahen Lehrens und Lernens in der Informatik am KIT
Beckert, B.; Beigl, M.; Budde, M.; Burger, E.; Grebing, S.; Kramer, M.; Reussner, R.
2016. Neues Handbuch Hochschullehre. Lehren und Lernen effizient gestalten. Hrsg.: B. Berendt, 55–79, Raabe, Fachverl. für Wiss.-Information
Verantwortung bei begrenztem Wissen in der vernetzten Welt
Spiecker Döhmann, I.
2016. Neue Macht- und Verantwortungsstrukturen in der digitalen Welt. Hrsg.: M. Fehling; U. Schliesky, 53–72, Nomos Verlagsgesellschaft
Datenschutzrecht im Internet in der Kollision
Spiecker gen. Döhmann, I.
2016. Zukunft der informationellen Selbstbestimmung, 137–150, Erich Schmidt Verlag GmbH & Co. KG (ESV)
Gegenrechte – Datenschutz/Schutz von Betriebs- und Geschäftsgeheimnissen, Geistiges Eigentum
Dreier, T.; Spiecker gen. Döhmann, I.
2016. Informationen der öffentlichen Hand - Zugang und Nutzung. Hrsg.: T. Dreier, V. Fischer, A. van Raay, I. Spiecker gen. Döhmann, 165–192, Nomos Verlagsgesellschaft. doi:10.5771/9783845251653-165
A Study on Corporate Compliance with Transparency Requirements of Data Protection Law
Bier, C.; Kömpf, S.; Beyerer, J.
2016. Data protection and privacy : (in)visibilities and infrastructures. Ed.: Ronald Leenes, 271–289, Springer. doi:10.1007/978-3-319-50796-5_10
Technische und organisatorische Umsetzung - Technische Rahmenbedingungen
Bretthauer, S.; Bräuchle, T.
2016. Informationen der öffentlichen Hand : Zugang und Nutzung. Hrsg.: T. Dreier, 395–408, Nomos Verlagsgesellschaft
Conference Papers
Implicit Constraints in Partial Feature Models
Ananieva, S.; Kowal, M.; Thüm, T.; Schaefer, I.
2016. Proceedings of the 7th International Workshop on Feature-Oriented Software Development, 18–27, Association for Computing Machinery (ACM). doi:10.1145/3001867.3001870
Explaining anomalies in feature models
Kowal, M.; Ananieva, S.; Thüm, T.
2016. Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, 132–143, Association for Computing Machinery (ACM). doi:10.1145/2993236.2993248
Traceability of Information Flow Requirements in Cyber-Physical Systems Engineering
Gerking, C.
2016. S. Nejati & R. Salay (Eds.), Proceedings of the Doctoral Symposium at the 19th ACM/IEEE International Conference of Model-Driven Engineering Languages and Systems 2016 (MoDELS 2016), 7 S., Universität Paderborn
Towards Safe Execution of Reconfigurations in Cyber-Physical Systems
Schubert, D.; Heinzemann, C.; Gerking, C.
2016. 19th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2016, 33–38, IEEE Computer Society. doi:10.1109/CBSE.2016.10
Automated Verification for Functional and Relational Properties of Voting Rules
Beckert, B.; Bormer, T.; Kirsten, M.; Neuber, T.; Ulbrich, M.
2016. Sixth International Workshop on Computational Social Choice, COMSOC-2016, Toulouse, France, 22–24 June 2016, 16 S
Recht und Technik - Datenschutz im Diskurs
Spiecker gen. Döhmann, I.; Sorge, C.; Grimm, R.
2016. Informatik 2016, Klagenfurt, Österreich, 26.-30. September 2016. Hrsg.: H. C. Mayr; M. Pinzger, 411–412, Gesellschaft für Informatik e.V.  (GI)
Architectural Data Flow Analysis
Seifermann, S.
2016. 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016, Venice, I, April 5-8, 2016, 270–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.49
Branchenreport UX/Usability 2016
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik e.V.  (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik e.V.  (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer Verlag
Access Pattern Confidentiality-Preserving Relational Databases: Deployment Concept and Efficiency Evaluation
Degitz, A.; Köhler, J.; Hartenstein, H.
2016. Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15th - 16th March 2016
Consideration of values in the design of access control systems
Neudecker, T.; Hayrapetyan, A.; Degitz, A.; Andelfinger, P.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016; Klagenfurt; Austria; 26 September 2016 through 30 September 2016. Ed.: H. C. Mayr, 275–288, Gesellschaft für Informatik e.V.  (GI)
Security by Delegation für Industrie 4.0
Jung, M.
2016. 7. Jahreskolloquium "Kommunikation in der Automation" : 30.11.2016 : KommA 2016 Kommunikation in der Automation. Hrsg.: Jürgen Jasperneite KommA - Kommunikation in der Automation Hochschule Ostwestfalen-Lippe Institut für Industrielle Informationstechnik - inIT, 2 S., Institut für Industrielle Informationstechnik (inIT)
Automated Inversion of Attribute Mappings in Bidirectional Model Transformations
Kramer, M. E.; Rakhman, K.
2016. 5th International Workshop on Bidirectional Transformations, Bx 2016, Eindhoven, Netherlands, 8 April 2016. Hrsg.: Anthony Anjorin, 61–76, RWTH Aachen
Unabhängigkeit von Datenschutzbehörden als Voraussetzung von Effektivität
Spiecker gen. Döhmann, I.
2016. Unabhängiges Verwalten in der Europäischen Union - Unabhängiges Verwalten in Europa, Hamburg, Germany, 18. August 2014. Hrsg.: M. Kröger, 97–120, Mohr Siebeck
Datenschutzziele im Konflikt: Eine Metrik für Unverkettbarkeit als Hilfestellung für den Betroffenen
Bier, C.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 455–468, Gesellschaft für Informatik e.V.  (GI)
Privacy-Dashcam - Datenschutzfreundliche Dashcams durch Erzwingen externer Anonymisierung
Wagner, P.; Birnstill, P.; Krempel, E.; Bretthauer, S.; Beyerer, J.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 427–440, Gesellschaft für Informatik e.V.  (GI)
Sicherheitsanalyse mit JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Bonn, Deutschland, 5. - 7. April 2016. Hrsg.: M. Meier, 11–21, Gesellschaft für Informatik e.V.  (GI)
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
Birnstill, P.; Bier, C.; Wagner, P.; Beyerer, J.
2016. SAM 2016 : proceedings of the 2016 International Conference on Security & Management : WORLDCOMP ’16, July 25-28, 2016, Las Vegas, Nevada, USA. Ed.: Kevin Daimi, 185–191, CSREA Press
PrivacyInsight: The Next Generation Privacy Dashboard
Bier, C.; Beyerer, J.; Kühne, K.
2016. Privacy Technologies and Policy : 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 ; Proceedings. Ed.: Stefan, Schiffner, 135–152, Springer. doi:10.1007/978-3-319-44760-5_9
Towards Measuring The Linkage Risk In Information Flows
Bier, C.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13-14, 2016 : proceedings / Fraunhofer VVS. Ed.: Oliver Ambacher, 293–298, Fraunhofer Verlag
Working And Living In Interaktive Environments - Requirements For Security And Privacy
Krempel, E.; Birnstill, P.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13 - 14, 2016 : proceedings / Fraunhofer VVS Hrsg.: Oliver Ambacher, Rüdiger Quay, Joachim Wagner, 315–322, Fraunhofer Verlag
’Smart Regulation for Smart Industry’ - DatenschutDatenschutz Aspekte des Aktionsplanes der europäischen Kommission zur Digitalisierung der europäischen Industrie
Müllmann, D.
2016. Smart World - Smart Law? : weltweite Netze mit regionaler Regulierung : Tagungsband Herbstakademie 2016. Hrsg.: Jürgen Taeger, 603–619, OlWIR Oldenburger Verlag für Wirtschaft
Multilinear Maps from Obfuscation
Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; Paterson, K. G.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 446–473, Springer Verlag. doi:10.1007/978-3-662-49096-9_19
Tightly CCA-Secure Encryption Without Pairings
Gay, R.; Hofheinz, D.; Kiltz, E.; Wee, H.
2016. 35th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016; Vienna; Austria; 8 May 2016 through 12 May 2016. Ed.: M. Fischlin, 1–27, Springer Verlag. doi:10.1007/978-3-662-49890-3_1
Tool Demonstration: JOANA
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 89–93, Springer Verlag. doi:10.1007/978-3-662-49635-0_5
Algebraic Partitioning : Fully Compact and (almost) Tightly Secure Cryptography
Hofheinz, D.
2016. 13th International Conference on Theory of Cryptography, TCC 2016-A, Proceedings Part I, Tel Aviv, Israel; 10th - 13th January 2016. Ed.: E. Kushilevitz, 251–281, Springer Verlag. doi:10.1007/978-3-662-49096-9_11
On Improvements of Low-Deterministic Security
Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 68–88, Springer Verlag. doi:10.1007/978-3-662-49635-0_4
Secure Audit Logs with Verifiable Excerpts
Hartung, G.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Fault-Tolerant Aggregate Signatures
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer Verlag. doi:10.1007/978-3-662-49384-7_13
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security
Hesse, J.; Hofheinz, D.; Rupp, A.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 416–445, Springer Verlag. doi:10.1007/978-3-662-49096-9_18
Context-Based Architectural Security Analysis
Taspolatoglu, E.; Heinrich, R.
2016. 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016, 281–282, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.55
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2016. The 13th IEEE International Conference on Ubiquitous Intelligence and Computing, The 13th IEEE International Conference on Advanced and Trusted Computing, The 16th IEEE International Conference on Scalable Computing and Communications, The IEEE International Conference on Cloud and Big Data Computing, The IEEE International Conference on Internet of People, The IEEE Smart World Congress and Workshops, Toulouse, F, July 18-21, 2016. Ed.: D. El Baz, 358–367, IEEE Computer Society. doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070
ZeTA-zero-trust authentication: Relying on innate human ability, not technology
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
How to Generate and Use Universal Samplers
Hofheinz, D.; Jager, T.; Khurana, D.; Sahai, A.; Waters, B.; Zhandry, M.
2016. 22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016; Hanoi; Viet Nam; 4 December 2016 through 8 December 2016. Ed. : J. H. Cheon, 715–744, Springer Verlag. doi:10.1007/978-3-662-53890-6_24
A Distributed Key Management Approach
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2016.0089
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings
Bao, K.; Mauser, I.; Kochanneck, S.; Xu, H.; Schmeck, H.
2016. Proceedings of the Article17th Annual Middleware Conference (ACM/IFIP/USENIX Middleware) - First International Workshop on Mashups of Things and APIs (MOTA) - Trento, Italy, December 12-16, 2016, Article No.3, Association for Computing Machinery (ACM). doi:10.1145/3007203.3007215
Smarter Energy by an Intranet of Things in Buildings
Bao, K.; Fiebig, F.; Frank, L.; Kochanneck, S.; Mauser, I.; Schmeck, H.
2016. VDE-Kongress : Internet der Dinge : Technologien, Anwendungen, Perspektiven - Mannheim, 7.-8. November 2016, CD-ROM, VDE Verlag
Standard security does not imply indistinguishability under selective opening
Hofheinz, D.; Rao, V.; Wichs, D.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016. Ed. : A. Smith, 121–145, Springer Verlag. doi:10.1007/978-3-662-53644-5_5
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
Hofheinz, D.; Jager, T.; Rupp, A.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016, 146–168, Springer Verlag. doi:10.1007/978-3-662-53644-5_6
A Formal Treatment of Privacy in Video Data
Fetzer, V.; Müller-Quade, J.; Nilges, T.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Eliciting and refining requirements for comprehensible security
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Pseudo-Random Number Generator Verification: A Case Study
Dörre, F.; Klebanov, V.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing. doi:10.1007/978-3-319-29613-5_4
2015
PhD Theses
Tunable Security for Deployable Data Outsourcing. PhD dissertation
Köhler, J.
2015. KIT Scientific Publishing. doi:10.5445/KSP/1000048084
Magister's Theses
Konzeption und Leistungsbewertung von Database-as-a-Service Ansätzen zur Zugriffsmusterverschleierung. magister’s thesis
Degitz, A.
2015. Karlsruher Institut für Technologie (KIT)
Master's Theses
Funktions- und Performancebewertung von Exploit Mitigation Techniques. master’s thesis
Laschinger, M.
2015. Karlsruher Institut für Technologie (KIT)
Modellierung und Simulation des Bitcoin Peer-to-Peer Netzwerkes. master’s thesis
Bittner, J.
2015. Karlsruher Institut für Technologie (KIT)
Application agnostic confidentiality enforcement for database-centric SaaS offerings. master’s thesis
Fuhry, B.
2015. Karlsruher Institut für Technologie (KIT)
Realitätsnahe Emulation drahtloser Sensornetze in OMNeT++. master’s thesis
Jung, M.
2015. Karlsruher Institut für Technologie (KIT)
Bachelor's Theses
Evaluierung der Kryptographie Bibliothek NaCl zur Anwendung in drahtlosen Sensornetzen. bachelor’s thesis
Männle, K.
2015. Karlsruher Institut für Technologie (KIT)
Journal Articles
Nudging Bank Account Holders Towards More Secure PIN Management
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Daten verschlüsselt speichern und verarbeiten in der Cloud
Müller-Quade, J.; Huber, M.; Nilges, T.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Intelligente Videoüberwachung in Kranken- und Pflegeeinrichtungen von morgen: eine Analyse der Bedingungen nach den Entwürfen der EU-Kommission und des EU-Parlaments für eine DS-GVO
Bretthauer, S.; Krempel, E.; Birnstill, P.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 31, 239–245. doi:10.9785/cr-2015-0406
A new framework for information markets - The ECJ Google Spain decision
Spiecker gen. Döhmann, I.
2015. Common market law review, 52 (4), 1033–1057
Intelligente Videoueberwachung in Kranken- und Pflegeeinrichtungen von morgen
Bretthauer, S.; Birnstill, P.; Krempel, E.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 2015 (4), 239–245
GNUC: A New Universal Composability Framework
Hofheinz, D.; Shoup, V.
2015. Journal of cryptology, 28 (3), 423–508. doi:10.1007/s00145-013-9160-y
Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport
Rupp, A.; Baldimtsi, F.; Hinterwaelder, G.; Paar, C.
2015. ACM transactions on information and system security, 17 (3), Art. Nr.: 10. doi:10.1145/2699904
Privacy-preserving surveillance: an interdisciplinary approach
Birnstill, P.; Bretthauer, S.; Greiner, S.; Krempel, E.
2015. International Data Privacy Law, 5 (4), 298–308. doi:10.1093/idpl/ipv021
An extensive systematic review on the Model-Driven Development of secure systems
Nguyen, P. H.; Kramer, M.; Klein, J.; Le Traon, Y.
2015. Information & software technology, 68, 62–81. doi:10.1016/j.infsof.2015.08.006
A new algorithm for low-deterministic security
Giffhorn, D.; Snelting, G.
2015. International journal of information security, 14 (3), 263–287. doi:10.1007/s10207-014-0257-6
Implementation-level Verification of Algorithms with KeY
Bruns, D.; Mostowski, W.; Ulbrich, M.
2015. International journal on software tools for technology transfer, 17 (6), 729–744. doi:10.1007/s10009-013-0293-y
Understanding probabilistic software leaks
Snelting, G.
2015. Science of computer programming, 97 (P1), 122–126. doi:10.1016/j.scico.2013.11.008
Confidential database-as-a-service approaches: taxonomy and survey
Köhler, J.; Jünemann, K.; Hartenstein, H.
2015. Journal of Cloud Computing, 4 (1), 1–14. doi:10.1186/s13677-014-0025-1
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
Bellare, M.; Hofheinz, D.; Kiltz, E.
2015. Journal of cryptology, 28 (1), 29–48. doi:10.1007/s00145-013-9167-4
Confined Guessing: New Signatures From Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Striecks, C.
2015. Journal of Cryptology, 28 (1), 176–208. doi:10.1007/s00145-014-9183-z
Books
Certification of ICTs in Elections
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Book Chapters
Kooperation als Lösungsansatz in Dreiecksbeziehungen des Verwaltungsrechts
Spiecker genannt Döhmann, I.
2015. 100 Jahre Rechtswissenschaft in Frankfurt. Hrsg.: Fachbereich Rechtswissenschaft der Goethe-Universität Frankfurt am Main, 201–215, Klostermann
Recht und Verhaltenssteuerung
Spiecker genannt Döhmann, I.
2015. Recht, Kultur, Normativität. Hrsg.: Jan-Christoph Marschelke, 49–75, transcript Verlag
Staatliche Instrumente zur Bewältigung von Nicht-Wissens-Szenarien
Spiecker genannt Döhmann, I.
2015. Die Herausforderungen des Rechts in der globalen Risikogesellschaft, Barcelona, 2011. Hrsg.: Merce Darnaculleta Gardella, 43–63
Datenschutz in der Globalisierung - Mission Impossible in einer Welt der Technikzukünfte unter Einwirkung einer neuen europäischen Datenschutz-Grundverordnung?
Spiecker gen. Döhmann, I.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 63–95, KIT Scientific Publishing
Conference Papers
Model-driven test case design for model-to-model semantics preservation
Gerking, C.; Ladleif, J.; Schäfer, W.
2015. A-TEST 2015: Proceedings of the 6th International Workshop on Automating Test Case Design, Selection and Evaluation. Ed.: T. E. J. Vos, 1–7, Association for Computing Machinery (ACM). doi:10.1145/2804322.2804323
Domain-Specific Model Checking for Cyber-Physical Systems
Gerking, C.; Schäfer, W.; Dziwok, S.; Heinzemann, C.
2015. M. Famelis, D. Ratiu, M. Seidl & G. M. K. Selim (Eds.), Proceedings of the 12th Workshop on Model-Driven Engineering, Verification and Validation co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MoDeVVa@MoDELS 2015, 18–27, RWTH Aachen
Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. SAM2015 : proceedings of the 2015 International Conference on Security & Management : Worldcomp’15 : July 27-30, 2015, Las Vegas, Nevada, USA. Ed.: K. Daimi, 130–136, CSREA Press
Protecting sensitive data in a distributed and mobile environment
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. ICCWS 2015, 10th International Conference on Cyber Warfare and Security. Proceedings : Kruger National Park, South Africa, 24-25 March 2015. Ed.: J. Zaaiman, 519–524, Academic Conferences and Publishing International Limited
Exploring Mental Models Underlying PIN Management Strategies
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
A quantitative risk model for a uniform description of safety and security
Beyerer, J.; Geisler, J.
2015. Proceedings of the 10th Future Security - Security Research Conference "Future Security", Berlin, 10, 2015, 317–324, Fraunhofer Verlag
Executive Summary
Hutchison, D.; Nahrstedt, K.; Schöller, M.; Spiecker gen. Döhmann, I.; Tauber, M.
2015. Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations - Report from Dagstuhl (Seminar 15151), Wadern, Germany, 07. – 10. April 2015, 1–4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH (LZI)
On the Security of Public Cloud Storage
Müller, S.; Pallas, F.; Balaban, S.
2015. 10th Future Security Conference 2015 (Future Security 2015). Ed.: J. Beyerer, Fraunhofer Verlag
Idealizing Identity-Based Encryption
Hofheinz, D.; Matt, C.; Maurer, U.
2015. Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security (Proceedings Part 1), Auckland, New Zealand, 29th November - 3rd December 2015. Ed.: T. Iwata, 495–520, Springer Verlag. doi:10.1007/978-3-662-48797-6_21
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Hofheinz, D.; Koch, J.; Striecks, C.
2015. PKC 2015 : Public-Key Cryptography : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, Maryland, USA, 30th March - 1st April 2015. Ed.: J. Katz Public key cryptography - PKC 2015 ; 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 . Ed.: J. Katz, 799–822, Springer Verlag. doi:10.1007/978-3-662-46447-2
Tightly-Secure Authenticated Key Exchange
Bader, C.; Hofheinz, D.; Jager, T.; Kiltz, E.; Li, Y.
2015. Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Proceedings Part I, Warsaw, Poland, 23th - 25th March 2015. Ed.: Y. Dodis, 629–658, Springer Verlag. doi:10.1007/978-3-662-46494-6_26
Privacy Score: Making privacy aspects of surveillance systems comparable
Krempel, E.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Hrsg.: Jürgen Beyerer, 65–72, Fraunhofer Verlag
Graphical Model-based Privacy Policy Editing for Smart Video Surveillance
Birnstill, P.; Burkert, C.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Ed.: Jürgen Beyerer, 81–811, Fraunhofer Verlag
A user study on anonymization techniques for smart video surveillance
Birnstill, P.; Ren, D.; Beyerer, J.
2015. 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2015) : Karlsruhe, Germany, 25 - 28 August 2015 : [including workshop papers], 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2015.7301805
SECURUS : A Provably Secure Database Outsourcing Scheme
Nilges, T.; Köhler, J.
2015. Security Research Conference : 10th Future Security, Proceedings, Berlin, Germany, 15th - 17th September 2015. Ed.: J. Beyerer, 57–67, Fraunhofer Verlag
Zur Architektonik des europäischen und deutschen Datenschutzes im Zeitalter von Vorratsdatenspeicherung, Big Data und IT-Enhancement im Lichte der Google-Spain-Entscheidung des Europäischen Gerichtshofs
Spiecker genannt Döhmann, I.
2015. Datenschutz im digitalen Zeitalter - global, europäisch, national, Vortragsveranstaltung des Instituts für Rundfunkrecht an der Universität zu Köln vom 16. Mai 2014., 61–91, Verlag C.H.Beck
Evaluation der Kryptografiebibliothek NaCl im Kontext drahtloser Sensornetze
Jung, M.; Hergenröder, A.; Männle, K.
2015. 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (FGSN), Erlangen, 23.-24. September 2015. Hrsg.: J. Eckert, 37–40, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups
Beckert, B.; Grebing, S.; Böhl, F.
2015. International Conference on Software Engineering and Formal Methods : SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS - Workshop on Human-Oriented Formal Methods (HOFM), Grenoble, France, September 1-2, 2014. Ed.: C. Canal, 3–19, Springer Verlag. doi:10.1007/978-3-319-15201-1_1
Security of electricity supply in 2030
Raskob, W.; Bertsch, V.; Ruppert, M.; Strittmatter, M.; Happe, L.; Broadnax, B.; Wandler, S.; Deines, E.
2015. Critical Infrastructure Protection and Resilience Europe, Den Haag, Netherlands, 4th - 5th March 2015
Informed Schema Design for Column Store-based Database Services
Bermbach, D.; Müller, S.; Eberhardt, J.; Tai, S.
2015. 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA), Rome, Italy, 19-21 October, 2015, 163–172, IEEE Computer Society. doi:10.1109/SOCA.2015.29
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties
Florian, M.; Walter, J.; Baumgart, I.
2015. ACM 14th Workshop on Privacy in the Electronic Society, WPES 2015; Denver; United States; 12 October 2015, 65–74, Association for Computing Machinery (ACM). doi:10.1145/2808138.2808145
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks
Jung, M.; Hergenröder, A.
2015. Q2SWinet ’15 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Cancun, Mexico; 2 November 2015 through 6 November 2015, 75–82, Association for Computing Machinery (ACM). doi:10.1145/2815317.2815331
Regression Verification for Java Using a Secure Information Flow Calculus
Beckert, B.; Klebanov, V.; Ulbrich, M.
2015. Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP ’15) , Prague, Czech Republic, July 7th, 2015, Art.Nr.: a6, Association for Computing Machinery (ACM). doi:10.1145/2786536.2786544
Change-Driven Consistency for Component Code, Architectural Models, and Contracts
Kramer, M. E.; Langhammer, M.; Messinger, D.; Seifermann, S.; Burger, E.
2015. Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE’15), Montreal, QC, Canada, May 04 - 08, 2015, 21–26, Association for Computing Machinery (ACM). doi:10.1145/2737166.2737177
JoDroid: Adding Android Support to a Static Information Flow Control Tool
Mohr, M.; Graf, J.; Hecker, M.
2015. Software Engineering Workshops 2015 - Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, 17.-18. März 2015. Beiträge zur 8. Arbeitstagung Programmiersprachen (ATPS 2015). Hrsg.: W. Zimmermann, 140–145, RWTH Aachen
SHRIFT System-Wide HybRid Information Flow Tracking
Lovat, E.; Fromm, A.; Mohr, M.; Pretschner, A.
2015. ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Proceedings. Ed.: H. Federrath, 371–385, Springer. doi:10.1007/978-3-319-18467-8_25
A Hybrid Approach for Proving Noninterference of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Kirsten, M.; Mohr, M.
2015. 28th IEEE Computer Security Foundations Symposium, 13 Jul - 17 Jul 2015, Verona, Italy. Ed.: P. Kellenberger, 305–319, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2015.28
Towards Privacy in Monitored Shared Environments
Bao, K.; Bräuchle, T.; Schmeck, H.
2015. 10th Future Security, Security Research Conference, September 15 - 17, 2015, Berlin. Ed.: J. Beyerer, 469–472, Fraunhofer Verlag
A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2015. 1st IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), 15th May 2015, Ottawa, Canada. Ed.: R. Badonnel, 1327–1332, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INM.2015.7140490
Information and Communication Technology in Energy Lab 2.0
Hagenmeyer, V.; Çakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Mikut, R.
2015. Energy, Science and Technology 2015. The energy conference for scientists and researchers. Book of Abstracts, EST, Energy Science Technology, International Conference & Exhibition, 20-22 May 2015, Karlsruhe, Germany, 57, Karlsruher Institut für Technologie (KIT)
Index Optimization for L-Diversified Database-as-a-Service
Köhler, J.; Hartenstein, H.
2015. 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014; Wroclaw; Poland; 10 September 2014 through 11 September 2014. Ed.: J. Posegga, 114–132, Springer. doi:10.1007/978-3-319-17016-9_8
2014
Diploma Theses
Formal Verification of Voting Schemes. diploma thesis
Kirsten, M.
2014. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000092716
Privatheit, Smart-Metering und Sensornetze. diploma thesis
Munz, S.
2014. Karlsruher Institut für Technologie (KIT)
Bachelor's Theses
Entwicklung und Evaluation eines Sicherheitsbegriffs zur Anonymisierung von Videodaten. bachelor’s thesis
Fetzer, V.
2014. Karlsruher Institut für Technologie (KIT)
Implementierung und Evaluierung eines lastverteilenden Routing-Protokolls für energieeffiziente Sensornetze. bachelor’s thesis
Niedermann, M.
2014. Karlsruher Institut für Technologie (KIT)
Konnektivitätseigenschaften in deutschen Mobilfunknetzen. bachelor’s thesis
Hertweck, P.
2014
Journal Articles
Implementing and evaluating a software-independent voting system for polling station elections
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
A specious unlinking strategy
Friedl, S.; Nagel, M.; Powell, M.
2014. Periodica mathematica Hungarica, 69 (2), 207–210. doi:10.1007/s109980140063y
Überschussdaten in Retinabildern : Ein Beitrag zum datenschutzfreundlichen Entwurf biometrischer Systeme
Friedewald, M.; Wawrzyniak, S.; Pallas, F.
2014. Datenschutz und Datensicherheit - DuD, 2014 (7)
Datenschutz im "SmartHome"
Raabe, O.
2014. Recht der Datenverarbeitung, 2014 (5), 177–186
Steuerung im Datenschutzrecht: Ein Recht auf Vergessen wider Vollzugsdefizite und Typisierung
Spiecker genannt Döhmann, I.
2014. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 97 (1), 28–43. doi:10.5771/2193-7869-2014-1-28
Editorial: Big Brother unter der Motorhaube
Spiecker genannt Döhmann, I.
2014. Neue juristische Wochenschrift, 10, 1 S
Big Data intelligent genutzt: Rechtskonforme Videoüberwachung im öffentlichen Raum
Spiecker gen. Döhmann, I.
2014. Kommunikation & Recht, 17, 549–555
Anmerkung zu EuGH Rs. C-293/12 und C-594/12 – Vorratsdatenspeicherung
Spiecker genannt Döhmann, I.
2014. Juristenzeitung, 69, 1109–1113
Ich sehe ‘was, was Du nicht siehst - Rechtliche Probleme intelligenter Videoüberwachung
Spiecker genannt Döhmann, I.
2014. DGRI-Jahrbuch, 147–163
Precise Quantitative Information Flow Analysis – A Symbolic Approach
Klebanov, V.
2014. Theoretical computer science, 538 (C), 124–139. doi:10.1016/j.tcs.2014.04.022
Tagungsbericht DGRI Jahrestagung 2013
Haase, S.; Kring, M.; Pieper, F.
2014. Kommunikation & Recht, 2, 5
Energy Informatics - Current and Future Research Directions
Goebel, C.; Jacobsen, H.-A.; Razo, V. del; Doblander, C.; Rivera, J.; Ilg, J.; Flath, C.; Schmeck, H.; Weinhardt, C.; Pathmaperuma, D.; Appelrath, H.-J.; Sonnenschein, M.; Lehnhoff, S.; Kramer, O.; Staake, T.; Fleisch, E.; Neumann, D.; Strüker, J.; Erek, K.; Zarnekow, R.; Ziekow, H.; Lässig, J.
2014. Business & information systems engineering, 6 (1), 25–31. doi:10.1007/s12599-013-0304-2
Die Zukunft des europäischen Datenschutzes nach der Europawahl
Bretthauer, S.; Kring, M.
2014. Deutsches Verwaltungsblatt, 2014 (15), 977–978
A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks
Horneber, J.; Hergenröder, A.
2014. IEEE communications surveys & tutorials, 16 (4), 1820–1838. doi:10.1109/COMST.2014.2320051
Privacy-Preserving Cooperative Route Planning
Florian, M.; Finster, S.; Baumgart, I.
2014. IEEE Internet of Things Journal, 1 (6), 590–599. doi:10.1109/JIOT.2014.2361016
Checking probabilistic noninterference using JOANA
Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M.; Wasserab, D.
2014. Information technology, 56 (6), 280–287. doi:10.1515/itit-2014-1051
Reasoning and Verification: State of the Art and Current Trends
Beckert, B.; Hahnle, R.
2014. IEEE intelligent systems & their applications, 29 (1), 20–29. doi:10.1109/MIS.2014.3
How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers
Beckert, B.; Grebing, S.; Böhl, F.
2014. Electronic proceedings in theoretical computer science, 167, 4–13. doi:10.4204/EPTCS.167.3
Verifying voting schemes
Beckert, B.; Gore, R.; Schürmann, C.; Bormer, T.; Wang, J.
2014. Journal of information security and applications, 19 (2), 115–129. doi:10.1016/j.jisa.2014.04.005
Optimization of data life cycles
Jung, C.; Gasthuber, M.; Giesler, A.; Hardt, M.; Meyer, J.; Rigoll, F.; Schwarz, K.; Stotzka, R.; Streit, A.
2014. Journal of physics / Conference Series, 513 (TRACK 3), Art. Nr.: 032047. doi:10.1088/1742-6596/513/3/032047
SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service
Köhler, J.; Jünemann, K.; Hartenstein, H.
2014. Praxis der Informationsverarbeitung und Kommunikation, 37 (2), 149–155. doi:10.1515/pik-2014-0011
Book Chapters
A holistic framework for the evaluation of internet voting systems
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme
Huber, M.; Hartung, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Soziologie der Verfassung – ein Kommentar
Spiecker genannt Döhmann, I.
2014. Soziologie der Verfassung, (Fundamenta Juris Publici). Hrsg.: M. Morlok, 87–120, Mohr Siebeck
Kommentierung zu § 21g, h EnWG
Raabe, O.; Lorenz, M.
2014. Berliner Kommentar zum Energierecht ; Energierecht, Band 1, Halbband 1. Hrsg.: Franz Jürgen Säcker, 1716, Dt. Fachverl
Conference Papers
Solving the Movie Database Case with QVTo
Gerking, C.; Heinzemann, C.
2014. TTC 2014 - Transformation Tool Contest : Proceedings of the 7th Transformation Tool Contest part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences, York, United Kingdom, July 25, 2014. Ed.: L.M. Rose, 98–102, RWTH Aachen
A tool suite for the model-driven software engineering of cyber-physical systems
Dziwok, S.; Gerking, C.; Becker, S.; Thiele, S.; Heinzemann, C.; Pohlmann, U.
2014. S.-C. Cheung, A. Orso & M.-A. D. Storey (Eds.), Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE-22, 715–718, Association for Computing Machinery (ACM). doi:10.1145/2635868.2661665
The MechatronicUML method: model-driven software engineering of self-adaptive mechatronic systems
Becker, S.; Dziwok, S.; Gerking, C.; Heinzemann, C.; Schäfer, W.; Meyer, M.; Pohlmann, U.
2014. P. Jalote, L. C. Briand & A. van der Hoek (Eds.), 36th International Conference on Software Engineering, ICSE ’14, Companion Proceedings, 614–615, Association for Computing Machinery (ACM). doi:10.1145/2591062.2591142
Generating Modelica Models from Software Specifications for the Simulation of Cyber-Physical Systems
Pohlmann, U.; Holtmann, J.; Meyer, M.; Gerking, C.
2014. 40th EUROMICRO Conference on Software Engineering and Advanced Applications, Verona, Italy, 27-29 Aug. 2014, 191–198, IEEE Computer Society. doi:10.1109/SEAA.2014.18
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag GmbH
Coercion-Resistant Internet Voting in Practice
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik e.V.  (GI)
Why doesn’t Jane protect her privacy?
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik e.V.  (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik e.V.  (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
An Agency Perspective to Cloud Computing
Pallas, F.
2014. GECON 2014 : 11th International Conference on Economics of Grids, Clouds, Systems, and Services (Revised Selected Papers), Cardiff, UK, 16-18 September 2014. Ed.: J. Altmann, 36–51, Springer International Publishing. doi:10.1007/978-3-319-14609-6_3
Establishing location-privacy in decentralized long-distance geocast services
Florian, M.; Pieper, F.; Baumgart, I.
2014. 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014. Ed.: B. Scheuermann, 151–158, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VNC.2014.7013334
The European Approach towards Data Protection in a Global World of Data Transfer
Spiecker genannt Döhmann, I.
2014. Privacy in the Internet Age: Proceedings of the 8th Privacy Discussion Forum, 46–70
„Offlinetags – A Novel Privacy Approach to Online Photo Sharing“
Pallas, F.; Ulbricht, M.-R.; Jaume-Palasí L.; Höppner U.
2014. CHI EA 2014, CHI EA ’14: CHI ’14, Toronto, ON, Canada, 26.4. - 1.5. 2014, Extended Abstracts on Human Factors in Computing Systems, Work-in-Progress, 2179–2184, Association for Computing Machinery (ACM). doi:10.1145/2559206.2581195
Extending and Applying a Framework for the Cryptographic Verification of Java Programs
Küsters, R.; Scapin, E.; Truderung, T.; Graf, J.
2014. Principles of Security and Trust, POST 2014, Part of ETAPS 2014, Grenoble, France, April 5-13, 2014, 220–239, Springer Verlag. doi:10.1007/978-3-642-54792-8_12
Big Data und der Grundsatz der Zweckbindung
Kring, M.
2014. Informatik 2014, Big Data – Komplexität meistern, 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, 22. – 26. September 2014. Hrsg.: E. Plödereder, 1–12
Proposal for a Multi-View Modelling Case Study: Component-Based Software Engineering with UML, Plug-ins, and Java
Kramer, M. E.; Langhammer, M.
2014. Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, VAO ’14, York, United Kingdom, 22 July 2014, 7:7–7:10, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631676
Poster Abstract: Secure Metering Communication in the Energy Smart Home Lab
Hergenröder, A.; Bao, K.; Bräuchle, T.
2014. Poster and Demo Session of the 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, U.K., 17 - 19 Februar 2014. Ed.: A. Cerpa, 32–33, EWSN
Secure Database Outsourcing to the Cloud using the MimoSecco Middleware
Gabel, M.; Hübsch, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar. Part III, 187–202, Springer Verlag. doi:10.1007/978-3-319-12718-7_12
SMART-ER: peer-based privacy for smart metering
Finster, S.; Baumgart, I.
2014. IEEE Conference on Computer Communications workshops (INFOCOM WKSHPS 2014) - INFOCOM Workshop on Communications and Control for Smart Energy Systems - Toronto, ON, Canada, 27 April-2 May 2014, 652–657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2014.6849308
Videomonitoring zur Sturzdetektion und Alarmierung – Eine technische und rechtliche Analyse
Bretthauer, S.; Krempel, E.
2014. Transparenz IRIS 2014 : Tagungsband des 17. Internationalen Rechtsinformatik Symposions, Salzburg, 20. - 22. Februar 2014. Hrsg.: E. Schweighofer, 525–534, Österreichische Computer-Ges
Energiemanagementsysteme der Zukunft : Anforderungen an eine datenschutzkonforme Verbrauchsvisualisierung
Bräuchle, T.
2014. Big Data & Co : Neue Herausforderungen für das Informationsrecht - 15. Herbstakademie 2014 / DSRI, Deutsche Stiftung für Recht und Informatik; 10-13 September 2014, Mainz. Hrsg.: J. Taeger, 455–469, Oldenburger Verl. für Wirtschaft
Die datenschutzrechtliche Einwilligung in Smart Metering Systemen : Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht = The legal data protection consent in Smart Metering Systems : Situations involving conflicts between data protection act and energy industry legislation
Bräuchle, T.
2014. Informatik 2014 : Big Data - Komplexität meistern : 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26. September 2014. Hrsg.: E. Plödereder, 515–526, Köllen Verlag
Enhancing Privacy by Design From a Developer’s Perspective
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2014. Privacy technologies and policy : revised selected papers - First Annual Privacy Forum (APF), Limassol, Cyprus, October 10 - 11, 2012. Ed.: B. Preneel, 73–85, Springer Verlag
Lessons Learned From Microkernel Verification
Beckert, B.; Bormer, T.
2014. International Workshop on Automated Verification of Critical Systems (AVoCS), Bamberg, Germany, Sep 18 - 20, 2012. Eds.: G. Lüttgen, Elsevier
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender
Böhl, F.; Greiner, S.; Scheidecker, P.
2014. 13th International Conference on Cryptology and Network Security (CANS) - Heraklion, Crete, Greece, October 22-24, 2014. Ed.: D. Gritzalis, 175–190, Springer Verlag
Automating Regression Verification
Felsing, D.; Grebing, S.; Klebanov, V.; Rümmer, P.; Ulbrich, M.
2014. ASE ’14 : proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering : September 15-19, 2014, Västerås, Sweden, 349–359, Association for Computing Machinery (ACM). doi:10.1145/2642937.2642987
Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems
Müller, S.; Bermbach, D.; Tai, S.; Pallas, F.
2014. 2nd IEEE International Conference on Cloud Engineering, IC2E 2014; Boston; United States; 10 March 2014 through 14 March 2014, 27–36, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IC2E.2014.48
Gesellschaftliche Relevanz der Informatik als Strukturtechnologie
Keller, H. B.
2014. Chancen und Risiken der Wagnisgesellschaft : Dokumentation der Veranstaltung am 15.Oktober 2014 in der Bundesanstalt für Materialforschung und -prüfung (BAM), 16–39, FORUM46 - Interdisziplinäres Forum für Europa e.V
Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage Systems
Noorshams, Q.; Busch, A.; Rentschler, A.; Bruhn, D.; Kounev, S.; Tuma, P.; Reussner, R.
2014. IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW’14), Madrid, Spain, June 30 - July 3, 2014, 88–93, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICDCSW.2014.26
JKelloy: A Proof Assistant for Relational Specifications of Java Programs
El Ghazi, A. A.; Ulbrich, M.; Gladisch, C.; Tyszberowicz, S.; Taghdiri, M.
2014. NASA Formal Methods - 6th International Symposium (NFM’14), Houston, Texas/USA, April 29 - May 1, 2014. Ed.: J. M. Badger, 173–187, Springer US. doi:10.1007/978-3-319-06200-6_13
Standard versus Selective Opening Security: Separation and Equivalence Results
Hofheinz, D.; Rupp, A.
2014. Theory of Cryptography - 11th Theory of Cryptography Conference (TCC’14), San Diego, California/USA, February 24-26, 2014. Ed.: Y. Lindell, 591–615, Springer Verlag. doi:10.1007/978-3-642-54242-8_25
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
Hofheinz, D.; Striecks, C.
2014. Topics in Cryptology - The Cryptographer’s Track at the RSA Conference (CT-RSA’14), San Francisco, California/USA, February 25-28, 2014. Ed.: J. Benaloh, 48–63, Springer US. doi:10.1007/978-3-319-04852-9_3
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
Böhl, F.; Davies, G. T.; Hofheinz, D.
2014. Public-Key Cryptography - 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC’14), Buenos Aires, Argentina, March 26-28, 2014. Ed.: H. Krawczyk, 483–500, Springer Verlag. doi:10.1007/978-3-642-54631-0_28
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
Herold, G.; Hesse, J.; Hofheinz, D.; Rafols, C.; Rupp, A.
2014. Advances in Cryptology - 34th Annual Cryptology Conference (CRYPTO’14), Santa Barbara, California/USA, August 17-21, 2014. Ed.: J. A. Garay, 261–279, Springer Verlag. doi:10.1007/978-3-662-44371-2_15
Universally Composable Non-Interactive Key Exchange
Freire, E. S. V.; Hesse, J.; Hofheinz, D.
2014. 9th International Conference on Security and Cryptography for Networks, SCN 2014; Amalfi; Italy; 3 September 2014 through 5 September 2014. Ed.: M. Abdalla, 1–20, Springer US. doi:10.1007/978-3-319-10879-7_1
Reasoning About Vote Counting Schemes Using Light-weight and Heavy-weight Methods
Beckert, B.; Bormer, T.; Gore, R.; Kirsten, M.; Meumann, T.
2014. 8th International Verification Workshop (VERIFY´14), Wien, Österreich, July 23-24, 2014
TAM-VS: A Technology Acceptance Model for Video Surveillance
Krempel, E.; Beyerer, J.
2014. Privacy Technologies and Policy - 2nd Annual Privacy Forum (APF’14), Athens, Greece, May 20-21, 2014. Ed.: B. Preneel, 86–100, Springer US. doi:10.1007/978-3-319-06749-0_6
Privacy-aware smart video surveillance revisited
Fischer, Y.; Krempel, E.; Birnstill, P.; Unmüßig, G.; Monari, E.; Moßgraber, J.; Schenk, M.; Beyerer, J.
2014. 9th Security Research Conference ’Future Security’, Berlin, September 16-18, 2014. Ed.: K. Thoma, 91–99, Fraunhofer Verlag
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions
Köhler, J.; Jünemann, K.
2014. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [Konferenz]. Ed.: M. Hansen, 139–149, Springer Verlag
2013
Diploma Theses
Entwurf einer BSI-Schutzprofil-konformen Smart Meter Gateway Softwarearchitektur. diploma thesis
Smirek, L. D.
2013. Karlsruher Institut für Technologie (KIT)
Evaluierung der Energie-effizienz von Schlüsselaustauschprotokollen in Concast-Szenarien. diploma thesis
Klock, T.
2013. Karlsruher Institut für Technologie (KIT)
Kommunikation in drahtlosen Sensornetzen - Vergleich zwischen Realität und Simulation. diploma thesis
Benisch, S.
2013. Karlsruher Institut für Technologie (KIT)
Master's Theses
Workload Characterization for I/O Performance Analysis on IBM SYSTEM Z. master’s thesis
Busch, A.
2013. Karlsruher Institut für Technologie (KIT)
Impact of Erasure Coding Algorithms on the Availability of Federated Cloud Storage Systems. master’s thesis
Wolf, P.
2013. Karlsruher Institut für Technologie (KIT)
Implementing Smart Meter SpeedDating. master’s thesis
Beelmann, P.
2013
Bachelor's Theses
Implementierung und Evaluierung eines Random-Key-Distribution Verfahren in WSNs. bachelor’s thesis
Zickner, V.
2013. Karlsruher Institut für Technologie (KIT)
Journal Articles
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Smart Energy Systems
Schmeck, H.
2013. Information technology, 55 (2), 43–44. doi:10.1524/itit.2013.9002
Legal Aspects of Demand Side Management in Germany
Raabe, O.; Ullmer, J.
2013. Information technology, 55 (2), 63–69. doi:10.1524/itit.2013.0008
Sicherheit, Resilienz und rechtliche Herausforderungen in Bezug auf Cloud Computing und kritische Infrastruktur-IT
Pallas, F.; Tauber, M.; Wagner, C.
2013. Elektrotechnik und Informationstechnik, 130 (12), 33–36
Informationszugang im Recht der Europäischen Union
Bretthauer, S.
2013. Die öffentliche Verwaltung, 677–685
Haftung und Beweis bei geschachtelt komponierten Cloud-Services
Balaban, S.; Pallas, F.
2013. InTeR, 173 (4), 193–198
Cloud Standby System and Quality Model
Lenk, A.; Pallas, F.
2013. Journal of Cloud Computing, 1 (2), 48–59
Technische Sicherheit und Informationssicherheit
Freiling, F.; Grimm, R.; Großpietsch, K. E.; Keller, H. B.; Mottok, J.; Münch, I.; Rannenberg, K.; Saglietti, F.
2013. Informatik-Spektrum, 24, 343–353. doi:10.1007/s00287-013-0748-2
Polynomial Runtime and Composability
Hofheinz, D.; Unruh, D.; Müller-Quade, J.
2013. Journal of Cryptology, 26 (3), 375–441. doi:10.1007/s00145-012-9127-4
Practical Chosen Ciphertext Secure Encryption from Factoring
Hofheinz, D.; Kiltz, D.; Shoup, V.
2013. Journal of cryptology, 26 (1), 102–118. doi:10.1007/s00145-011-9115-0
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
Jager, T.; Schwenk, J.
2013. Journal of cryptology, 26 (2), 225–245. doi:10.1007/s00145-012-9120-y
Book Chapters
Mental Models: General Introduction and Review of Their Application to Human-Centred Security
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
The Difference between Online and Offline Communication as a Factor in the Balancing of Interests with Freedom of Speech
Döhmann, I. S. genannt
2013. Free Speech in the Internet Era. Ed.: C. Walker, 91–106, Carolina Academic Press
Kommentierung von §§ 1, 46, 63, 64 KrWAbfG
Spiecker genannt Döhmann, I.
2013. GK-KrWG : Gemeinschaftskommentar zum Kreislaufwirtschaftsgesetz (KrWG) sowie zur Verpackungsverordnung (VerpackV), zur Altfahrzeugverordnung (AltfahrzeugV), zum Elektro- und Elektronikgesetz (ElektroG), zum Batteriegesetz (BattG), Bioabfallverordnung (BioAbfV), zur Abfallverzeichnisverordnung (AVV) und zur EU-Abfallverbringungsverordnung (VVA). Hrsg. Arndt Schmehl, Carl Heymanns Verlag GmbH
Die Online-Durchsuchung als Instrument der Sicherheitsgewährleistung
Spiecker genannt Döhmann, I.
2013. Verfassungsstaatlichkeit im Wandel, Festschrift für Thomas Würtenberger zum 70. Geburtstag Hrsg.: D. Heckmann, 803–821, Duncker & Humblot
Datenschutz und Elektromobilität
Raabe, O.; Weis, E.; Pallas, F.; Lorenz, M.
2013. Berliner Handbuch zur Elektromobilität, 297–324, Verlag C.H.Beck
Programmiersprachen
Abke, J.; Braun, O.; Brune, P.; Hagel, G.; Keller, H.; Mottok, J.; Niemetz, M.; Pfeiffer, V.
2013. Perfekte Softwareentwicklung : Prozesse, Technologien und Methoden für erfolgreiche Softwareprojekte. Hrsg.: M. Lang, 247–294, Symposion Publishing
Conference Papers
An Architectural Model for Deploying Critical Infrastructure Services in the Cloud
Schöller, M.; Bless, R.; Pallas, F.; Horneber, J.; Smith, P.
2013. IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), 2013 : 2 - 5 December 2013, Bristol, United Kingdom. Vol. 1, 458–465, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.67
Branchenreport UX/Usability 2013
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik e.V.  (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik e.V.  (GI)
Mental Models of Verifiability in Voting
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
P4R : Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
Rupp, A.; Hinterwälder, G.; Baldimtsi, F.; Paar, C.
2013. FC 2013 : 17th International Conference on Financial Cryptography and Data Security : Revised Selected Papers, Okinawa, Japan, 1st - 5th April 2013. Ed.: A.-R. Sadeghi, 205–212, Springer Verlag. doi:10.1007/978364239884117
Symbolic Universal Composability
Bohl, F.; Unruh, D.
2013. 2013 IEEE 26th Computer Security Foundations Symposium, CSF 2013; New Orleans, LA; United States; 26 June 2013 through 28 June 2013, 257–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2013.24
Die Durchsetzung datenschutzrechtlicher Mindestanforderungen bei Facebook und anderen sozialen Netzwerken
Spiecker genannt Döhmann, I.
2013. Der Schutz der Persönlichkeit im Internet ; [Vorträge, die während des 12. @kit-Kongresses, der zugleich das 2. Forum "Kommunikation & Recht" war und am 21./22. Juni 2012 in Hamburg unter dem Generalthema "Der Schutz der Persönlichkeit im Internet" stattfand, gehalten wurden]. Hrsg.: Stefan Leible, 33–54, Boorberg
Systemdienstleistungen und Elektromobilität im Verteilnetz : Rollen und Regulierung
Raabe, O.; Weis, E.; Ullmer, J.
2013. Informatik 2013: Informatik angepasst an Mensch, Organisation und Umwelt, Koblenz, Deutschland, 16. - 20. September 2013, 1485–1499, Köllen
Privacy Impact Assessment als besondere Form der Technikfolgenabschätzung
Pallas, F.; Rettke, A.
2013. 13. Österreichische Konferenz zur Technikfolgenabschätzung, Wien, 3. Juni 2013
Modeling Quality Attributes of Cloud-Standby-Systems : A Long-Term Cost and Availability Model
Pallas, F.; Lenk, A.
2013. ESOCC 2013 : Second European Conference on Service-Oriented and Cloud Computing, Málaga, Spain, 1st - 3rd September 2013. Ed.: K.-K. Lau, 49–63, Springer Verlag. doi:10.1007/978-3-642-40651-5_5
Structural Composition Attacks on Anonymized Data
Nilges, T.; Müller-Quade, J.; Huber, M.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
A Systematic Review of Model-Driven Security
Nguyen, P. H.; Klein, J.; Kramer, M. E.; Traon, Y. L.
2013. 20th Asia-Pacific Software Engineering Conference (APSEC 2013) : Bangkok, Thailand, 2 - 5 December 2013, [proceedings], 432–441, IEEE Computer Society. doi:10.1109/APSEC.2013.64
SAT-based Analysis and Quantification of Information Flow in Programs
Klebanov, V.; Manthey, N.; Muise, C.
2013. Quantitative Evaluation of Systems : 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings. Ed.: K. Joshi, 177–192, Springer Verlag. doi:10.1007/978-3-642-40196-1_16
Defining Privacy Based on Distributions of Privacy Breaches
Huber, M.; Müller-Quade, J.; Nilges, T.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer Verlag. doi:10.1007/978-3-642-42001-6_15
Cumulus4j: A Provably Secure Database Abstraction Layer
Huber, M.; Gabel, M.; Schulze, M.; Bieber, A.
2013. Security engineering and intelligence informatics : proceedings / CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2 - 6, 2013. Ed.: A. Cuzzocrea, 180–193, Springer Verlag. doi:10.1007/978-3-642-40588-4_13
Energy-Efficient Security in Smart Metering Scenarios
Hergenröder, A.; Haas, C.
2013. IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21 Oct - 24 Oct 2013, 1–3, Institute of Electrical and Electronics Engineers (IEEE)
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs
Haynberg, R.; Rill, J.; Achenbach, D.; Jörn Müller-Quade
2013. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavík, Iceland, 29 - 31 July, 2013 : [part of ICETE 2013, 10th International Joint Conference on e-Business and Telecommunications]. Ed.: P. Samarati, 403–410, SciTePress
Using JOANA for Information Flow Control in Java Programs – A Practical Guide
Graf, J.; Hecker, M.; Mohr, M.
2013. Software Engineering 2013 : Workshopband (inkl. Doktorandensymposium) : Fachtagung des GI-Fachbereichs Softwaretechnik , Aachen, 26.02. - 01.03.2013. Hrsg.: S. Wagner, 123–138, Ges. für Informatik
On the Detectability of Weak DoS Attacks in Wireless Sensor Networks
Dudek, D.
2013. Data Privacy Management and Autonomous Spontaneous Security : 7th International Workshop (DPM 2012) and 5th International Workshop (SETOP 2012) : Revised Selected Papers, Pisa, Italy, 13th - 14th September 2012. Ed.: R. Di Pietro, 243–257, Springer Verlag. doi:10.1007/978-3-642-35890-6_18
Datensicherheit in intelligenten Infrastrukturen
Bretthauer, S.; Bräuchle, T.
2013. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, 2104–2118, Ges. für Informatik
Enforcing privacy through usage-controlled video surveillance
Birnstill, P.; Pretschner, A.
2013. 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) : Krakow, Poland ; 27 - 30 Aug. 2013, 318–323, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2013.6636659
Usage-controlled Video Surveillance – Revealing its Potentials for Privacy
Birnstill, P.
2013. 8th future security : Security Research Conference, Berlin, September 17 - 19, 2013. Ed.: M. Lauster, 502–503, Fraunhofer Verlag
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective
Bier, C.
2013. 4th International Workshop on Data Usage Management (DUMA) ; co-located with the IEEE Symposium on Security and Privacy (SP) - San Francisco, Calif., USA; 23 May 2013, 13–17, Institute of Electrical and Electronics Engineers (IEEE)
Analysing Vote Counting Algorithms Via Logic. And its Application to the CADE Election System
Beckert, B.; Goré, R.; Schürmann, C.
2013. Proceedings, 24th International Conference on Automated Deduction (CADE), Lake Placid, NY, USA Hrsg.: Maria Paola Bonacina, 135–144, Springer Verlag. doi:10.1007/978-3-642-38574-2_9
Non simplificate nubes! Ein rechtlicher Blick hinter die Kulissen informatischer Cloud-Forschung
Balaban, S.; Pallas, F.
2013. Law as a service (LaaS) : Recht im Internet- und Cloud-Zeitalter ; Tagungsband Herbstakademie / DSRI, Deutsche Stiftung für Recht und Informatik ; Oldenburg : 2013.09. Hrsg.: J. Taeger. Bd.: 1, 325–342, Oldenburger Verl. für Wirtschaft
Deduction soundness: prove one, get five for free
Böhl, F.; Cortier, V.; Warinschi, B.
2013. CCS ’13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany — November 04 - 08, 2013. Ed.: A.-R. Sadeghi, 1261–1272, Association for Computing Machinery (ACM). doi:10.1145/2508859.2516711
Compliance-preserving Cloud Storage Federation based on Data-driven Usage Control
Wüchner, T.; Müller, S.; Fischer, R.
2013. 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, 2-5 December 2013 (CloudCom 2013). Proceedings, 285–288, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.149
Web technologies and privacy policies for the Smart Grid
Speiser, S.; Wagner, A.; Raabe, O.; Harth, A.
2013. IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society : Austria Center Vienna, Vienna, Austria, 10 - 14 November, 2013. Proceedings, 4809–4814, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2013.6699913
Smart Grid-Ready Communication Protocols And Services For A Customer-Friendly Electromobility Experience
Mültin, M.; Gitte, C.; Schmeck, H.
2013. Informatik 2013 : 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz. [Konferenz]. Hrsg.: M. Horbach, 1470–1484, Gesellschaft für Informatik e.V.  (GI)
Eine Bestandsaufnahme von Standardisierungspotentialen und -lücken im Cloud Computing
Fischer, R.; Janiesch, C.; Strach, J.; Bieber, N.; Zink, W.; Tai, S.
2013. Proceedings of the 11th International Conference on Wirtschaftsinformatik (WI2013), Feb 27 - Mar 01 2013 University Leipzig, Germany. Vol. 2. Hrsg. R. Alt, 1359–1373, Merkur
On the Specification and Verification of Voting Schemes
Beckert, B.; Gore, R.; Schürmann, C.
2013. E-Voting and Identify - 4th International Conference, Guildford, United Kingdom, July 17-19, 2013 - Proceedings. Ed.: J. Heather, 25–40, Springer Verlag. doi:10.1007/978-3-642-39185-9_2
Demo: Overdrive - An overlay-based geocast service for smart traffic applications
Florian, M.; Andreev, S.; Baumgart, I.
2013. 19th Annual International Conference on Mobile Computing & Networking (MobiCom’13), Miami, Florida/USA, September 30 - October 4, 2013, 147–150, Association for Computing Machinery (ACM). doi:10.1145/2500423.2505297
Evaluating energy-efficiency of hardware-based security mechanisms
Haas, C.; Munz, S.; Wilke, J.; Hergenroder, A.
2013. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’13), San Diego, California/USA, March 18-22, 2013, 560–565, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComW.2013.6529559
Overdrive an overlay-based geocast service for smart traffic applications
Heep, B.; Florian, M.; Volz, J.; Baumgart, I.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578313
Energy-efficiency of concast communication in Wireless Sensor Networks
Wilke, J.; Haas, C.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 34–38, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578318
Elderberry: A peer-to-peer, privacy-aware smart metering protocol
Finster, S.; Baumgart, I.
2013. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13), Turin, Italy, April 14-19, 2013, 37–42, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2013.6562905
Pseudonymous Smart Metering without a Trusted Third Party
Finster, S.; Baumgart, I.
2013. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), Melbourne, Australia, July 16-18, 2013, 1723–1728, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom.2013.234
Smart Meter Speed Dating, short-term relationships for improved privacy in Smart Metering
Finster, S.
2013. IEEE International Conference on Smart Grid Communications (SmartGridComm’13), Vancouver, Canada, October 21-24, 2013, 426–431, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2013.6687995
Evaluating the Energy-Efficiency of the Rich Uncle Key Exchange Protocol in WSNs
Haas, C.; Wilke, J.; Knittel, F.
2013. 38th Annual IEEE Conference on Local Computer Networks, LCN 2013; Sydney, NSW; Australia; 21 October 2013 through 24 October 2013, 336–339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN.2013.6761263
Privacy in Overlay-based Smart Traffic Systems
Florian, M.; Baumgart, I.
2013. IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE’13), Sydney, Australia, October 24, 2013, 912–917, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCNW.2013.6758531
Reuse and configuration for code generating architectural refinement transformations
Langhammer, M.; Lehrig, S.; Kramer, M. E.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 6, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489866
View-centric engineering with synchronized heterogeneous models
Kramer, M. E.; Burger, E.; Langhammer, M.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 5, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489864
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer Verlag. doi:10.1007/978-3-642-36594-2_36
Lossy Codes and a New Variant of the Learning-With-Errors Problem
Döttling, N.; Müller-Quade, J.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer Verlag. doi:10.1007/978-3-642-38348-9_2
Non-Interactive Key Exchange
Freire, E. S. V.; Hofheinz, D.; Kiltz, E.; Paterson, K. G.
2013. Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 - Proceedings. Ed.: K. Kurosawa, 254–271, Springer Verlag. doi:10.1007/978-3-642-36362-7_17
Practical Signatures from Standard Assumptions
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Seo, J. H.; Striecks, C.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 461–485, Springer Verlag. doi:10.1007/978-3-642-38348-9_28
Circular Chosen-Ciphertext Security with Compact Ciphertexts
Hofheinz, D.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 520–536, Springer Verlag. doi:10.1007/978-3-642-38348-9_31
Programable Hash Functions in the Multilinear Setting
Freire, E. S. V.; Hofheinz, D.; Paterson, K. G.; Striecks, C.
2013. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, California/USA, August 18-22, 2013 - Proceedings Part I. Ed.: R. Canetti, 513–530, Springer Verlag. doi:10.1007/978-3-642-40041-4_28
Privacy Preserving Surveillance and the Tracking-Paradox
Greiner, S.; Birnstill, P.; Krempel, E.; Beckert, B.; Beyerer, J.
2013. 8th Future Security - Security Research Conference, Berlin, September 17-19, 2013 - Proceedings. Ed.: M. Lauster, 296–302, Fraunhofer Verlag
Information Flow in Object-Oriented Software
Beckert, B.; Bruns, D.; Klebanov, V.; Scheben, C.; Schmitt, P. H.; Ulbrich, M.
2013. Logic-Based Program Synthesis and Transformation, LOPSTR 2013, Madrid, Spain, September 16-18, 2013 [Konferenz]. Ed.: G. Gupta, 15–32, Universidad
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Graf, J.; Scheben, C.
2013. Grande Region Security and Reliability Day 2013. April 12, 2013, University of Luxembourg. Ed.: Ch. Hammer, Luxembourg
Dynamic Logic with Trace Semantics
Beckert, B.; Bruns, D.
2013. Automated Deduction - CADE-24 : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013, Proceedings. Ed.: M.P. Bonacina, 315–329, Springer Verlag
2012
PhD Theses
Slicing of Concurrent Programs and its Application to Information Flow Control. PhD dissertation
Giffhorn, D.
2012. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000028814
Diploma Theses
Evaluierung der Energieeffizienz des Rich Uncle Protokolls. diploma thesis
Knittel, F.
2012. Karlsruher Institut für Technologie (KIT)
Journal Articles
Usable Secure Email Communications - Criteria and evaluation of existing approaches
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Legal Aspects of Service Robotics
Spiecker genannt Döhmann, I.; Dreier, T.
2012. Poiesis & praxis, 9 (3/4), 201–217. doi:10.1007/s10202-012-0115-4
Engineering Compliant Services: Advising Developers by Automating Legal Reasoning
Raabe, O.; Oberle, D.; Drefs, F.; Wacker, R.; Baumann, C.
2012. Script-ed, 9 (3), 280–313. doi:10.2966/scrip.090312.280
Model generation for quantified formulas with application to test data generation
Gladisch, C. D.
2012. International journal on software tools for technology transfer, 14 (4), 439–459. doi:10.1007/s10009-012-0227-0
Der Verwaltungsprozess und das erste deutsche Mediationsgesetz - Streit über den Weg der Streitschlichtung
Eisenbarth, M.; Döhmann, I. S. genannt
2012. Deutsches Verwaltungsblatt, 127 (16), 993–999
Oblivious Transfer Based on the McEliece Assumptions
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
2012. IEICE transactions / E / A, E95.A (2), 567–575
A CCA2 Secure Variant of the McEliece Cryptosystem
Döttling, N.; Dowsley, R.; Jörn Müller-Quade; Anderson C. A. Nascimento
2012. IEEE transactions on information theory, 58 (10), 6672–6680. doi:10.1109/TIT.2012.2203582
Schutz der Forschungsfreiheit nach dem Informationsfreiheitsgesetz (IFG)
Bretthauer, S.
2012. Neue Zeitschrift für Verwaltungsrecht, 2012 (18), 1144–1148
Intelligente Videoüberwachung – Schreckensszenario oder Gewinn für den Datenschutz?
Bier, C.; Döhmann, I. S. genannt
2012. Computer und Recht, 28 (9), 610–619. doi:10.9785/ovs-cr-2012-610.
Eine formale Semantik für die Java Modeling Language
Bruns, D.
2012. Informatik-Spektrum, 35 (1), 45–49. doi:10.1007/s00287-011-0532-0
Books
Recht ex machina – Formalisierung des Rechts im Internet der Dienste
Raabe, O.; Wacker, R.; Oberle, D.; Baumann, C.; Funk, C.
2012. Springer Verlag
Book Chapters
C4PS - Helping Facebookers Manage Their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer Verlag. doi:10.1007/978-3-642-35386-4_15
Data Life Cycle Labs, A New Concept to Support Data-Intensive Science
Wezel, J. van; Streit, A.; Jung, C.; Stotzka, R.; Halstenberg, S.; Rigoll, F.; Garcia, A.; Heiss, A.; Schwarz, K.; Gasthuber, M.; others
2012. arXiv : Computational Physics (physics.comp-ph), arXiv:1212.5596
Staatliche Informationen des Verbrauchers – Risiken und Nebenwirkungen
Spiecker gen. Döhmann, I.
2012. Jahrbuch der Juristischen Studiengesellschaft Bremen, 110–136, Bremen
Rechtliche Begleitung der Technikentwicklung im Bereich moderner Infrastrukturen und Informationstechnologien
Spiecker genannt Döhmann, I.
2012. Die Vermessung des virtuellen Raums. Hrsg.: H. Hill, 137–161, Nomos Verlagsgesellschaft
Beyond Gut Level – Some critical remarks on the German Privacy Approach to Smart Metering
Pallas, F.
2012. Computers, Privacy and Data Protection (CPDP). Hrsg.: Serge Gutwirth ..., 313–345, Springer Netherlands. doi:10.1007/978-94-007-5170-5_14
Conference Papers
Formal Treatment of Distributed Trust in Electronic Voting
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer Verlag
Towards the Systematic Development of Contextualized Security Interventions
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik e.V.  (GI)
Security versus Trust Indicators in 2011 in Germany
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran Associates, Inc
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer Verlag. doi:10.1007/978-3-642-32747-6_2
Introduction
Spiecker gen. Döhmann, I.
2012. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, Gesellschaft für Informatik e.V.  (GI)
User-centric Protection and Privacy in Smart Surveillance Systems
Vagts, H.; Krempel, E.; Beyerer, J.
2012. 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4 - 6, 2012, 237–248, Springer Verlag. doi:10.1007/978-3-642-33161-9_36
Privacy-aware access control for video data in intelligent surveillance systems
Vagts, H.; Jakoby, A.
2012. Mobile multimedia/image processing, security, and applications 2012 : 23 - 24 April 2012, Baltimore, Maryland, United States ; [at SPIE Defense, Security + Sensing], SPIE. doi:10.1117/12.920623
Data Protection and Smart Grid Communication: The European Perspective
Pallas, F.
2012. IEEE PES Innovative Smart Grid Technologies, ISGT 2012, Washington, DC, United States, 16.1. - 20.1.2012, Art. Nr.: 6175695, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175695
Integration of electric vehicles in smart homes - an ICT-based solution for V2G scenarios
Multin, M.; Allerding, F.; Schmeck, H.
2012. IEEE PES innovative smart grid technologies (ISGT 2012) : [conference], Washington, DC, USA, 16 - 20 January 2012, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175624
A Framework for the Cryptographic Verification of Java-like Programs
Küsters, R.; Truderung, T.; Graf, J.
2012. IEEE 25th Computer Security Foundations Symposium (CSF), 2012, 198–212, IEEE Computer Society. doi:10.1109/CSF.2012.9
Precise Quantitative Information Flow Analysis Using Symbolic Model Counting
Klebanov, V.
2012. QASA 2012 International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS Pisa, Italy - September 14, 2012. Hrsg.: F. Martinelli
Coercion-Resistant Electronic Elections with Write-In Candidates
Kempka, C.
2012. EVT/WOTE ’12 : 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012, Bellevue, WA, August 6 - 7, Advanced Computing Systems Association (USENIX)
Evaluating the Energy-Efficiency of Key Exchange Protocols in Wireless Sensor Networks
Haas, C.; Wilke, J.
2012. 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N) , Paphos, Cyprus — October 21 - 22, 2012, 133–140, Association for Computing Machinery (ACM). doi:10.1145/2387191.2387210
Collaborative Detection of Traffic Anomalies Using First Order Markov Chains
Dudek, D.
2012. 2012 Ninth International Conference on Networked Sensing Systems (INSS) - Antwerp, Belgium ; 11 - 14 June 2012, 1–4, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INSS.2012.6240522
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer Verlag. doi:10.1007/978-3-642-34961-4_30
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer Verlag. doi:10.1007/978-3-642-32284-6_5
Common Privacy Patterns in Video Surveillance and Smart Energy
Bier, C.; Krempel, E.
2012. 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3 - 5 Dec. 2012. Ed.: K. Kwack, 610–615, Institute of Electrical and Electronics Engineers (IEEE)
How is Positive-Sum Privacy Feasible?
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2012. Future Security : 7th Security Research Conference, Bonn, Germany, September 4-6, 2012. Ed.: N. Aschenbruck, 265–268, Springer Verlag. doi:10.1007/978-3-642-33161-9_39
Evaluating the Usability of Interactive Verification Systems
Beckert, B.; Grebing, S.
2012. 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE), Manchester, UK, June 30, 2012. Ed.: V. Klebanov, 3–17, RWTH Aachen
Mind the Gap: Formal Verification and the Common Criteria
Beckert, B.; Bruns, D.; Grebing, S.
2012. 6th International Verification Workshop – VERIFY-2010 - What are the verification problems? What are the deduction techniques? Edinburgh, Great Britain, July 20–21, 2010. Hrsg.: M. Aderhold, 4–12, EasyChair
Lessons Learned From Microkernel Verification: Specification is the New Bottleneck
Baumann, C.; Beckert, B.; Blasum, H.; Bormer, T.
2012. Seventh Conference on Systems Software Verification (SSV), Sydney, Australia, 28-30 November 2012. Ed.: F. Cassez, 18–32, NICTA
User interaction interface for Energy Management in Smart Homes
Becker, B.; Kellerer, A.; Schmeck, H.
2012. 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012; Washington, DC; United States; 16 January 2012 through 20 January 2012, Art. Nr.: 6175616, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175616
Electrical Load Management in Smart Homes Using Evolutionary Algorithms
Allerding, F.; Premm, M.; Shukla, P. K.; Schmeck, H.
2012. Evolutionary Computation in Combinatorial Optimization - 12th European Conference, EvoCOP 2012, Málaga, Spain, April 11-13, 2012 - Proceedings. Ed.: J.-K. Hao, 99–110, Springer Verlag. doi:10.1007/978-3-642-29124-1_9
Formal Semantics of Model Fields in Annotation-based Specifications
Beckert, B.; Bruns, D.
2012. KI 2012: advances in artificial intelligence : 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Ed.: B. Glimm, 13–24, Springer Verlag
On the security of TLS-DHE in the standard model
Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J.
2012. 32nd Annual International Cryptology Conference, CRYPTO 2012; Santa Barbara, CA; United States; 19 August 2012 through 23 August 2012. Ed.: R. Canetti, 273–293, Springer Verlag. doi:10.1007/978-3-642-32009-5_17
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
Jager, T.; Schinzel, S.; Somorovsky, J.
2012. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. Ed.: S. Foresti, 752–769, Springer Verlag. doi:10.1007/978-3-642-33167-1
Improving the usability of specification languages and methods for annotation-based verification
Beckert, B.; Bormer, T.; Klebanov, V.
2012. Proceeding FMCO’10 Proceedings of the 9th international conference on Formal Methods for Components and Objects, 61–79, Springer Verlag. doi:10.1007/978-3-642-25271-6_4
Integration of Bounded Model Checking and Deductive Verification
Beckert, B.; Bormer, T.; Merz, F.; Sinz, C.
2012. Formal Verification of Object-Oriented Software : international conference; revised selected papers, FoVeOOS 2011, Turin, Italy, October 5 - 7, 2011. Ed.: B. Beckert, 86–104, Springer Verlag. doi:10.1007/978-3-642-31762-0_7
Maintenance and Privacy in Unstructured GeoCast Overlays for Smart Traffic Applications
Heep, B.; Baumgart, I.
2012. Proceedings of the 4th International Conference on Ubiquitous and Future Networks (ICUFN 2012), Phuket, Thailand, Juli 2012, 286–287, IEEE Computer Society. doi:10.1109/ICUFN.2012.6261712
Extending the Palladio Component Model using Profiles and Stereotypes
Kramer, M. E.; Durdik, Z.; Hauck, M.; Henss, J.; Küster, M.; Merkle, P.; Rentschler, A.
2012. Palladio Days 2012. Proceedings, 8 - 9 November 2012, Universität Paderborn, Germany. Ed.: S. Becker, 7–15, Karlsruher Institut für Technologie (KIT)
Waters Signatures with Optimal Security Reduction
Hofheinz, D.; Jager, T.; Knapp, E.
2012. Public Key Cryptography -PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, Germany, May 21-23, 2012. Proceedings. Ed.: M. Fischlin, 66–83, Springer Verlag. doi:10.1007/978-3-642-30057-8_5
All-But-Many Lossy Trapdoor Functions
Hofheinz, D.
2012. Advances in Cryptology -EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Cambridge, UK, April 15-19, 2012. Proceedings. Ed.: D. Pointcheval, 209–227, Springer Verlag. doi:10.1007/978-3-642-29011-4_14
Tightly Secure Signatures and Public-Key Encryption
Hofheinz, D.; Jager, T.
2012. Advances in Cryptology - CRYPTO 2012 32nd Annual Cryptology Conference Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Ed.: R. Safavi-Naini, 590–607, Springer Verlag. doi:10.1007/978-3-642-32009-5_35
On definitions of selective opening security
Böhl, F.; Hofheinz, D.; Kraschewski, D.
2012. 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012; Darmstadt; Germany; 21 May 2012 through 23 May 2012, 522–539, Springer Verlag. doi:10.1007/978-3-642-30057-8_31
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. 6th International Conference on Information Theoretic Security, ICITS 2012 Montreal, QC, Canada, August 15-17, 2012 Proceedings. Ed.: A. Smith, 111–128, Springer Verlag. doi:10.1007/978-3-642-32284-6_7
2011
Journal Articles
Vertrauensbildung bei Internetwahlen
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Bonsai Trees, or How to Delegate a Lattice Basis
Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C.
2011. Journal of cryptology, 25 (4), 601–639. doi:10.1007/s00145-011-9105-2
Die Entscheidung des Bundesverwaltungsgerichts vom 09.06.2010 -– Datei Gewalttäter Sport
Spiecker genannt Döhmann, I.; Kehr, T.
2011. Deutsches Verwaltungsblatt, 15, 930–936
Harmonisierung konträrer Kommunikationsmodelle im Datenschutzkonzept des EnWG – Stern trifft Kette
Raabe, O.; Lorenz, M.; Pallas, F.; Weis, E.
2011. Computer und Recht, 27 (12), 831–840. doi:10.9785/ovs-cr-2011-831
KASTEL - An Application-Driven Center of Excellence for IT Security
Müller-Quade, J.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Döttling, N.; Mie, T.; Jörn Müller-Quade; Nilges, T.
2011. IACR Cryptology ePrint Archive, 2011, 1–32
Kommunikation als Herausforderung: Neue Wege im Datenschutz sozialer Netzwerke
Spiecker Döhmann, I.
2011. Anwaltsblatt, 61 (4), 256–259
Software Security in Virtualized Infrastructures - The Smart Meter Example
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Advanced chopping of sequential and concurrent programs
Giffhorn, D.
2011. Software Quality Journal, 19 (2), 239–294. doi:10.1007/s11219-010-9114-7
Service robotics: do you know your new companion? Framing an interdisciplinary technology assessment
Decker, M.; Dillmann, R.; Dreier, T.; Fischer, M.; Gutmann, M.; Ott, I.; Spiecker gen. Döhmann, I.
2011. Poiesis & praxis, 8 (1), 25–44. doi:10.1007/s10202-011-0098-6
Book Chapters
Online- und Offline-Nutzung von Daten: Einige Überlegungen zum Umgang mit Informationen im Internetzeitalter
Spiecker genannt Döhmann, I.
2011. Internet – Überholt die Wirklichkeit das Recht? Nürnberg, 07.10. – 09.10.2010, 39–54, Schmidt
Teil-Verfassungordnung Datenschutz
Spiecker genannt Döhmann, I.
2011. Der Eigenwert des Verfassungsrechts. Hrsg.: St. Korioth, 278–304, Mohr Siebeck
Prozessbezogener Datenschutz im Smart Grid
Raabe, O.
2011. Sicherheit und Datenschutz bei Smart Energy. Hrsg.: H. Thielmann; D. Klumpp; J. Eberspächer, 42 ff, Münchner Kreis
Conference Papers
Feasibility Analysis of Pret a Voter for German Federal Elections
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Die Vermessung der Welt als Problem des Datenschutzrechts – zum Umgang mit Geodaten im Internet
Spiecker genannt Döhmann, I.
2011. Perspektiven des deutschen, polnischen und europäischen Informationsrechts : Ergebnisse einer deutsch-polnischen Alexander von Humboldt-Institutspartnerschaft, 91–109, V&R unipress
Die Nutzung elektronischer Medien: REACh-Datenbanken, Veröffentlichung von Genehmigungsverfahren im Internet und Geodaten-Vermittlung wie Google Maps
Spiecker genannt Döhmann, I.
2011. Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz, 26. Trierer Kolloquium zum Umwelt- und Technikrecht vom 5. bis 7. September 2010. Hrsg.: R. Hendler, 155–186, Schmidt
Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat
Schallbruch, M.; Micklitz, S.; Kurz, C.; Steels, L.; Broy, M.; Dolev, D.; Weßel, C.; Meyer, K.; Zwingenberger, F.; Donges, M.; others
2011. Informatik 2011: Informatik schafft Communities, Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 4. - 7.10.2011 in Berlin, 39, Ges. für Informatik
Verlässliche Software fur kritische Infrastrukturen - Preface
Beckert, B.; Snelting, G.
2011. INFORMATIK 2011 Informatik schafft Communities – Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Berlin, Germany, 4. - 7.10.2011. Ed.: H.-U. Heiß Hrsg.: Hans-Ulrich Heiß; Peter Pepper; Holger Schlingloff; Jörg Schneider, 347, Ges. für Informatik
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions
Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings, 364–381, Springer Verlag. doi:10.1007/978-3-642-19571-6_22
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011. Extended full version in the IACR ePrint Archive, 164–181, Springer Verlag
Short Signatures from Weaker Assumptions
Hofheinz, D.; Jager, T.; Kiltz, E.
2011. Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security Seoul, South Korea, December 4-8, 2011., 647–666, Springer Verlag. doi:10.1007/978-3-642-25385-0_35
Efficient Reductions for Non-Signaling Cryptographic Primitives
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 5th International Conference on Information Theoretic Security, ICITS 2011; Amsterdam; Netherlands; 21 May 2011 through 24 May 2011. Ed.: S. Fehr, 120–137, Springer Verlag. doi:10.1007/978-3-642-20728-0_12
The 1st Verified Software Competition: Experience Report
Klebanov, V.; Müller, P.; Shankar, N.; Leavens, G. T.; Wüstholz, V.; Alkassar, E.; Arthan, R.; Bronish, D.; Chapman, R.; Cohen, E.
2011. FM 2011: Formal Methods 17th International Symposium on Formal Methods Limerick, Ireland, June 20-24, 2011 Proceedings. Ed.: M. Butler, 154–168, Springer Verlag. doi:10.1007/978-3-642-21437-0_14
Information flow analysis via path condition refinement
Taghdiri, M.; Snelting, G.; Sinz, C.
2011. Formal Aspects of Security and Trust 7th InternationalWorkshop, FAST 2010 Pisa, Italy, September 16-17, 2010. Ed.: P. Degano Revised Selected Papers, 65–79, Springer Verlag
User behavior prediction for energy management in smart homes
Bao, K.; Allerding, F.; Schmeck, H.
2011. Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC’11; Shanghai; China; 26 July 2011 through 28 July 201, 1335–1339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FSKD.2011.6019758
Organic smart Home - Architecture for Energy Management in Intelligent Buildings
Allerding, F.; Schmeck, H.
2011. Workshop Organic Computing as part of ICAC, June 14-18, 2011, Karlsruhe, 67–76, Association for Computing Machinery (ACM). doi:10.1145/1998642.1998654
2010
Journal Articles
Using Genetic Search for Reverse Engineering of Parametric Behavior Models for Performance Prediction
Krogmann, K.; Kuperberg, M.; Reussner, R.
2010. IEEE transactions on software engineering, 36 (6), 865–877. doi:10.1109/TSE.2010.69
Evaluierungsverfahren für Internetwahlsysteme
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Information Flow Noninterference via Slicing
Wasserrab, D.
2010. The Archive of Formal Proofs, (3), 44 S
Book Chapters
A Process to Effectively Identify “Guilty” Performance Antipatterns
Cortellessa, V.; Martens, A.; Reussner, R.; Trubiani, C.
2010. Fundamental approaches to software engineering : 13th international conference, FASE 2010, held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010 ; proceedings. Ed.: D. Rosenblum, 368–382, Springer Verlag. doi:10.1007/978-3-642-12029-9_26
Electronic Voting in Germany
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Conference Papers
Using quality of service bounds for effective multi-objective software architecture optimization
Noorshams, Q.; Martens, A.; Reussner, R.
2010. Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems (QUASOSS ’10), Oslo, Norway, October 4, 2010, 1:1–1:6, Association for Computing Machinery (ACM). doi:10.1145/1858263.1858265
Automatically improve software models for performance, reliability and cost using genetic algorithms
Martens, A.; Koziolek, H.; Becker, S.; Reussner, R.
2010. WOSP/SIPEW’10 : proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering; January 28 - 30, 2010, San José, CA, USA, 105–116, Association for Computing Machinery (ACM). doi:10.1145/1712605.1712624
A Hybrid Approach for Multi-attribute QoS Optimisation in Component Based Software Systems
Martens, A.; Ardagna, D.; Koziolek, H.; Mirandola, R.; Reussner, R.
2010. Research into practice - reality and gaps : 6th International Conference on the Quality of Software Architectures, QoSA 2010, Prague, Czech Republic, June 23 - 25, 2010 ; proceedings. Ed.: G. T. Heineman, 84–101, Springer Verlag. doi:10.1007/978-3-642-13821-8_8
State dependence in performance evaluation of component-based software systems
Kapova, L.; Buhnova, B.; Martens, A.; Happe, J.; Reussner, R.
2010. First Joint WOSP/SIPEW International Conference on Performance Engineering San Jose California USA January 28 - 30, 2010. Ed.: A. Adamson, 37–48, ACM Digital Library. doi:10.1145/1712605.1712613
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik e.V.  (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik e.V.  (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik e.V.  (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
Speeding up context-, object- and field-sensitive SDG generation
Graf, J.
2010. 10th IEEE International Working Conference on Source Code Analysis and Manipulation, Timisoara, Romania , September 12-13, 2010. Ed.: J. Vinju, 105–114, Institute of Electrical and Electronics Engineers (IEEE)
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing
Wasserrab, D.; Lohner, D.
2010. 6th International Verification Workshop - VERIFY-2010, Edinburgh, July 20-21, 2010
Experiences with PDG-based IFC
Hammer, C.
2010. Engineering secure software and systems - second international symposium, ESSoS 2010, Pisa, Italy, February 3 - 4, 2010. Proceedings. Ed.: F. Massacci, 44–60, Springer Verlag
Gateway Decompositions for Constrained Reachability Problems
Katz, B.; Krug, M.; Lochbihler, A.; Rutter, I.; Snelting, G.; Wagner, D.
2010. Experimental Algorithms - 9th International Symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings. Ed.: P. Festa, 449–461, Springer Verlag
2009
Journal Articles
Verifizierbarkeit elektronischer Wahlen
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Polynomial runtime in simulatability definitions
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
2009. Journal of computer security, 17 (5), 703–735. doi:10.3233/JCS-2009-0354
Backing up Slicing : Verifying the Interprocedural Two-Phase Horwitz-Reps-Binkley Slicer
Wasserrab, D.
2009. The Archive of Formal Proofs, (11), 543 S
On Temporal Path Conditions in Dependence Graphs
Lochbihler, A.; Snelting, G.
2009. Automated Software Engineering, 16 (2), 263–290
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs
Hammer, C.; Snelting, G.
2009. International journal of information security, 8 (6), 399–422
Book Chapters
Developing a Legal Framework for Remote Electronic Voting
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer Verlag. doi:10.1007/978-3-642-04135-8_6
Conference Papers
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik e.V.  (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen
Towards the impact of the operational environment on the security of e-voting
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik e.V.  (GI)
Determine the Resilience of Evaluated Internet Voting Systems
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik e.V.  (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
2008
Conference Papers
Trust Models for Remote Electronic Voting
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik e.V.  (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik e.V.  (GI)
Precise Analysis of Java Programs using JOANA
Giffhorn, D.; Hammer, C.
2008. Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. Ed.: S. Kawada, 267–268, IEEE Computer Society
2007
Journal Articles
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II)
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
Conference Papers
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer Verlag
Compliance of RIES to the proposed e-voting protection profile
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer Verlag
Requirements and Evaluation Procedures for eVoting
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
2006
Journal Articles
Die Online-Wahl auf dem Weg zum Durchbruch
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
Conference Papers
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik e.V.  (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik e.V.  (GI)
Enabling the Application of Open Systems like PCs for Online Voting
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik e.V.  (GI)
Multiple Cast in Online Voting - Analyzing Chances
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
2005
Journal Articles
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
Conference Papers
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
2004
Conference Papers
From Legal Principles to an Internet Voting System
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik e.V.  (GI)