Publikationsliste


2022
Proceedingsbeiträge
Tackling Challenges of Robustness Measures for Autonomous Agent Collaboration in Open Multi-Agent Systems.
Jin, D.; Kannengießer, N.; Sturm, B.; Sunyaev, A.
2022. Hawaii International Conference on System Sciences (HICSS)
2021
Buchaufsätze
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer.
Berger, R. M.; Tiepelt, M.
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Dynamic Model Based Detection of Cyberattacks in Industrial Facilities.
Kathrin Reibelt; Hubert B. Keller; Veit Hagenmeyer; Jörg Matthes.
2021. 31st European Symposium on Computer Aided Process Engineering: ESCAPE-31. Eds.: Metin Türkay and Rafiqul Gani, 1339–1344, Elsevier. doi:10.1016/B978-0-323-88506-5.50206-0
Human Factors in Security.
Berens, B.; Ghiglieri, M.; Kulyk, O.; Mayer, P.; Volkamer, M.
2021. Sicherheitskritische Mensch-Computer-Interaktion. Hrsg.: C. Reuter, 89–110, Springer Fachmedien Wiesbaden
Finding a Universal Execution Strategy for Model Transformation Networks.
Gleitze, J.; Klare, H.; Burger, E.
2021. Fundamental Approaches to Software Engineering. Ed.: E. Guerra, 87–107, Springer International Publishing. doi:10.1007/978-3-030-71500-7_5
Information Management.
Spiecker gen. Döhmann, I.
2021. Oxford Handbook on Comparative Law. Ed.: P. Cane, Oxford Univ. Pr
Dissertationen
On Foundations of Protecting Computations. Dissertation.
Agrikola, T.
2021, Juni 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
QoS-Based Optimization of Runtime Management of Sensing Cloud Applications. Dissertation.
Gotin, M.
2021, Juni 2. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133328
Masterarbeiten
Bachelorarbeiten
On the Impossibility of Unconditionally Secure Quantum Bit Commitment. Bachelorarbeit.
Haizmann, F.
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000132586
The Feasibility of Limiting Access to Fingerprintable Surfaces in Web Browsers. Bachelorarbeit.
Gretenkort, J.
2021, März 19. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000131038
Proceedingsbeiträge
Dealing with Uncertainty in Architectural Confidentiality Analysis.
Hahner, S.
2021. Proceedings of the Software Engineering 2021 Satellite Events, 1–6, Gesellschaft für Informatik (GI)
Plausible Deniability for Anonymous Communication.
Kuhn, C.; Noppel, M.; Wressnegger, C.; Strufe, T.
2021. Proceedings of 20th Workshop on Privacy in the Electronic Society (WPES), Seoul, South Korea, November 15, 2021
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems.
Kühnapfel, N.; Preußler, S.; Noppel, M.; Schneider, T.; Rieck, K.; Wressnegger, C.
2021. Proceedings of 37th Annual Computer Security Applications Conference (ACSAC), Austin, TX, December 6-10, 2021
Putting Privacy into Perspective – Comparing Technical, Legal, and Users’ View of Information Sensitivity.
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker genannt Döhmann, I.; Ziefle, M.
2021. Informatik 2020 - Back to the future : 50. Jahrestagung der Gesellschaft für Informatik vom 28. September - 2. Oktober 2020, virtual. Ed.: R.H. Reussner, Gesellschaft für Informatik (GI). doi:10.18420/inf2020_76
Need for Change: Business Functions Affected by the Use of Decentralized Information Systems.
Heines, R.; Kannengießer, N.; Sturm, B.; Jung, R.; Sunyaev, A.
2021. 42nd International Conference on Information Systems (ICIS), Association for Information Systems (AIS)
Adversarial Robust Model Compression using In-Train Pruning.
Vemparala, M. R.; Fasfous, N.; Frickenstein, A.; Sarkar, S.; Zhao, Q.; Kuhn, S.; Frickenstein, L.; Singh, A.; Unger, C.; Nagaraja, N. S.; Wressnegger, C.; Stechele, W.
2021. CVPR 3rd Workshop on Safe Artificial Intelligence for Automated Driving (SAIAD), June 19, 2021, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CVPRW53098.2021.00016
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.
Roy, A.; Andreeva, E.; Sauer, J. F.
2021. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Ed.: O. Dunkelman, 273–300, Springer International Publishing. doi:10.1007/978-3-030-81652-0_11
Reconstructing z3 proofs in KeY: There and back again.
Pfeifer, W.; Schiffl, J.; Ulbrich, M.
2021. Proceedings of the 23rd ACM International Workshop on Formal Techniques for Java-like Programs : 23rd ACM International Workshop on Formal Techniques for Java-Like Programs, FTfJP 2021, co-located with ECOOP/ISSTA 2021, Online, 13 July 2021 - null, 24–31, Association for Computing Machinery (ACM). doi:10.1145/3464971.3468421
Lower Bounds and Hardness Magnification for Sublinear-Time Shrinking Cellular Automata.
Modanese, A.
2021. Computer Science – Theory and Applications : 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28–July 2, 2021, Proceedings. Ed.: R. Santhanam, 296–320, Springer Verlag. doi:10.1007/978-3-030-79416-3_18
A unified model to detect information flow and access control violations in software architectures.
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021 - 8 July 2021, 26–37, SciTePress. doi:10.5220/0010515300260037
Runtime Verification of Generalized Test Tables.
Weigl, A.; Ulbrich, M.; Tyszberowicz, S.; Klamroth, J.
2021. NASA Formal Methods: 13th International Symposium, NFM 2021, Virtual Event, May 24–28, 2021, Proceedings. Ed.: A. Dutle, 358–374, Springer Verlag. doi:10.1007/978-3-030-76384-8_22
Dark Patterns in the Wild: Review of Cookie Disclaimer Designs on Top 500 German Websites.
Krisam, C.; Dietmann, H.; Volkamer M.; Kulyk O.
2021. European Symposium on Usable Security (EuroUSEC 2021), 11-12 Oktober 2021, Association for Computing Machinery (ACM)
Vision: What Johnny learns about Password Security from Videos posted on YouTube.
Christmann, M.; Mayer, P.; Volkamer, M.
2021. European Symposium on Usable Security (EuroUSEC), 11 - 12 Oktober 2021, Association for Computing Machinery (ACM)
How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies.
Christmann, M.; Mayer, P.; Volkamer, M.
2021. Who are you? Adventures in Authentication Workshop (WAY), 8. August 2021
Evaluation der interaktiven NoPhish Präsenzschulung.
Berens, B.; Aldag, L.; Volkamer, M.
2021. Mensch und Computer 2021 Workshopband. doi:10.18420/muc2021-mci-ws14-394
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control.
Schiffl, J.; Grundmann, M.; Leinweber, M.; Stengele, O.; Friebe, S.; Beckert, B.
2021. SACMAT ’21: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 125–130, Association for Computing Machinery (ACM). doi:10.1145/3450569.3463574
A Literature Review on Virtual Reality Authentication.
Jones, J. M.; Duezguen, R.; Mayer, P.; Volkamer, M.; Das, S.
2021. Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Ed.: S. Furnell, 189–198, Springer. doi:10.1007/978-3-030-81111-2_16
TagVet: Vetting Malware Tags using Explainable Machine Learning.
Pirch, L.; Warnecke, A.; Wressnegger, C.; Rieck, K.
2021. EuroSec ’21: Proceedings of the 14th European Workshop on Systems Security, 34–40, Association for Computing Machinery (ACM). doi:10.1145/3447852.3458719
"Now I’m a bit angry:" Individuals’ Awareness, Perception, and Responses to Data Breaches that Affected Them.
Mayer, P.; Zou, Y.; Schaub, F.; Aviv, A. J.
2021. 30th USENIX Security Symposium, Vancouver, CDN, August 11-13, 2021, 393–410, Advanced Computing Systems Association (USENIX)
Security in Distributed Ledger Technology: An Analysis of Vulnerabilities and Attack Vectors.
Gojka, E.-E.; Kannengießer, N.; Sturm, B.; Bartsch, J.; Sunyaev, A.
2021. Intelligent Computing: Proceedings of the 2021 Computing Conference, Volume 3. Ed.: K. Arai, 722–742, Springer. doi:10.1007/978-3-030-80129-8_50
“Healthy surveillance”: Designing a concept for privacy-preserving mask recognition AI in the age of pandemics.
Kühl, N.; Martin, D.; Wolff, C.; Volkamer, M.
2021. Hawaii International Conference on Systems Sciences (HICSS-54), January 5-8, 2021
Bücher
Datenschutzrechtliche Aspekte neuer Mobilitätskonzepte im Öffentlichen Nahverkehr.
Bretthauer, S.; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Detecting Violations of Access Control and Information Flow Policies in Data Flow Diagrams.
Seifermann, S.; Heinrich, R.; Werle, D.; Reussner, R.
2021. The journal of systems and software
Die EU als Trendsetter weltweiter KI-Regulierung: Der Kommissionsentwurf für eine KI-Verordnung der EU.
Ebert, A.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (16), 1188–1193
Ein Netzwerk für Europas Cybersicherheit.
Wintzingerode, C. von; Müllmann, D.; Spiecker gen. Döhmann, I.
2021. Neue Zeitschrift für Verwaltungsrecht, 40 (10), 690–695
Insights on Data Sensitivity from the Technical, Legal and the Users’ Perspectives — Practical suggestions on how to raise more awareness for the assumed exercise of informational self-determination.
Schomakers, E.-M.; Lidynia, C.; Müllmann, D.; Matzutt, R.; Wehrle, K.; Spiecker gen. Döhmann, I.; Ziefle, M.
2021. Computer law review international, 22 (1), 8–15. doi:10.9785/cri-2021-220103
Challenges and Common Solutions in Smart Contract Development [in press].
Kannengießer, N.; Lins, S.; Sander, C.; Winter, K.; Frey, H.; Sunyaev, A.
2021. IEEE transactions on software engineering. doi:10.1109/TSE.2021.3116808
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Card-Based Cryptography Meets Formal Verification.
Koch, A.; Schrempp, M.; Kirsten, M.
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Ein neues "Datenkartellrecht" zum Schutz der informationellen Selbstbestimmung im Markt der sozialen Plattformen?.
Fraunhofer IOSB; Steinbrück, A.; Wiens, M.; Birnstill, P.; Kaiser, F.; Zander, T.; Raabe, O.; Schultmann, F.; Volkamer, M.
2021. Recht der Datenverarbeitung, 37 (1), 7–13
When Data Fly: An Open Data Trading System in Vehicular Ad Hoc Networks.
Lücking, M.; Kretzer, F.; Kannengießer, N.; Beigl, M.; Sunyaev, A.; Stork, W.
2021. Electronics, 10 (6), 654. doi:10.3390/electronics10060654
Analysis of the Matrix Event Graph Replicated Data Type.
Jacob, F.; Beer, C.; Henze, N.; Hartenstein, H.
2021. IEEE access, 9, 28317–28333. doi:10.1109/ACCESS.2021.3058576
Token Economy.
Sunyaev, A.; Kannengießer, N.; Beck, R.; Treiblmaier, H.; Lacity, M.; Kranz, J.; Fridgen, G.; Spankowski, U.; Luckow, A.
2021. Business & information systems engineering, 63 (4), 457–478. doi:10.1007/s12599-021-00684-1
Efficient communication protection of many-core systems against active attackers.
Moriam, S.; Franz, E.; Walther, P.; Kumar, A.; Strufe, T.; Fettweis, G.
2021. Electronics, 10 (3), Art.-Nr.: 238. doi:10.3390/electronics10030238
Enabling consistency in view-based system development - The Vitruvius approach.
Klare, H.; Kramer, M. E.; Langhammer, M.; Werle, D.; Burger, E.; Reussner, R.
2021. The journal of systems and software, 171, Article no: 110815. doi:10.1016/j.jss.2020.110815
2020
Buchaufsätze
Fundamental Properties of the Layer Below a Payment Channel Network.
Grundmann, M.; Hartenstein, H.
2020. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Ed.: J. Garcia-Alfaro, 409–420, Springer International Publishing. doi:10.1007/978-3-030-66172-4_26
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference.
Beckert, B.; Herda, M.; Kirsten, M.; Tyszberowicz, S.
2020. Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY. Ed.: W. Ahrendt, 287–312, Springer. doi:10.1007/978-3-030-64354-6_12
Ein europäisches Netzwerk für Cybersicherheit.
Müllmann, D.; Wintzingerode, C. von.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 475–492, OlWIR Verlag für Wirtschaft
Homeland Security Act vs. BSIG - Eine rechtsvergleichende Betrachtung der IT-Sicherheit kritischer Infrastrukturen in den USA und Deutschland.
Müllmann, D.; Ebert, A.; Reißner, L.
2020. Den Wandel begleiten - IT-rechtliche Herausforderungen der Digitalisierung. Hrsg.: J. Taeger, 459–473, OlWIR Verlag für Wirtschaft
Herausforderungen im Datenschutz von Unternehmen.
Spiecker gen. Döhmann, I.; Benecke, A.
2020. Handbuch Industrie 4.0 : Recht, Technik, Gesellschaft. Hrsg.: W. Frenz, 181–200, Springer
Perspektiven des Europäischen Katastrophenschutzrechts - Herausforderungen eines vernachlässigten Rechtsgebiets.
Bretthauer, S.
2020. Zehn Jahre Vertrag von Lissabon. Hrsg.: S. Martini, 133–150, Nomos Verlag
A European and German Perspective on data protection law in a digitalized world.
Bretthauer, S.
2020. Comparative Privacy and Defamation. Ed.: A. Koltay, 199–215, Edward Elgar Publishing
Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You.
Reinheimer, B. M.; Islam, F.; Shumailov, I.
2020. Security Protocols XXVII – 27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers. Ed.: J. Anderson, 20–40, Springer International Publishing. doi:10.1007/978-3-030-57043-9_3
Dissertationen
Advanced Cryptographic Techniques for Protecting Log Data. Dissertation.
Hartung, G. R.
2020, März 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Secure and Usable User Authentication. Dissertation.
Mayer, P.
2020, März 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117445
Bachelorarbeiten
Optimizations of Isogeny-based Key Exchange. Bachelorarbeit.
Reichert, P.
2020. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133155
Proceedingsbeiträge
Inference Attacks on Physical Layer Channel State Information.
Walther, P.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 935–942, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00125
Privacy-Preserving Public Verification of Ethical Cobalt Sourcing.
Becher, K.; Lagodzinski, J. A. G.; Strufe, T.
2020. Proceedings 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications : 29 December 2020 - 1 January 2021, Guangzhou, China. Ed.: G. Wang, 998–1005, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom50675.2020.00133
Practical Trade-Offs in Integrity Protection for Binaries via Ethereum.
Stengele, O.; Droll, J.; Hartenstein, H.
2020. Middleware ’20 Demos and Posters: Proceedings of the 21st International Middleware Conference Demos and Posters, 9–10, Association for Computing Machinery (ACM). doi:10.1145/3429358.3429374
On Pseudorandom Encodings.
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Exploiting Decryption Failures in Mersenne Number Cryptosystems.
Tiepelt, M.; D’Anvers, J.-P.
2020. 7th ACM Workshop on Asia Public-Key Cryptography, APKC 2020, held in conjunction with the 15th ACM ASIA Conference on Computer and Communications Security, ACM ASIACCS 2020, Taipei, Taiwan, 6 October 2020 (05.-09.2020). Ed.: K. Emura; N. Yanai, 45–54. doi:10.1145/3384940.3388957
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption.
Becher, K.; Strufe, T.
2020. 2020 IEEE Symposium on Computers and Communications (ISCC), 7-10 July 2020, Rennes, France, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISCC50000.2020.9219588
Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation.
Walther, P.; Strufe, T.
2020. 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, 31 August - 3 September 2020, online, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PIMRC48278.2020.9217278
Modular Verification of JML Contracts Using Bounded Model Checking.
Beckert, B.; Kirsten, M.; Klamroth, J.; Ulbrich, M.
2020. ISoLA 2020: Leveraging Applications of Formal Methods, Verification and Validation: Verification Principles - 9th International Symposium (ISoLA 2020), 60–80, Springer. doi:10.1007/978-3-030-61362-4_4
Browsing unicity: On the limits of anonymizing web tracking data.
Deuser, C.; Passmann, S.; Strufe, T.
2020. Proceedings 2020 IEEE Symposium on Security and Privacy SP 2020, San Francisco, California, USA, 18-21 May 2020. Ed.: P. Kellenberger, 777–790. doi:10.1109/SP40000.2020.00018
The german-speaking twitter community reference data set.
Pflugmacher, J.; Escher, S.; Reubold, J.; Strufe, T.
2020. IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 6-9 July 2020, online, 1172–1177, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFOCOMWKSHPS50562.2020.9162728
Multi-user authorization for simultaneous collaborative situation analysis workspaces using XACML.
Appenzeller, A.; Krempel, E.; Birnstill, P.; Beyerer, J.
2020. Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies IV, 21-25 September 2020 (Teilkonferenz von SPIE Security + Defence Digital Forum 2020). Ed.: H. Bouma, Art.-Nr.: 1154207, SPIE. doi:10.1117/12.2570824
Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control Systems.
Borcherding, A.; Pfrang, S.; Haas, C.; Weiche, A.; Beyerer, J.
2020. SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8-10, 2020 (SECRYPT is part of ICETE, the 17th International Joint Conference on e-Business and Telecommunications). Vol. 3. Ed.: P. Samarati, 27–38, SciTePress. doi:10.5220/0009517800270038
Context-Based Confidentiality Analysis for Industrial IoT.
Boltz, N.; Walter, M.; Heinrich, R.
2020. 2020 46th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA51224.2020.00096
A Taxonomy of Dynamic Changes Affecting Confidentiality.
Walter, M.; Seifermann, S.; Heinrich, R.
2020. 11th Workshop Design For Future – Langlebige Softwaresysteme
Dynamische personale Identitäten als Schutzgegenstand der DSGVO und technische Gestaltungsvorgabe.
Steinbrück, A.
2020. Den Wandel begleiten - IT-rechtliche Herausforderung der Digitalisierung : DSRI-Tagungsband Herbstakademie 2020. Hrsg.: J. Taeger, 73–86, OIWIR
Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0.
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2020. Security and Trust Management. Ed.: K. Markantonakis, 73–89, Springer Nature. doi:10.1007/978-3-030-59817-4_5
Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector.
Mossano, M.; Vaniea, K.; Aldag, L.; Düzgün, R.; Mayer, P.; Volkamer, M.
2020. IEEE European Symposium on Security and Privacy 2020, (EuroS&PW) - The 5th European Workshop on Usable Security, September 7, 2020, Online (ursprünglich: June 15, 2020, Genova, Italy), 130–139, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW51379.2020.00026
Identification and Localization of Cyber-Attacks in Industrial Facilities.
Reibelt, K.; Matthes, J.; Keller, H. B.; Hagenmeyer, V.
2020. ESCAPE 30, 30th European Symposium on Computer Aided Process Engineering, Milan, Italy, 30 August 2020 – 2 September 2020. Ed.: S. Pierucci, 1747–1752, Elsevier
Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks.
Patzer, F.; Lüdtke, P.; Meshram, A.; Beyerer, J.
2020. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 137–161, Springer Verlag. doi:10.1007/978-3-030-49443-8_7
Attacks on Dynamic Protocol Detection of Open Source Network Security Monitoring Tools.
Grashöfer, J.; Titze, C.; Hartenstein, H.
2020. 2020 IEEE Conference on Communications and Network Security (CNS), 9 S., Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CNS48642.2020.9162332
An investigation of phishing awareness and education over time: When and how to best remind users.
Reinheimer, B. M.; Aldag, L.; Mayer, P.; Mossano, M.; Düzgün, R.; Lofthouse, B.; von Landesberger, T.; Volkamer, M.
2020. Proceedings of the Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020) : August 10-11, 2020, 259–284, Advanced Computing Systems Association (USENIX)
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study.
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
Düzgün, R.; Mayer, P.; Das, S.; Volkamer, M.
2020. Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2020), August 7–11, 2020
Enabling Data Sovereignty for Patients through Digital Consent Enforcement.
Appenzeller, A.; Rode, E.; Krempel, E.; Beyerer, J.
2020. PETRA ’20: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 30 June - 3 July 2020, Article No.: 33, Association for Computing Machinery (ACM). doi:10.1145/3389189.3393745
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO.
Agrikola, T.; Couteau, G.; Hofheinz, D.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
On Instantiating the Algebraic Group Model from Falsifiable Assumptions.
Agrikola, T.; Hofheinz, D.; Kastner, J.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Smart Contracts: Application Scenarios for Deductive Program Verification.
Beckert, B.; Schiffl, J.; Ulbrich, M.
2020. Formal Methods. FM 2019 International Workshops : Porto, Portugal, October 7–11, 2019, Revised Selected Papers, Part I. Ed.: Emil Sekerinski, 293–298, Springer. doi:10.1007/978-3-030-54994-7_21
Verified Construction of Fair Voting Rules.
Diekhoff, K.; Kirsten, M.; Krämer, J.
2020. Logic-Based Program Synthesis and Transformation : 29th International Symposium, LOPSTR 2019, Porto, Portugal, October 8–10, 2019, Revised Selected Papers. Ed.: M. Gabbrielli, 90–104, Springer International Publishing. doi:10.1007/978-3-030-45260-5_6
Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Kulyk, O.; Volkamer, M.; Müller, M.; Renaud, K.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, [1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020, held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020; Kota Kinabalu; Malaysia; 14 February 2020 through 14 February 2020], Revised Selected Papers. Ed.: Matthew Bernhard, 291–309, Springer. doi:10.1007/978-3-030-54455-3_21
A meta model for a comprehensive description of network protocols improving security tests.
Pfrang, S.; Meier, D.; Fleig, A.; Beyerer, J.
2020. Proceedings of the 6th International Conference on Information Systems Security and Privacy. Ed.: S. Furnell, 671–682, SciTePress
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.
Kulyk, O.; Reinheimer, B.; Aldag, L.; Mayer, P.; Gerber, N.; Volkamer, M.
2020. Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Ed.: Matthew Bernhard, 84–101, Springer. doi:10.1007/978-3-030-54455-3_7
Bücher
40 Klausuren aus dem Verwaltungsrecht.
Bretthauer, S.; Collin, P.; Egidy, S.; Spiecker gen. Döhmann, I.
2020. Vahlen
Zeitschriftenaufsätze
Comparing the Perception of Privacy for Medical Devices and Devices With Medical Functionality.
Kaiser, F.; Wiens, M.; Schultmann, F.
2020. International journal of privacy and health information management, 8 (1), 52–69. doi:10.4018/IJPHIM.2020010103
Has the GDPR hype affected users’ reaction to cookie disclaimers?.
Kulyk, O.; Gerber, N.; Hilt, A.; Volkamer, M.
2020. Journal of Cybersecurity, 6 (1). doi:10.1093/cybsec/tyaa022
IT Sicherheitsgesetz 2.0 und das Vorbild USA.
Müllmann, D.; Ebert, A.; Reissner, L.
2020. Computer und Recht, 36 (9), 584–592
Privatsphärengerechte intelligente Mobilitätssteuerung.
Bretthauer, S.; Schmitt, A. A.
2020. Zeitschrift für Datenschutz : ZD, 341–347
Die rechtliche Zulässigkeit einer Onlinewahl zur Sozialwahl.
Bretthauer, S.; Spiecker gen. Döhmann, I.
2020. Neue Zeitschrift für Sozialrecht, 2020 (7), 241–247
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit.
Mayer, P.; Ballreich, F.; Düzgün, R.; Schwarz, C.; Volkamer, M.
2020. Datenschutz und Datensicherheit, 44 (8), 522–527. doi:10.1007/s11623-020-1318-9
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices.
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
IT-Sicherheit im Wettstreit um die erste autonome Fahrzeugflotte.
Zander, T.; Birnstill, P.; Kaiser, F.; Wiens, M.; Beyerer, J.; Schultmann, F.
2020. Technikfolgenabschätzung, Theorie und Praxis, 29 (1), 16–22. doi:10.14512/tatup.29.1.16
Biggest Failures in Security (Dagstuhl Seminar 19451).
Armknecht, F.; Verbauwhede, I.; Volkamer, M.; Yung, M.
2020. Dagstuhl Reports, 9 (11), 1–23. doi:10.4230/DagRep.9.11.1
2019
Buchaufsätze
Formal Verification of Evolutionary Changes.
Beckert, B.; Mund, J.; Ulbrich, M.; Weigl, A.
2019. Managed Software Evolution. Hrsg.: Ralf H. Reussner, Michael Goedicke, Wilhelm Hasselbring, Birgit Vogel-Heuser, Jan Keim, Lukas Märtin, 309–332, Springer. doi:10.1007/978-3-030-13499-0_11
Challenges of Using Trusted Computing for Collaborative Data Processing.
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2019. Security and Trust Management – 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings. Ed.: S. Mauw, 107–123, Springer. doi:10.1007/978-3-030-31511-5_7
TEE-based distributed watchtowers for fraud protection in the Lightning Network.
Leinweber, M.; Grundmann, M.; Schönborn, L.; Hartenstein, H.
2019. Data privacy management, cryptocurrencies and blockchain technology. Ed.: C. Pérez-Solà, 177–194, Springer Nature. doi:10.1007/978-3-030-31500-9_11
Verfassungsrechtliche Grundlagen des Europäischen und nationalen Datenschutzrechts.
Bretthauer, S.
2019. Handbuch europäisches und deutsches Datenschutzrecht. Hrsg.: L. Specht, 7–37, Verlag C.H.Beck
Dissertationen
Cryptographic Protocols from Physical Assumptions. Dissertation.
Koch, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Security and Anonymity Aspects of the Network Layer of Permissionless Blockchains. Dissertation.
Neudecker, T.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000089033
Masterarbeiten
Incentivized Privacy-Preserving Participatory Sensing. Masterarbeit.
Lauser, T.
2019, Dezember 18. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000124803
Modular Verification of JML Contracts Using Bounded Model Checking. Masterarbeit.
Klamroth, J.
2019, März 3. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000122228
UC-sichere private Schnittmengenberechnung mit transparenten Enklaven. Masterarbeit.
Zinkina, A.
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000099120
Proceedingsbeiträge
Detasyr: Decentralized Ticket-based Authorization with Sybil Resistance.
Friebe, S.; Martinat, P.; Zitterbart, M.
2019. 2019 IEEE 44th Conference on Local Computer Networks (LCN), Osnabrueck, Germany, 14-17 Oct. 2019, 60–68, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN44214.2019.8990773
Unpatchable? - Der gesetzliche Umgang mit von menschlichem Verhalten ausgehenden Risiken für die IT-Sicherheit kritischer Infrastrukturen.
Müllmann, D.
2019. Die Macht der Daten und der Algorithmen - Regulierung von IT, IoT und KI : Tagungsband Herbstakademie 2019. Hrsg.: J. Taeger, 245–260, OlWIR
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes.
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
The Industrie 4.0 Asset Administration Shell as Information Source for Security Analysis.
Patzer, F.; Volz, F.; Usländer, T.; Blöcher, I.; Beyerer, J.
2019. 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) : Paraninfo Building, University of Zaragoza, Zaragoza, Spain, 10-13 September, 2019 : proceedings, 420–427, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2019.8869059
Formal Property-Oriented Design of Voting Rules Using Composable Modules.
Diekhoff, K.; Kirsten, M.; Krämer, J.
2019. Algorithmic Decision Theory - 6th International Conference, ADT 2019, Durham, NC, USA, October 25–27, 2019, Proceedings. Ed.: S. Pekeč, 164–166, Springer. doi:10.1007/978-3-030-31489-7
Card-Based Cryptography Meets Formal Verification.
Koch, A.; Schrempp, M.; Kirsten, M.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections.
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations.
Kulyk, O.; Henzel, J.; Renaud, K.; Volkamer, M.
2019. Human-Computer Interaction – INTERACT 2019. Part I. Ed.: D. Lamas, 519–538, Springer International Publishing. doi:10.1007/978-3-030-29381-9_32
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin.
Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 84–92, Springer International Publishing. doi:10.1007/978-3-030-32101-7_6
Quantum LLL with an application to mersenne number cryptosystems.
Tiepelt, M.; Szepieniec, A.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
Using Relational Verification for Program Slicing.
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2019. Software Engineering and Formal Methods – 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings. Ed.: P. Ölveczky, 353–372, Springer. doi:10.1007/978-3-030-30446-1_19
Understanding Counterexamples for Relational Properties with DIbugger.
Herda, M.; Kirsten, M.; Brunner, E.; Plewnia, J.; Scheler, U.; Staudenmaier, C.; Wagner, B.; Zwick, P.; Beckert, B.
2019. Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning (EPTCS), Prague, Czech Republic, 6-7th April 2019. Ed.: E. De Angelis, 6–13, Open Publishing Association. doi:10.4204/EPTCS.296.4
Why Johnny Fails to Protect his Privacy.
Gerber, N.; Zimmermann, V.; Volkamer, M.
2019. 4th IEEE European Symposium on Security and Privacy Workshops : proceedings : 17-19 June 2019, Stockholm, Sweden, 109–118, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW.2019.00019
Erklärvideo “Online-Betrug” – Nach nur fünf Minuten Phishing E-Mails nachweislich signifikant besser erkennen.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Rack, P.; Ghiglieri, M.; Gerber, N.; Mayer, P.; Kunz, A.
2019. IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung : Tagungsband zum 16. Deutschen IT-Sicherheitskongress, 307–318, SecuMedia Verlag
Towards Consistency Checking Between Software Architecture and Informal Documentation.
Keim, J.; Koziolek, A.
2019. 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), Hamburg, 25.-29. März 2019, 250–253, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA-C.2019.00052
PerOpteryx: Automated Improvement of Software Architectures.
Busch, A.; Fuchß, D.; Koziolek, A.
2019. IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019. Tool Demo Track, 162–165. doi:10.1109/ICSA-C.2019.00036
Access Control for Binary Integrity Protection using Ethereum.
Stengele, O.; Baumeister, A.; Birnstill, P.; Hartenstein, H.
2019. Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT ’19), Toronto, CDN, June 4-6, 2019, 3–12, Association for Computing Machinery (ACM). doi:10.1145/3322431.3325108
Data-driven software architecture for analyzing confidentiality.
Seifermann, S.; Heinrich, R.; Reussner, R.
2019. 2019 IEEE International Conference on Software Architecture (ICSA 2019), Hamburg, 25.-29. März 2019, Art. Nr.: 8703910, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2019.00009
Verification-based test case generation for information-flow properties.
Herda, M.; Müssig, J.; Tyszberowicz, S.; Beckert, B.
2019. 34th Annual ACM Symposium on Applied Computing, SAC 2019; Limassol; Cyprus; 8 April 2019 through 12 April 2019, 2231–2238, Association for Computing Machinery (ACM). doi:10.1145/3297280.3297500
On Tightly Secure Primitives in the Multi-instance Setting.
Hofheinz, D.; Nguyen, N. K.
2019. 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2019; Beijing; China; 14 April 2019 through 17 April 2019. Ed.: D. Lin, 581–611, Springer. doi:10.1007/978-3-030-17253-4_20
Single underlying models for projectional, multi-view environments.
Meier, J.; Klare, H.; Tunjic, C.; Atkinson, C.; Burger, E.; Reussner, R.; Winter, A.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 119–130, SciTePress. doi:10.5220/0007396401190130
Automated incident response for industrial control systems leveraging software-defined networking.
Patzer, F.; Meshram, A.; Heß, M.
2019. 5th International Conference on Information Systems Security and Privacy, ICISSP 2019; Prague; Czech Republic; 23 February 2019 through 25 February 2019, 319–327, SciTePress
Applying metamodel-based tooling to object-oriented code.
Klare, H.; Saglam, T.; Burger, E.; Reussner, R.
2019. 7th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2019), Prag, CZ, February 20-22, 2019. Ed.: S. Hammoudi, 219–230, SciTePress. doi:10.5220/0007246202190230
Balancing Performance Characteristics of Hierarchical Heavy Hitters.
Heseding, H.; Glöckle, J.; Bauer, R.; Zitterbart, M.
2019. IFIP NETWORKING 2019, Warsaw, Poland, May 20-22, 2019, Institute of Electrical and Electronics Engineers (IEEE). doi:10.23919/IFIPNetworking.2019.8816832
Banklaves: Concept for a Trustworthy Decentralized Payment Service for Bitcoin.
Grundmann, M.; Leinweber, M.; Hartenstein, H.
2019. Proceedings of 1st IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), Seoul, Südkorea, 14 - 17 Mai 2019, 268–276, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BLOC.2019.8751394
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users.
Kulyk, O.; Gerber, P.; Marky, K.; Beckmann, C.; Volkamer, M.
2019. Proceedings 2019 Workshop on Usable Security. Ed.: M.F. Theofanos. doi:10.14722/usec.2019.23029
Towards computer-aided security life cycle management for critical industrial control systems.
Patzer, F.; Meshram, A.; Birnstill, P.; Haas, C.; Beyerer, J.
2019. 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018; Kaunas; Lithuania; 24 September 2018 through 26 September 2018. Ed.: E. Luiijf, 45–56, Springer. doi:10.1007/978-3-030-05849-4_4
I (don’t) see what you typed there! Shoulder-surfing resistant password entry on gamepads.
Mayer, P.; Gerber, N.; Reinheimer, B.; Rack, P.; Braun, K.; Volkamer, M.
2019. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Paper 549, Association for Computing Machinery (ACM). doi:10.1145/3290605.3300779
Exploiting Transaction Accumulation and Double Spends for Topology Inference in Bitcoin.
Grundmann, M.; Neudecker, T.; Hartenstein, H.
2019. Financial Cryptography and Data Security : FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, (FC 2018), Nieuwpoort, CU, March 2, 2018. Ed.: A. Zohar, 113–126, Springer Verlag. doi:10.1007/978-3-662-58820-8_9
A Proxy Voting Scheme Ensuring Participation Privacy and Receipt-Freeness.
Kulyk, O.; Volkamer, M.
2019. Proceedings of the 52nd Annual Hawaii International Conference on System Sciences : January 8-11, 2019, Maui, Hawaii. Ed.: Tung X. Bui, 2842–2851, University of Hawaii at Manoa, Hamilton Library, ScholarSpace. doi:10.24251/HICSS.2019.343
Bücher
Gesundheitsversorgung in Zeiten der DSGVO.
Spiecker gen. Döhmann, I.; Wallrabenstein, A. (Hrsg.).
2019. Lang. doi:10.3726/b15795
Datenschutzrecht DSGVO mit BDSG.
Spiecker gen. Döhmann [Hrsg.]; Simitis, S.; Albrecht, J. P.
2019. (G. Hornung, Hrsg.), Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Digitale Mobilität.
Spiecker gen. Döhmann, I.
2019. Gewerblicher Rechtsschutz und Urheberrecht, 341–352
Können Algorithmen diskriminieren.
Spiecker gen. Döhmann, I.; Fröhlich, W.
2019. Zeitschrift des Deutschen Juristinnenbundes : djbZ, 22, 91–93
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation.
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Game-theoretical model on the GDPR: Market for lemons?.
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Journal of intellectual property, information technology and electronic commerce law, 10 (2), 200–208
Modeling and control of multimodal and hybrid energy systems (Editorial).
Wolter, M.; Hagenmeyer, V.
2019. Automatisierungstechnik, 67 (11), 891–892. doi:10.1515/auto-2019-0112
Web Application Security (Dagstuhl Seminar 18321).
Johns, M.; Nikiforakis, N.; Volkamer, M.; Wilander, J.
2019. Dagstuhl Reports, 8 (8), 1–17. doi:10.4230/DagRep.8.8.1
Investigating People’s Privacy Risk Perception.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2019. Proceedings on privacy enhancing technologies, 2019 (3), 267–288. doi:10.2478/popets-2019-0047
Spieltheoretische Modellierung der Verarbeitung personenbezogener Daten.
Zander, T.; Steinbrück, A.; Birnstill, P.
2019. Datenschutz und Datensicherheit, 43 (5), 270–275. doi:10.1007/s11623-019-1106-6
Sichere Instant Messaging Apps.
Brendel, J.; Gerber, N.
2019. Datenschutz und Datensicherheit, 43 (5), 276–280. doi:10.1007/s11623-019-1107-5
The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling.
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Ralf Reussner.
2019. Communications in computer and information science, 977, 109–124. doi:10.1007/978-3-030-25109-3_6
A Layered Reference Architecture for Metamodels to Tailor Quality Modeling and Analysis [in press].
Heinrich, R.; Strittmatter, M.; Reussner, R. H.
2019. IEEE transactions on software engineering. doi:10.1109/TSE.2019.2903797
Mehr als nur Whistleblowing: das Gesetz zum Schutz von Geschäftsgeheimnissen.
Müllmann, D.
2019. Zeitschrift für Rechtspolitik, (1), 25–26
Wahrnehmungen und Reaktionen der Endnutzer auf Cookie-Meldungen “Diese Webseite verwendet Cookies”.
Oksana Kulyk; Nina Gerber; Melanie Volkamer; Annika Hilt.
2019. Datenschutz und Datensicherheit, 43 (2), 81–85. doi:10.1007/s11623-019-1068-8
An extensible approach to implicit incremental model analyses.
Hinkel, G.; Heinrich, R.; Reussner, R.
2019. Software and systems modeling, 18 (5), 3151–3187. doi:10.1007/s10270-019-00719-y
2018
Buchaufsätze
Schutz von Betriebs- und Geschäftsgeheimnissen in Industrie 4.0-Umgebungen.
Müllmann, D.
2018. Rechtsfragen digitaler Transformation - Gestaltung digitaler Veränderungsprozesse durch Recht. Tagungsband der Deutsche Stiftung für Recht und Informatik (DSRI). Hrsg.: J. Taeger, 697–711, OlWIR
Illi Isabellistes Se Custodes Egregios Praestabant.
Bischof, S.; Breitner, J.; Lohner, D.; Snelting, G.
2018. Principled Software Development – Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Ed.: P. Müller, 267–282, Springer International Publishing. doi:10.1007/978-3-319-98047-8_17
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Mechler, J.; Müller-Quade, J.; Nilges, T.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Human Factors in Security.
Gerber, P.; Ghiglieri, M.; Henhapl, B.; Kulyk, O.; Marky, K.; Mayer, P.; Reinheimer, B.; Volkamer, M.
2018. Sicherheitskritische Mensch-Computer-Interaktion, 83–98, Vieweg Verlag. doi:10.1007/978-3-658-19523-6_5
Dissertationen
A Framework for Non-Interference in Component-Based Systems. Dissertation.
Greiner, S.
2018. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000082042
Proceedingsbeiträge
Interactively Secure Groups from Obfuscation.
Agrikola, T.; Hofheinz, D.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Tailored quality modeling and analysis of software-intensive systems.
Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 336–341, Knowledge Systems Institute. doi:10.18293/SEKE2018-020
Modeling and Simulation of Load Balancing Strategies for Computing in High Energy Physics.
Caspart, R.; Firnkes, P.; Giffels, M.; Koziolek, A.; Quast, G.; Reussner, R.; Stemmer-Grabow, M.
2018. CHEP 2018 - 23rd International Conference on Computing in High Energy and Nuclear Physics, Sofia, BG, July 9-13,2018. Ed.: P. Hristov, EDP Sciences
Considering Not-quantified Quality Attributes in an Automated Design Space Exploration.
Busch, A.; Koziolek, A.
2018. Software Engineering 2018 - Fachtagung des GI-Fachbereichs Softwaretechnik (SE 20108), Ulm, 06.-09. März 2018, Gesellschaft für Informatik (GI)
A Cross-Disciplinary Language for Change Propagation Rules.
Busch, K.; Werle, D.; Loper, M.; Heinrich, R.; Reussner, R.; Vogel-Heuser, B.
2018. IEEE 14th International Conference on Automation Science and Engineering (CASE 2018), München, 20.-24. August 2018, 1099–1104, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560364
Automated Analysis of the Co-evolution of Software Systems and Business Processes.
Busch, K.; Heinrich, R.; Busch, A.; Reussner, R. H.
2018. Software Engineering und Software Management 2018, Ulm, 5.-9. März 2018. Hrsg.:M. Tichy, 159–160, Gesellschaft für Informatik (GI)
Rapid Testing of IaaS Resource Management Algorithms via Cloud Middleware Simulation.
Stier, C.; Domaschka, J.; Koziolek, A.; Krach, S.; Krzywda, J.; Reussner, R.
2018. Proceedings of the 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 184–191, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184428
An approach to requirement analysis in automated production systems.
Maier, T.; Busch, K.; Reussner, R.
2018. 20. Workshop Software-Reengineering und -Evolution der GI-Fachgruppe Software-Reengineering (SRE) - 9. Workshop „Design for Future“des GI-Arbeitskreises „Langlebige Softwaresysteme“ (L2S2), Bad-Honnef, 02.-04. Mai 2018
Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems.
Alpers, S.; Pilipchuk, R.; Oberweis, A.; Reussner, R.
2018. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, P, January 22-24, 2018. Ed.: P. Mori. Vol. 1, 74–82, SciTePress. doi:10.5220/0006606200740082
A Methodology for Domain-Spanning Change Impact Analysis.
Heinrich, R.; Busch, K.; Koch, S.
2018. 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2018), Prague, CZ, August 29-31, 2018, 326–330, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00060
Investigating Performance Metrics for Scaling Microservices in CloudIoT-Environments.
Gotin, M.; Lösch, F.; Heinrich, R.; Reussner, R.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 09.-13. April 2018, 157–167, Association for Computing Machinery (ACM). doi:10.1145/3184407.3184430
A Model-Based Approach to Calculate Maintainability Task Lists of PLC Programs for Factory Automation.
Busch, K.; Rätz, J.; Koch, S.; Heinrich, R.; Reussner, R.; Cha, S.; Seitz, M.; Vogel-Heuser, B.
2018. 44th Annual Conference of the IEEE Industrial Electronics Society (IECON 2018), Washington DC, October 20-23, 2018, 2949–2954, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2018.8591302
Predicting the Perceived Modularity of MOF-based Metamodels.
Hinkel, G.; Strittmatter, M.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 48–58, SciTePress
Automated Consistency Preservation in Electronics Development of Cyber-Physical Systems.
Zimmermann, D.; Reussner, R. H.
2018. Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops,Toulouse, France, June 25–29, 2018. Ed.: M. Mazzara, 506–511, Springer Nature. doi:10.1007/978-3-030-04771-9_36
Formal Specification and Verification of Hyperledger Fabric Chaincode.
Beckert, B.; Herda, M.; Kirsten, M.; Schiffl, J.
2018. 3rd Symposium on Distributed Ledger Technology (SDLT-2018) co-located with ICFEM 2018: the 20th International Conference on Formal Engineering Methods, Gold Coast, Australia, November 12, 2018, 44–48, Institute for Integrated and Intelligent Systems
Towards automatic argumentation about voting rules.
Kirsten, M.; Cailloux, O.
2018. 4ème conférence sur les Applications Pratiques de l’Intelligence Artificielle, APIA 2018, Nancy, France, July 2-3, 2018., Ed.: S. Bringay, J. Mattioli
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems.
Birnstill, P.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, (PETRA), Corfu, Greece, June 26-29, 2018, 292–296, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201563
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves.
Wagner, P. G.; Birnstill, P.; Beyerer, J.
2018. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018, 85–91, Association for Computing Machinery (ACM). doi:10.1145/3205977.3205990
The EU General Data Protection Regulation and its Effects on Designing Assistive Environments.
Krempel, E.; Beyerer, J.
2018. Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018, Corfu, Greece, June 26-29, 2018, 327–330, Association for Computing Machinery (ACM). doi:10.1145/3197768.3201567
Achieving delta description of the control software for an automated production system evolution.
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. 14th IEEE International Conference on Automation Science and Engineering, CASE 2018; Technical University MunichMunich; Germany; 20 August 2018 through 24 August 2018, 1170–1176, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/COASE.2018.8560588
Assistance in Daily Password Generation Tasks.
Marky, K.; Mayer, P.; Gerber, N.; Zimmermann, V.
2018. 2018 Joint ACM International Conference on Pervasive and Ubiquitous Computing, UbiComp 2018 and 2018 ACM International Symposium on Wearable Computers, ISWC 2018; Singapore; Singapore; 8 October 2018 through 12 October 2018, 786–793, Association for Computing Machinery (ACM). doi:10.1145/3267305.3274127
Towards Application of Cuckoo Filters in Network Security Monitoring.
Grashöfer, J.; Jacob, F.; Hartenstein, H.
2018. 14th International Conference on Network and Service Management (CNSM), Rome, Italy, Nov. 5 - Nov. 9, 2018, 373–377, Institute of Electrical and Electronics Engineers (IEEE)
Using dependence graphs to assist verification and testing of information-flow properties.
Herda, M.; Tyszberowicz, S.; Beckert, B.
2018. Tests and Proofs : 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings. Ed. by Catherine Dubois, Burkhart Wolff, 83–102, Springer. doi:10.1007/978-3-319-92994-1_5
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode.
Hamann, T.; Herda, M.; Mantel, H.; Mohr, M.; Schneider, D.; Tasch, M.
2018. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28–30, 2018; Proceedings. Ed.: N. Gruschka, 437–453, Springer Nature. doi:10.1007/978-3-030-03638-6_27
Relational Equivalence Proofs Between Imperative and MapReduce Algorithms.
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. Verified Software: Theories, Tools, and Experiments; 10th International Conference, VSTTE 2018; Oxford, UK, July 18–19, 2018; Revised Selected Papers. Ed.: R. Piskac, 248–266, Springer Nature. doi:10.1007/978-3-030-03592-1_14
Guidance of architectural changes in technical systems with varying operational modes.
Märtin, L.; Forjahn, N.-A.; Koziolek, A.; Reussner, R.
2018. Software Architecture: 12th European Conference on Software Architecture (ECSA 2018), Madrid, E, September 24-28, 2018; Proceedings. Ed.: C.E. Cuesta, 37–45, Springer Nature. doi:10.1007/978-3-030-00761-4_3
Using informal knowledge for improving software quality trade-off decisions.
Schneider, Y.; Busch, A.; Koziolek, A.
2018. Software Architecture: 12th European Conference on Software Architecture, ECSA 2018, Madrid, Spain, September 24–28, 2018; Proceedings, 265–283, Springer Nature. doi:10.1007/978-3-030-00761-4_18
Categories of change triggers in business processes.
Kaplan, A.; Busch, K.; Koziolek, A.; Heinrich, R.
2018. Euromicro Conference on Software Engineering and Advanced Applications 2018 (SEAA 2018), Prague, CZ, August 29-31, 2018. Ed.: T. Bures, 252–259, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SEAA.2018.00049
A model-based approach for build avoidance.
Neumann, M.; Busch, K.; Heinrich, R.
2018. 30th International Conference on Software Engineering and Knowledge Engineering (SEKE 2018), Redwood City, CA, July 1-3, 2018, 104–109, KSI. doi:10.18293/SEKE2018-030
Using theorem provers to increase the precision of dependence analysis for information flow control.
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2018. 20th International Conference on Formal Engineering Methods, ICFEM 2018; Gold Coast; Australia; 12 November 2018 through 16 November 2018. Ed.: J. Sun, 284–300, Springer. doi:10.1007/978-3-030-02450-5_17
Modularizing and layering metamodels with the modular EMF designer.
Kechaou, A.; Strittmatter, M.
2018. 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS 2018), Copenhagen, DK, October 14-19, 2018, 32–36, Association for Computing Machinery (ACM). doi:10.1145/3270112.3270119
Towards a notion of coverage for incomplete program-correctness proofs.
Beckert, B.; Herda, M.; Kobischke, S.; Ulbrich, M.
2018. 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018; Limassol; Cyprus; 5 November 2018 through 9 November 2018. Ed.: T. Margaria, 53–63, Springer. doi:10.1007/978-3-030-03421-4_4
Aligning Business Process Access Control Policies with Enterprise Architecture.
Pilipchuk, R.; Seifermann, S.; Heinrich, R.
2018. Proceedings of the Central European Cybersecurity Conference 2018 (CECC 2018), Ljubljana, SLO, November 15-16, 2018, Article no 17, Association for Computing Machinery (ACM). doi:10.1145/3277570.3277588
Modeling of dynamic trust contracts for industry 4.0 systems.
Al-Ali, R.; Heinrich, R.; Hnetynka, P.; Juan-Verdejo, A.; Stephan Seifermann; Walter, M.
2018. Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings (ECSA 2018), Madrid, E, September 24-28, 2018, 45:1–45:4, Association for Computing Machinery (ACM). doi:10.1145/3241403.3241450
Towards a metamodel for modular simulation environments.
Koch, S.; Reiche, F.; Heinrich, R.
2018. ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS), Kopenhagen, DK, October 14-19, 2018. Ed.: R. Hebig
Integrating semantically-related legacy models in vitruvius.
Mazkatli, M.; Burger, E.; Quante, J.; Koziolek, A.
2018. 10th ACM/IEEE International Workshop on Modelling in Software Engineering, MiSE 2018; Gothenburg; Sweden; 27 May 2018 through 28 May 2018, 41–48, Association for Computing Machinery (ACM). doi:10.1145/3193954.3193961
Identifying Microservices Using Functional Decomposition.
Tyszberowicz, S.; Heinrich, R.; Liu, B.; Liu, Z.
2018. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA 2018), Beijing, CHN, September 4-6, 2018, 50–65, Springer. doi:10.1007/978-3-319-99933-3_4
Refinements and structural decompositions in generated code.
Hinkel, G.; Busch, K.; Heinrich, R.
2018. 6th International Conference on Model-Driven Engineering and Software Development (MODELSWARD 2018), Funchal, P, January 22-24, 2018, 303–310, SciTePress
Continuous integration of performance model.
Mazkatli, M.; Koziolek, A.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018) Berlin, 9.-13. April 2018, 153–158, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186285
Diagnosis of privacy and performance problems in the context of mobile applications.
Monschein, D.; Heinrich, R.; Heger, C.
2018. 9th ACM/SPEC International Conference on Performance Engineering (ICPE 2018), Berlin, 9.-13. April 2018, 167–172, Association for Computing Machinery (ACM). doi:10.1145/3185768.3186283
Branchenreport UX/Usability 2018.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2018. Mensch und Computer - Usability Professionals, Dresden, Germany, 2 - 5 September 2018. Hrsg.: S. Hess, 27–40, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-up-0142
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials.
Mayer, P.; Schwartz, C.; Volkamer, M.
2018. ACSAC ’18 Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, PR, USA — December 03 - 07, 2018, 733–748, Association for Computing Machinery (ACM). doi:10.1145/3274694.3274747
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware.
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker.
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Non-malleability vs. CCA-Security: The Case of Commitments.
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird.
Ghiglieri, M.; Henhapl, B.; Gerber, N.
2018. Mensch und Computer 2018 - Workshopband, 02.–05. September 2018, Dresden. Hrsg.: R. Dachselt, G. Weber, 439–447, Gesellschaft für Informatik (GI). doi:10.18420/muc2018-ws08-0542
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption.
Stengele, O.; Hartenstein, H.
2018. Data Privacy Management, Cryptocurrencies and Blockchain Technology – ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Ed.: J. Garcia-Alfaro, 85–93, Springer International Publishing. doi:10.1007/978-3-030-00305-0_7
ACCESSv2: A Collaborative Authentication Research and Decision Support Platform.
Mayer, P.; Stumpf, P.; Weber, T.; Volkamer, M.
2018. Who are you? Adventures in Authentication Workshop 2018, co-located with SOUPS 2018 at the Baltimore Marriott Waterfront in Baltimore, MD, USA, August 12–14, 2018, 5 S
The Quest to Replace Passwords Revisited - Rating Authentication Schemes.
Zimmermann, V.; Gerber, N.; Kleboth, M.; Preuschen, A. von; Schmidt, K.; Mayer, P.
2018. Proceedings of the 12th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2018), Dundee, UK, August 29 - 31, 2018. Ed.: N. Clarke, 38–48, Centre for Security
Motivating Users to Consider Recommendations on Password Management Strategies.
Mayer, P.; Kunz, A.; Volkamer, M.
2018. International Symposium on Human Aspects of Information Security Assurance, (HAISA 2018), Dundee, Scotland, 29th - 31st August 2018, 28–37, University of Plymouth
Usability is not Enough: Lessons Learned from ’Human Factors in Security’ Research for Verifiability.
Kulyk, O.; Volkamer, M.
2018. Third International Joint Conference on Electronic Voting (E-Vote-ID 2018), TUT Press
The palladio-bench for modeling and simulating software architectures.
Heinrich, R.; Werle, D.; Klare, H.; Reussner, R.; Kramer, M.; Becker, S.; Happe, J.; Koziolek, H.; Krogmann, K.
2018. 40th ACM/IEEE International Conference on Software Engineering (ICSE 2018), Gothenburg, S, May 27 June 3, 2018, 37–40, Association for Computing Machinery (ACM). doi:10.1145/3183440.3183474
Developing and Evaluating a Five Minute Phishing Awareness Video.
Volkamer, M.; Renaud, K.; Reinheimer, B. M.; Rack, P.; Ghiglieri, M.; Mayer, P.; Kunz, A.; Gerber, N.
2018. Trust, Privacy and Security in Digital Business - 15th International Conference (TrustBus 2018), Regensburg, Germany, September 5–6, 2018. Ed.: S. Furnell, 119–134, Springer
Proving equivalence between imperative and MapReduce implementations using program transformations.
Beckert, B.; Bingmann, T.; Kiefer, M.; Sanders, P.; Ulbrich, M.; Weigl, A.
2018. 3rd Workshop on Models for Formal Analysis of Real Systems and 6th International Workshop on Verification and Program Transformation, MARSVPT 2018; Thessaloniki; Greece; 20 April 2018. Ed.: R. van Glabbeek, 185–199, Open Publishing Association. doi:10.4204/EPTCS.268.7
A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings Interface.
Kulyk, O.; Mayer, P.; Käfer O.; Volkamer, M.
2018. The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom 2018), New York, NY, August 1-3, 2018, 1058–1063, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom/BigDataSE.2018.00148
Home Sweet Home? Investigating Users’ Awareness of Smart Home Privacy Threats.
Gerber, N.; Reinheimer, B.; Volkamer, M.
2018. Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP), Baltimore, MD, August 12, 2018, USENIX
Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?.
Gerber, N.; Zimmermann, V.; Henhapl, B.; Emeröz, S.; Volkamer, M.
2018. Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, 27.-30. August 2018, Association for Computing Machinery (ACM). doi:10.1145/3230833.3230859
Helping John to Make Informed Decisions on Using Social Login.
Karegar, F.; Gerber, N.; Volkamer, M.; Fischer-Hübner, S.
2018. Proceedings of the 33th Symposium on Applied Computing (SAC 2018), Pau, F, April 9-13, 2018, Association for Computing Machinery (ACM)
Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting.
Marky, K.; Kulyk, O.; Volkamer, M.
2018. Sicherheit 2018, Konstanz, 25.-27. April 2018. Hrsg.: H. Langweg, 197–208, Köllen. doi:10.18420/sicherheit2018_15
What Did I Really Vote For? - On the Usability of Verifiable E-Voting Schemes.
Marky, K.; Kulyk, O.; Renaud, K.; Volkamer, M.
2018. Conference on Human Factors in Computing Systems (CHI), Montreal, QC, Canada, April 21 - 26, 2018, Paper 176/1–13, Association for Computing Machinery (ACM). doi:10.1145/3173574.3173750
FoxIT: Enhancing Mobile Users’ Privacy Behavior by Increasing Knowledge and Awareness.
Gerber, N.; Gerber, P.; Drews, H.; Kirchner, E.; Schlegel, N.; Schmidt, T.; Scholz, L.
2018. Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST ’17), Orlando, Florida, December 05, 2017, 53–63, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167999
Variants and Versions Management for Models with Integrated Consistency Preservation.
Ananieva, S.; Klare, H.; Burger, E.; Reussner, R.
2018. Proceedings of the 12th International Workshop on Variability Modelling of Software-Intensive Systems (VAMOS 2018), Madrid, E, February 7-9, 2018, 3–10, Association for Computing Machinery (ACM). doi:10.1145/3168365.3168377
Bücher
Dokumentation zum Datenschutzrecht mit Informationsfreiheitsrecht.
Spiecker gen. Döhmann, I.; Bretthauer, S. (Hrsg.).
2018. Nomos Verlagsgesellschaft
Zeitschriftenaufsätze
Auswirkungen der Industrie 4.0 auf den Schutz von Betriebs- und Geschäftsgeheimnissen.
Müllmann, D.
2018. Wettbewerb in Recht und Praxis, (10), 1177–1183
Schutz von Geschäftsgeheimnissen.
Müllmann, D.
2018. Neue juristische Wochenschrift, (39), 14
Nutzerwahrnehmung der Ende-zu-Ende-Verschlüsselung in WhatsApp.
Nina Gerber; Verena Zimmermann; Birgit Henhapl; Sinem Emeröz; Melanie Volkamer; Tobias Hilt.
2018. Datenschutz und Datensicherheit, 42 (11), 680–685. doi:10.1007/s11623-018-1024-z
Systematisierung des IT-Sicherheitsrechts.
Raabe, O.; Schallbruch, M.; Steinbrück, A.
2018. Computer und Recht / International, 34 (11), 706–715. doi:10.9785/cr-2018-341105
Der Arbeitnehmer 4.0? Automatisierte Arbeitgeberentscheidungen durch Sensorik am smarten Arbeitsplatz.
Brecht, C.; Steinbrück, A.; Wagner, M.
2018. Privacy in Germany : PinG ; Datenschutz und Compliance, 2018 (1), 10–15
Applicability of generalized test tables: a case study using the manufacturing system demonstrator xPPU.
Cha, S.; Weigl, A.; Ulbrich, M.; Beckert, B.; Vogel-Heuser, B.
2018. Automatisierungstechnik, 66 (10), 834–848. doi:10.1515/auto-2018-0028
Enhancing neural non-intrusive load monitoring with generative adversarial networks.
Bao, K.; Ibrahimov, K.; Wagner, M.; Schmeck, H.
2018. Energy Informatics, S1 (18), 295–302. doi:10.1186/s42162-018-0038-y
The influence of differential privacy on short term electric load forecasting.
Eibl, G.; Bao, K.; Grassal, P.-W.; Bernau, D.; Schmeck, H.
2018. Energy Informatics, S1 (48), 93–113. doi:10.1186/s42162-018-0025-3
Modeling flexibility using artificial neural networks.
Förderer, K.; Ahrens, M.; Bao, K.; Mauser, I.; Schmeck, H.
2018. Energy Informatics, S1 (21), 73–91. doi:10.1186/s42162-018-0024-4
Architecture-based change impact analysis in cross-disciplinary automated production systems.
Heinrich, R.; Koch, S.; Cha, S.; Busch, K.; Reussner, R.; Vogel-Heuser, B.
2018. The journal of systems and software, 146, 167–185. doi:10.1016/j.jss.2018.08.058
IT-Sicherheit - ein rechtsfreier Raum?.
Hackenjos, T.; Mechler, J.; Rill, J.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware.
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Network Layer Aspects of Permissionless Blockchains.
Neudecker, T.; Hartenstein, H.
2018. IEEE communications surveys & tutorials, 21 (1), 838–857. doi:10.1109/COMST.2018.2852480
Low-deterministic security for low-nondeterministic programs.
Bischof, S.; Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2018. Journal of computer security, 26, 335–366. doi:10.3233/JCS-17984
Concern-oriented language development (COLD): Fostering reuse in language engineering.
Combemalee, B.; Kienzle, J.; Mussbacher, G.; Barais, O.; Bousse, E.; Cazzola, W.; Collet, P.; Degueule, T.; Heinrich, R.; Jézéquel, J.-M.; Leduc, M.; Mayerhofer, T.; Mosser, S.; Schöttle, M.; Strittmatter, M.; Wortmann, A.
2018. Computer languages, systems and structures, 54, 139–155. doi:10.1016/j.cl.2018.05.004
2017
Buchaufsätze
Reference Scenarios for Self-aware Computing.
Kephart, J. O.; Maggio, M.; Diaconescu, A.; Giese, H.; Hoffmann, H.; Kounev, S.; Koziolek, A.; Lewis, P.; Robertsson, A.; Spinner, S.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 87–106, Springer International Publishing. doi:10.1007/978-3-319-47474-8_4
Assessing Self-awareness.
Esterle, L.; Bellman, K. L.; Becker, S.; Koziolek, A.; Landauer, C.; Lewis, P.
2017. Self-Aware Computing Systems. Ed.: S. Kounev, 465–481, Springer International Publishing. doi:10.1007/978-3-319-47474-8_15
An Architectural Model-Based Approach to Quality-Aware DevOps in Cloud Applicationsc.
Heinrich, R.; Jung, R.; Zirkelbach, C.; Hasselbring, W.; Reussner, R.
2017. Software Architecture for Big Data and the Cloud. Ed.: I. Mistrik, 69–89, Elsevier
An Introduction to Voting Rule Verification.
Beckert, B.; Bormer, T.; Goré, R.; Kirsten, M.; Schürmann, C.
2017. Trends in Computational Social Choice. Ed by.: Ulle Endriss, 269–287, AI Access
Automatic Margin Computation for Risk-Limiting Audits.
Beckert, B.; Kirsten, M.; Klebanov, V.; Schürmann, C.
2017. Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Ed.: R. Krimmer, M. Volkamer, J. Barrat, J. Benaloh, N. J. Goodman, P. Y. A. Ryan, V. Teague, 18–35, Springer International Publishing. doi:10.1007/978-3-319-52240-1_2
Guided Information Markets by the latest European Court of Justice decisions - the Google Spain, Weltimmo and Schrems (Safe Harbor) Decisions.
Spiecker gen. Döhmann, I.
2017. Privacy in a Digital Age: Perspectives from Two Continents. Ed.: R. L. Weaver; S. I. Friedland, W. Gilles; I. Bouhadana, 17–46, Carolina Academic Press
Security by Delegation für Industrie 4.0.
Jung, M.
2017. Kommunikation und Bildverarbeitung in der Automation. Ed.: J. Jasperneite, Lohweg V., 73–84, Springer Verlag. doi:10.1007/978-3-662-55232-2_6
Smart Home, Smart Grid, Smart Meter - digitale Konzepte und das Recht an Daten.
Spiecker gen. Döhmann, I.
2017. Herausforderung Utility 4.0 - Wie sich die Energiewirtschaft im Zeitalter der Digitalisierung verändert. Hrsg.: O. Doleski, 285–300, Springer Verlag. doi:10.1007/978-3-658-15737-1_15
Die technischen Grenzen des Rechts: Recht durch Technik und Technik durch Recht.
Spiecker gen. Döhmann, I.
2017. Formate der Rechtswissenschaft. Hrsg.: A. Funke, 181–207, Velbrück Wissenschaft
Kommentierung zu §§ 49, 50 MsbG.
Raabe, O.
2017. Berliner Kommentar zum Energierecht : Messstellenbetriebsgesetz (MsbG), Band 5. Hrsg.: F. J. Säcker, 896 S., Deutscher Fachverlag GmbH
Dissertationen
Specification Languages for Preserving Consistency between Models of Different Languages. Dissertation.
Kramer, M. E.
2017. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000069284
Proceedingsbeiträge
Towards the modelling of complex communication networks in AutomationML.
Patzer, F.; Sarkar, A.; Birnstill, P.; Schleipen, M.; Beyerer, J.
2017. 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus, 12-15 Sept. 2017, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ETFA.2017.8247571
Automotive Systems Modelling with Vitruvius.
Mazkatli, M.; Burger, E.; Koziolek, A.; Reussner, R. H.
2017. INFORMATIK 2017. Tagung, Chemnitz, 25.- 29. September 2017. Hrsg.: M. Eibl, 1487–1498, Gesellschaft für Informatik (GI). doi:10.18420/in2017_148
Reconstructing Development Artifacts for Change Impact Analysis.
Rostami, K.; Langhammer, M.; Busch, A.; Gleitze, J.; Heinrich, R.; Reussner, R.
2017. 19. Workshop Software-Reengineering & Evolution, Bad Honnef, 08.-10.05.2017
Considering Transient Effects of Self-Adaptations in Model-Driven Performance Analyses.
Stier, C.; Koziolek, A.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 99–100, Gesellschaft für Informatik (GI)
Change Impact Analysis by Ar chitectur e-based Assessment and Planning.
Rostami, K.; Stammel, J.; Heinrich, R.; Reussner, R.
2017. Software Engineering 2017: Fachtagung des GI-Fachbereichs Softwaretechnik (SE 2017), Hannover, 21.-24. Februar 2017. Hrsg.: J. Jürjens, 69–70, Gesellschaft für Informatik (GI)
Welthandel mit Daten.
Spiecker gen. Döhmann, I.
2017. Globalisierung und Datenschutz. 22. Wiesbadener Forum Datenschutz, 23.10.2017, Wiesbaden. Hrsg.: M. Ronellenfitsch
Defining a Security-Oriented Evolution Scenario for the CoCoME Case Study.
Pilipchuk, R.; Seifermann, S.; Taspolatoglu, E.
2017. 4nd Collaborative Workshop on Evolution and Maintenance of Long-Living Software Systems (EMLS’17), Hannover, 21. Februar 2017, 70–73, Universität Duisburg-Essen
Supporting software architecture evolution by functional decomposition.
Faitelson, D.; Heinrich, R.; Tyszberowicz, S. S.
2017. MODELSWARD 2017 : Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, Porto, P, February 19-21, 2017. Ed.: L. Pires. Vol. 1, 435–442, SciTePress. doi:10.5220/0006206204350442
On using sarkar metrics to evaluate the modularity of metamodels.
Hinkel, G.; Strittmatter, M.
2017. MODELSWARD 2017 : proceedings of the 5th International Conference on Model-Driven Engineering and Software Development : Porto, P, February 19-21, 2017. Ed.: L. Pires, 253–260, SciTePress. doi:10.5220/0006105502530260
Branchenreport UX/Usability 2017.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2017. Mensch und Computer – Usability Professionals, Regensburg, 10.–13. September 2017. Hrsg.: S. Hess, 213–227, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-up-0207
Addressing Misconceptions About Password Security Effectively.
Mayer, P.; Volkamer, M.
2017. 7th International Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, Florida, USA, December 5, 2017, 16–27, Association for Computing Machinery (ACM). doi:10.1145/3167996.3167998
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication Technologies.
Zimmermann, V.; Gerber, N.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Hrsg.: T. Tryfonas, 265–283, Springer. doi:10.1007/978-3-319-58460-7_18
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on Facebook.
Gerber, N.; Gerber, P.; Hernando, M.
2017. International Conference on Human Aspects of Information Security, Privacy, and Trust - HAS 2017. Hrsg.: T. Tryfonas, 640–655, Springer. doi:10.1007/978-3-319-58460-7_44
Security vs. privacy? User preferences regarding text passwords and biometric authentication.
Gerber, N.; Zimmermann, V.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren. Hrsg.: Burghardt, Manuel; Wimmer, Raphael; Wolff, Christian; Womser-Hacker, Christa, 279–287, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0405
Promoting secure Email communication and authentication.
Zimmermann, V.; Henhapl, B.; Gerber, N.; Enzmann, M.
2017. Mensch und Computer - Workshopband: Spielend einfach integrieren, 10.-13. September 2017, Regensburg. Hrsg.: Burghardt, Manuel, Wimmer, Raphael, Wolff, Christian, Womser-Hacker, Christa, 269–277, Gesellschaft für Informatik (GI). doi:10.18420/muc2017-ws05-0404
Reliable Behavioural Factors in the Information Security Context.
Mayer, P.; Kunz, A.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, August 29 - September 01, 2017, Art.Nr. a9, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098986
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016.
Mayer, P.; Kirchner, J.; Volkamer, M.
2017. 13th Symposium on Usable Privacy and Security (SOUPS), Santa Clara, CA, USA, July 12–14, 2017, 13–28, USENIX Assoc
Don’t be Deceived: The Message Might be Fake.
Neumann, S.; Reinheimer, B.; Volkamer, M.
2017. 14th International Conference (TrustBus), Trust, Privacy and Security in Digital Business, Lyon, France, August 30-31, 2017, 199–214, Springer. doi:10.1007/978-3-319-64483-7_13
Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy for the Helios Voting Scheme.
Bernhard, D.; Kulyk, O.; Volkamer, M.
2017. 12th International Conference on Availability, Reliability and Security (ARES), Reggio di Calabria, I, August 29 - September 1, 2017, Article No.: 1/1–10, Association for Computing Machinery (ACM). doi:10.1145/3098954.3098990
Advancing Trust Visualisations for Wider Applicability and User Acceptance.
Kulyk, O.; Reinheimer, B. M.; Gerber, P.; Volk, F.; Volkamer, M.; Mühlhäuser, M.
2017. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Sydney, NSW, Australia, 1-4 August 2017, 562–569, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.285
Das Privacy-Paradoxon - Ein Erklärungsversuch und Handlungsempfehlungen.
Gerber, P.; Volkamer, M.; Gerber, N.
2017. 11. Wissenschaftlicher interdisziplinärer Kongress für Dialogmarketing - Dialogmarketing Perspektiven 2016/2017, September 2016, Wiesbaden, 139–167, Gabler Verlag. doi:10.1007/978-3-658-16835-3_8
Enabling Vote Delegation for Boardroom Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Volkamer, M.
2017. International Conference on Financial Cryptography and Data Security (FC), Sliema, Malta, 7. April 2017, 419–433, Springer
Election-Dependent Security Evaluation of Internet Voting Schemes.
Neumann, S.; Noll, M.; Volkamer, M.
2017. International Conference on ICT Systems Security and Privacy Protection (IFIP SEC) - Advances in Information and Communication Technology, Rome, Italy, May 29-31, 2017, 371–382, Springer. doi:10.1007/978-3-319-58469-0_25
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional Information.
Kulyk, O.; Reinheimer, B. M.; Volkamer, M.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS) - Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, 675–690, Springer. doi:10.1007/978-3-319-58460-7_46
Exploring Consumers’ Attitudes of Smart TV Related Privacy Risks.
Ghiglieri, M.; Volkamer, M.; Renaud, K.
2017. 5th International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017. Ed.: T. Tryfonas, 656–674, Springer. doi:10.1007/978-3-319-58460-7
Sicherheit in der Kommunikation: kostenloses Maßnahmen-Angebot für KMU gegen Internetbetrug.
Rehfeld, S.; Volkamer, M.; Neumann, S.
2017. Mittelstand 4.0 - Agentur Kommunikation, Hochschule Darmstadt Institut für Kommunikation & Medien
Architecture-driven reduction of specification overhead for verifying confidentiality in component-based software systems.
Yurchenko, K.; Behr, M.; Klare, H.; Kramer, M.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017. Ed.: L. Burgueño, 321–323, CEUR
Proving JDK’s Dual Pivot Quicksort Correct.
Beckert, B.; Schiffl, J.; Schmitt, P. H.; Ulbrich, M.
2017. Verified Software : Theories, Tools, and Experiments, Proceedings of the 9th International Conference, VSTTE 2017, Revised Selected Papers, Heidelberg, Germany, 22nd - 23th July 2017. Ed.: A. Paskevich, 35–48, Springer. doi:10.1007/978-3-319-72308-2_3
Ecoreification: Making Arbitrary Java Code Accessible to Metamodel-Based Tools.
Klare, H.; Burger, E.; Kramer, M.; Langhammer, M.; Saglam, T.; Reussner, R.
2017. ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017), Austin, TX, September 17-22, 2017, 221–228, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/MODELS.2017.30
User-Centric Secure Data Sharing: Exploration of Concepts and Values.
Grashöfer, J.; Degitz, A.; Raabe, O.
2017. Informatik 2017 : 25.-29. September 2017 Chemnitz, Deutschland. Bd. 2. Hrsg.: M. Eibl, 1243–1258, Gesellschaft für Informatik (GI). doi:10.18420/in2017_126
The Minimum Number of Cards in Practical Card-Based Protocols.
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
A Non-Invasive Cyberrisk in Cooperative Driving.
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Attacks on Secure Logging Schemes.
Hartung, G.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Automatic Evaluation of Complex Design Decisions in Component-based Software Architectures.
Scheerer, M.; Busch, A.; Koziolek, A.
2017. MEMOCODE ’17 : Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, Vienna, Austria, 29th September - 2nd October 2017, 67–76, Association for Computing Machinery (ACM). doi:10.1145/3127041.3127059
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Could Network Information Facilitate Address Clustering in Bitcoin?.
Neudecker, T.; Hartenstein, H.
2017. Financial Cryptography and Data Security : FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, 7th April 2017. Ed.: M. Brenner, 155–169, Springer. doi:10.1007/978-3-319-70278-0_9
An interaction concept for program verification systems with explicit proof object.
Beckert, B.; Grebing, S.; Ulbrich, M.
2017. Hardware and Software : Verification and Testing, 13th International Haifa Verification Conference, Haifa, Israel, 13th - 15th November 2017. Ed.: O. Strichman, 163–178, Springer. doi:10.1007/978-3-319-70389-3_11
Towards Realising Oblivious Voting.
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Computing Exact Loop Bounds for Bounded Program Verification.
Liu, T.; Tyszberowicz, S.; Beckert, B. ..; Taghdiri, M.
2017. Dependable Software Engineering : Theories, Tools, and Applications, 3rd International Symposium, SETTA 2017, Proceedings, Changsha, China, 23rd - 25th October. Ed.: O. Sokolsky, 147–163, Springer. doi:10.1007/978-3-319-69483-2_9
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures.
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Anonymous coinjoin transactions with arbitrary values.
Maurer, F. K.; Neudecker, T.; Florian, M.
2017. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017; Sydney; Australia; 1 August 2017 through 4 August 2017, 522–529, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/Trustcom/BigDataSE/ICESS.2017.280
Generalised Test Tables : A Practical Specification Language for Reactive Systems.
Beckert, B.; Cha, S.; Ulbrich, M.; Vogel-Heuser, B.; Weigl, A.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 129–144, Springer. doi:10.1007/978-3-319-66845-1_9
SemSlice : Exploiting Relational Verification for Automatic Program Slicing.
Beckert, B.; Bormer, T.; Gocht, S.; Herda, M.; Lentzsch, D.; Ulbrich, M.
2017. Integrated Formal Methods : 13th International Conference, IFM 2017, Proceedings, Turin, Italy, 20th - 22nd September 2017. Ed.: N. Polikarpova, 312–319, Springer. doi:10.1007/978-3-319-66845-1_20
Deriving Power Models for Architecture-Level Energy Efficiency Analyses.
Stier, C.; Werle, D.; Koziolek, A.
2017. Computer Performance Engineering : 14th European Workshop, EPEW 2017, Berlin, Germany, 7th - 8th September 2017. Ed.: P. Reinecke, 214–229, Springer International Publishing. doi:10.1007/978-3-319-66583-2_14
Modular verification of information flow security in component-based systems.
Greiner, S.; Mohr, M.; Beckert, B.
2017. 15th IEEE International Conference on Software Engineering and Formal Methods, Trento, Italy, 4th - 8th September 2017. Ed.: A. Cimatti, 300–315, Springer. doi:10.1007/978-3-319-66197-1_19
CASPA : A platform for comparability of architecture-based software performance engineering approaches.
Dullmann, T. F.; Heinrich, R.; Van Hoorn, A.; Pitakrat, T.; Walter, J.; Willnecker, F.
2017. 2017 IEEE International Conference on Software Architecture Workshops (ICSAW 2017), Gothenburg, S, Apriel 3-7, 2017, 294–297, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSAW.2017.26
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction.
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Generalized Test Tables: A Powerful and Intuitive Specification Language for Reactive Systems.
Weigl, A.; Wiebe, F.; Ulbrich, M.; Ulewicz, S.; Cha, S.; Kirsten, M.; Beckert, B.; Birgit Vogel-Heuser.
2017. 15th IEEE International Conference on Industrial Informatics (INDIN 2017), Emden, July 24-26 2017, Institute of Electrical and Electronics Engineers (IEEE)
Architecture-Based Change Impact Analysis in Information Systems and Business Processes.
Rostami, K.; Heinrich, R.; Busch, A.; Reussner, R.
2017. IEEE International Conference on Software Architecture (ICSA), Gothenburg, S, April 3-7, 2017, 179–188, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ICSA.2017.17
Anomaly Detection in Industrial Networks using Machine Learning : A Roadmap.
Meshram, A.; Haas, C.
2017. Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2016. Ed.: J. Beyerer, 65–72, Springer Verlag. doi:10.1007/978-3-662-53806-7_8
Combining Graph-Based and Deduction-Based Information-Flow Analysis.
Beckert, B.; Bischof, S.; Herda, M.; Kirsten, M.; Kleine Büning, M.
2017. ETAPS 2017: 5th Workshop on Hot Issues in Security Principles and Trust : Hotspot 2017, Uppsala, Sweden, 22-29 April 2017, 6–25, Theoretical Foundations of Security Analysis and Design (IFIP WG 1.7)
Performance Engineering for Microservices: Research Challenges and Directions.
Heinrich, R.; Van Hoorn, A.; Knoche, H.; Li, F.; Lwakatare, L. E.; Pahl, C.; Schulte, S.; Wettinger, J.
2017. 8th ACM/SPEC on International Conference on Performance Engineering (ICPE 2017), L’Aquila, I, April 22-26, 2017, 223–226, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053653
A Generic Platform for Transforming Monitoring Data into Performance Models.
Kunz, J.; Heger, C.; Heinrich, R.
2017. 8th ACM/SPEC International Conference on Performance Engineering, L’Aquila, I, April 22-26, 2017, 151–156, Association for Computing Machinery (ACM). doi:10.1145/3053600.3053635
Concurrently composable security with shielded super-polynomial simulators.
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Adaptive partitioning.
Hofheinz, D.
2017. Advances in Cryptology – EUROCRYPT 2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017. Ed.: J.-S. Coron, 489–518, Springer. doi:10.1007/978-3-319-56617-7_17
Capturing ambiguity in artifacts to support requirements engineering for self-adaptive systems.
Muñoz-Fernández, J. C.; Knauss, A.; Castañeda, L.; Derakhshanmanesh, M.; Heinrich, R.; Becker, M.; Taherimakhsousi, N.
2017. Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, 27. Februar 2017. Ed.: E. Knauss, CEUR
A database adapter for secure outsourcing.
Dowsley, R.; Gabel, M.; Yurchenko, K.; Zipf, V.
2017. 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, L, December 12-15, 2016, 503–508, IEEE Computer Society. doi:10.1109/CloudCom.2016.0088
Zeitschriftenaufsätze
Auf dem Weg zu datenschutzfreundlichen Dashcams - Technische Maßnahmen zur Erhögung des Datenschutzes.
Bretthauer, S.; Wagner, P. G.; Birnstill, P.; Krempel, E.
2017. Datenschutz und Datensicherheit, 41 (3), 159–164
Coercion-resistant proxy voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2017. Computers & security, 71, 88–99. doi:10.1016/j.cose.2017.06.007
Productivity vs. Security: Mitigating Conflicting Goals in Organizations.
Mayer, P.; Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2017. Information and computer security, 25 (2), 137–151. doi:10.1108/ICS-03-2017-0014
Ende-zu-Ende sichere E-Mail-Kommunikation.
Zimmermann, V.; Volkamer, M.; Vogt, J.; Henhapl, B.
2017. Datenschutz und Datensicherheit, 41 (5), 308–313. doi:10.1007/s11623-017-0781-4
User experiences of TORPEDO: TOoltip-powered phishing email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.; Kunz, A.
2017. Computers & security, 71, 100–113. doi:10.1016/j.cose.2017.02.004
Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.
2017. IEEE security & privacy, 15 (3), 24–29. doi:10.1109/MSP.2017.70
Maintenance effort estimation with KAMP4aPS for cross-disciplinary automated PLC-based Production Systems - a collaborative approach.
Vogel-Heuser, B.; Heinrich, R.; Cha, S.; Rostami, K.; Ocker, F.; Koch, S.; Reussner, R.; Ziegltrum, S.
2017. IFAC-PapersOnLine, 50 (1), 4360–4367. doi:10.1016/j.ifacol.2017.08.877
Relational Program Reasoning Using Compiler IR : Combining Static Verification and Dynamic Analysis.
Kiefer, M.; Klebanov, V.; Ulbrich, M.
2017. Journal of automated reasoning, 1–27. doi:10.1007/s10817-017-9433-5
Automating regression verification of pointer programs by predicate abstraction.
Klebanov, V.; Rümmer, P.; Ulbrich, M.
2017. Formal methods in system design, 1–31. doi:10.1007/s10703-017-0293-8
A survey on design and implementation of protected searchable data in the cloud.
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
A threat analysis of the vehicle-to-grid charging protocol ISO 15118.
Bao, K.; Valev, H.; Wagner, M.; Schmeck, H.
2017. Computer science - research and development, 33 (1-2), 3–12. doi:10.1007/s00450-017-0342-y
Sicherheit relativ definieren.
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Smart Meter im Spannungsfeld zwischen Europäischer Datenschutzgrundverordnung und Messstellenbetriebsgesetz.
Bretthauer, S.
2017. Zeitschrift für das gesamte Recht der Energiewirtschaft, (3), 56–61
Big und Smart Data: Zweckbindung zwecklos?.
Spiecker gen. Döhmann, I.
2017. Spektrum der Wissenschaft, 2017 (1), 56–62
A Privacy-Aware Fall Detection System for Hospitals and Nursing Facilities.
Krempel, E.; Birnstill, P.; Beyerer, J.
2017. European Journal for Security Research. doi:10.1007/s41125-017-0016-6
Using internal domain-specific languages to inherit tool support and modularity for model transformations.
Hinkel, G.; Goldschmidt, T.; Burger, E.; Reussner, R.
2017. Software and systems modeling, 18 (1), 129–155. doi:10.1007/s10270-017-0578-9
Integrating business process simulation and information system simulation for performance prediction.
Heinrich, R.; Merkle, P.; Henss, J.; Paech, B.
2017. Software and systems modeling, 16 (1), 257–277. doi:10.1007/s10270-015-0457-1
2016
Buchaufsätze
Praxis der Forschung. Eine Lehrveranstaltung des forschungsnahen Lehrens und Lernens in der Informatik am KIT.
Beckert, B.; Beigl, M.; Budde, M.; Burger, E.; Grebing, S.; Kramer, M.; Reussner, R.
2016. Neues Handbuch Hochschullehre. Lehren und Lernen effizient gestalten. Hrsg.: B. Berendt, 55–79, Raabe, Fachverl. für Wiss.-Information
Verantwortung bei begrenztem Wissen in der vernetzten Welt.
Spiecker Döhmann, I.
2016. Neue Macht- und Verantwortungsstrukturen in der digitalen Welt. Hrsg.: M. Fehling; U. Schliesky, 53–72, Nomos Verlagsgesellschaft
Datenschutzrecht im Internet in der Kollision.
Spiecker gen. Döhmann, I.
2016. Zukunft der informationellen Selbstbestimmung, 137–150, Erich Schmidt Verlag GmbH & Co. KG (ESV)
Gegenrechte – Datenschutz/Schutz von Betriebs- und Geschäftsgeheimnissen, Geistiges Eigentum.
Dreier, T.; Spiecker gen. Döhmann, I.
2016. Informationen der öffentlichen Hand - Zugang und Nutzung. Hrsg.: T. Dreier, V. Fischer, A. van Raay, I. Spiecker gen. Döhmann, 165–192, Nomos Verlagsgesellschaft. doi:10.5771/9783845251653-165
A Study on Corporate Compliance with Transparency Requirements of Data Protection Law.
Bier, C.; Kömpf, S.; Beyerer, J.
2016. Data protection and privacy : (in)visibilities and infrastructures. Ed.: Ronald Leenes, 271–289, Springer. doi:10.1007/978-3-319-50796-5_10
Technische und organisatorische Umsetzung - Technische Rahmenbedingungen.
Bretthauer, S.; Bräuchle, T.
2016. Informationen der öffentlichen Hand : Zugang und Nutzung. Hrsg.: T. Dreier, 395–408, Nomos Verlagsgesellschaft
Proceedingsbeiträge
Automated Verification for Functional and Relational Properties of Voting Rules.
Beckert, B.; Bormer, T.; Kirsten, M.; Neuber, T.; Ulbrich, M.
2016. Sixth International Workshop on Computational Social Choice, COMSOC-2016, Toulouse, France, 22–24 June 2016, 16 S
Recht und Technik - Datenschutz im Diskurs.
Spiecker gen. Döhmann, I.; Sorge, C.; Grimm, R.
2016. Informatik 2016, Klagenfurt, Österreich, 26.-30. September 2016. Hrsg.: H. C. Mayr; M. Pinzger, 411–412, Gesellschaft für Informatik (GI)
Architectural Data Flow Analysis.
Seifermann, S.
2016. 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016, Venice, I, April 5-8, 2016, 270–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.49
Branchenreport UX/Usability 2016.
Tretter, S.; Diefenbach, S.; Ullrich, D.; Gerber, N.
2016. Mensch und Computer 2016 – Usability Professionals, 4. - 7. September 2016, Aachen. Hrsg.: Stefan Hess, Holger Fischer, 16 S., Gesellschaft für Informatik e.V. und die German UPA e.V. doi:10.18420/muc2016-up-0044
Let’s get physical: Lässt sich User Experience physiologisch erfassen?.
Kolb, N.
2016. Mensch und Computer - Tagungsband. Hrsg.: Wolfgang Prinz, Jan Borchers, Matthias Jarke, 10 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-mci-0075
Entwicklung eines Interfaces zur privacy-friendly Cookie-Einstellung.
Reinheimer, B.; Braun, K.; Volkamer, M.
2016. Mensch und Computer - Workshop: Usable Security and Privacy, Regensburg, Germany, 10.09.2017, 8 S., Gesellschaft für Informatik (GI). doi:10.18420/muc2016-ws03-0001
NoPhish: Evaluation of a web application that teaches people being aware of phishing attacks.
Kunz, A.; Volkamer, M.; Stockhardt, S.; Palberg, S.; Lottermann, T.; Piegert, E.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016, Klagenfurt; Austria, 26th 2016 - 30th September 2016, 509–518, Gesellschaft für Informatik (GI)
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Volkamer, M.
2016. 23rd ACM Conference on Computer and Communications Security, CCS´16, Vienna, Austria, October 24-28, 2016, 1817–1819, Association for Computing Machinery (ACM). doi:10.1145/2976749.2989045
Enabling Automatic Password Change in Password Managers Through Crowdsourcing.
Mayer, P.; Berket, H.; Volkamer, M.
2016. The 11th International Conference on Passwords (PASSWORDS2016), Bochum, Germany, 5 - 7 December 2016, 6 S., Springer
Understanding information security compliance - Why goal setting and rewards might be a bad idea.
Gerber, N.; McDermott, R.; Volkamer, M.; Vogt, J.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, Frankfurt, Germany, 145–155, University of Plymouth
Introducing Proxy Voting to Helios.
Kulyk, O.; Marky, K.; Neumann, S.; Volkamer, M.
2016. Availability, reliability, and security in information systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, 98–106, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2016.38
Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Mayer, P.; Neumann, S.; Storck, D.; Volkamer, M.
2016. Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, 2016, 67–77, University of Plymouth
Memorable And Secure: How Do You Choose Your PIN?.
Gutmann, A.; Volkamer, M.; Renaud, K.
2016. International Symposium on Human Aspects of Information Security & Assurance (HAISA), July 19-21, 2016, Frankfurt, Germany, 156–166, University of Plymouth
Privacy Friendly Apps-Making Developers Aware of Privacy Violations.
Marky, K.; Gutmann, A.; Rack, P.; Volkamer, M.
2016. 1st International Workshop on Innovations in Mobile Privacy and Security, IMPS 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, 6th April, 2016, 46–48, RWTH Aachen
Teaching Phishing-Security: Which Way is Best?.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.; Mayer, P.; Kunz, A.; Rack, P.; Lehmann, D.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 135–149, Springer. doi:10.1007/978-3-319-33630-5_10
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Volkamer, M.; Renaud, K.; Reinheimer, B.
2016. 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016, Ghent, Belgium, May 30th - June 1st, 2016, 161–175, Springer. doi:10.1007/978-3-319-33630-5_12
Coercion-resistant Proxy Voting.
Kulyk, O.; Neumann, S.; Marky, K.; Budurushi, J.; Volkamer, M.
2016. ICT Systems Security and Privacy Protection : 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, proceedings. Ed. by Jaap-Henk Hoepman, Stefan Katzenbeisser, 3–16, Springer
Encouraging Privacy-Aware Smartphone App Installation: What Would the Technically-Adept Do.
Kulyk, O.; Gerber, P.; Reinheimer, B.; Renaud, K.; Volkamer, M.
2016. NDSS Workshop on Usable Security (USEC), Feb 21, 2016, San Diego, CA, 10 S., Internet Society
Efficiency Comparison of Various Approaches in E-Voting Protocols.
Kulyk, O.; Volkamer, M.
2016. International Workshops on Financial Cryptography and Data Security, FC 2016 and 3rd Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, 1st Workshop on Advances in Secure Electronic Voting Schemes, VOTING 2016, and 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016, Christ Church, Barbados, 22nd - 26th February 2016. Eds.: Jens Grossklags, Bart Preneel, 209–233, Springer Verlag
Access Pattern Confidentiality-Preserving Relational Databases: Deployment Concept and Efficiency Evaluation.
Degitz, A.; Köhler, J.; Hartenstein, H.
2016. Proceedings of the 19th International Conference on Extending Database Technology, EDBT 2016, Bordeaux, France, 15th - 16th March 2016
Consideration of values in the design of access control systems.
Neudecker, T.; Hayrapetyan, A.; Degitz, A.; Andelfinger, P.
2016. 46. Jahrestagung der Gesellschaft fur Informatik - 46th Annual Meeting of the German Informatics Society, INFORMATIK 2016; Klagenfurt; Austria; 26 September 2016 through 30 September 2016. Ed.: H. C. Mayr, 275–288, Gesellschaft für Informatik (GI)
Security by Delegation für Industrie 4.0.
Jung, M.
2016. 7. Jahreskolloquium "Kommunikation in der Automation" : 30.11.2016 : KommA 2016 Kommunikation in der Automation. Hrsg.: Jürgen Jasperneite KommA - Kommunikation in der Automation Hochschule Ostwestfalen-Lippe Institut für Industrielle Informationstechnik - inIT, 2 S., Institut für Industrielle Informationstechnik (inIT)
Automated Inversion of Attribute Mappings in Bidirectional Model Transformations.
Kramer, M. E.; Rakhman, K.
2016. 5th International Workshop on Bidirectional Transformations, Bx 2016, Eindhoven, Netherlands, 8 April 2016. Hrsg.: Anthony Anjorin, 61–76, CEUR
Unabhängigkeit von Datenschutzbehörden als Voraussetzung von Effektivität.
Spiecker gen. Döhmann, I.
2016. Unabhängiges Verwalten in der Europäischen Union - Unabhängiges Verwalten in Europa, Hamburg, Germany, 18. August 2014. Hrsg.: M. Kröger, 97–120, Mohr Siebeck
Datenschutzziele im Konflikt: Eine Metrik für Unverkettbarkeit als Hilfestellung für den Betroffenen.
Bier, C.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 455–468, Gesellschaft für Informatik (GI)
Privacy-Dashcam - Datenschutzfreundliche Dashcams durch Erzwingen externer Anonymisierung.
Wagner, P.; Birnstill, P.; Krempel, E.; Bretthauer, S.; Beyerer, J.
2016. Informatik 2016 - Tagung vom 26.-30. September 2016 in Klagenfurt. Hrsg.: H. C. Mayr, 427–440, Gesellschaft für Informatik (GI)
Sicherheitsanalyse mit JOANA.
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI), Bonn, Deutschland, 5. - 7. April 2016. Hrsg.: M. Meier, 11–21, Gesellschaft für Informatik (GI)
Generic Semantics Specification and Processing for Inter-System Information Flow Tracking.
Birnstill, P.; Bier, C.; Wagner, P.; Beyerer, J.
2016. SAM 2016 : proceedings of the 2016 International Conference on Security & Management : WORLDCOMP ’16, July 25-28, 2016, Las Vegas, Nevada, USA. Ed.: Kevin Daimi, 185–191, CSREA Press
PrivacyInsight: The Next Generation Privacy Dashboard.
Bier, C.; Beyerer, J.; Kühne, K.
2016. Privacy Technologies and Policy : 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016 ; Proceedings. Ed.: Stefan, Schiffner, 135–152, Springer. doi:10.1007/978-3-319-44760-5_9
Towards Measuring The Linkage Risk In Information Flows.
Bier, C.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13-14, 2016 : proceedings / Fraunhofer VVS. Ed.: Oliver Ambacher, 293–298, Fraunhofer Verlag
Working And Living In Interaktive Environments - Requirements For Security And Privacy.
Krempel, E.; Birnstill, P.; Beyerer, J.
2016. Security Research Conference - 11th Future Security : Berlin, September 13 - 14, 2016 : proceedings / Fraunhofer VVS Hrsg.: Oliver Ambacher, Rüdiger Quay, Joachim Wagner, 315–322, Fraunhofer Verlag
’Smart Regulation for Smart Industry’ - DatenschutDatenschutz Aspekte des Aktionsplanes der europäischen Kommission zur Digitalisierung der europäischen Industrie.
Müllmann, D.
2016. Smart World - Smart Law? : weltweite Netze mit regionaler Regulierung : Tagungsband Herbstakademie 2016. Hrsg.: Jürgen Taeger, 603–619, OlWIR Oldenburger Verlag für Wirtschaft
Multilinear Maps from Obfuscation.
Albrecht, M. R.; Farshim, P.; Hofheinz, D.; Larraia, E.; Paterson, K. G.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 446–473, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49096-9_19
Tightly CCA-Secure Encryption Without Pairings.
Gay, R.; Hofheinz, D.; Kiltz, E.; Wee, H.
2016. 35th Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016; Vienna; Austria; 8 May 2016 through 12 May 2016. Ed.: M. Fischlin, 1–27, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49890-3_1
Tool Demonstration: JOANA.
Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 89–93, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49635-0_5
Algebraic Partitioning : Fully Compact and (almost) Tightly Secure Cryptography.
Hofheinz, D.
2016. 13th International Conference on Theory of Cryptography, TCC 2016-A, Proceedings Part I, Tel Aviv, Israel; 10th - 13th January 2016. Ed.: E. Kushilevitz, 251–281, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49096-9_11
On Improvements of Low-Deterministic Security.
Breitner, J.; Graf, J.; Hecker, M.; Mohr, M.; Snelting, G.
2016. 5th International Conference on Principles of Security and Trust, POST 2016 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016; Eindhoven; Netherlands; 2 April 2016 through 8 April 2016. Ed.: F. Piessens, 68–88, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49635-0_4
Secure Audit Logs with Verifiable Excerpts.
Hartung, G.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing. doi:10.1007/978-3-319-29485-8_11
Fault-Tolerant Aggregate Signatures.
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49384-7_13
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security.
Hesse, J.; Hofheinz, D.; Rupp, A.
2016. 13th International Conference on Theory of Cryptography, TCC 2016; Tel Aviv; Israel; 10 January 2016 through 13 January 2016. Ed.: E. Kushilevitz, 416–445, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-49096-9_18
Context-Based Architectural Security Analysis.
Taspolatoglu, E.; Heinrich, R.
2016. 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016, 281–282, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WICSA.2016.55
Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network.
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2016. The 13th IEEE International Conference on Ubiquitous Intelligence and Computing, The 13th IEEE International Conference on Advanced and Trusted Computing, The 16th IEEE International Conference on Scalable Computing and Communications, The IEEE International Conference on Cloud and Big Data Computing, The IEEE International Conference on Internet of People, The IEEE Smart World Congress and Workshops, Toulouse, F, July 18-21, 2016. Ed.: D. El Baz, 358–367, IEEE Computer Society. doi:10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
How to Generate and Use Universal Samplers.
Hofheinz, D.; Jager, T.; Khurana, D.; Sahai, A.; Waters, B.; Zhandry, M.
2016. 22nd International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2016; Hanoi; Viet Nam; 4 December 2016 through 8 December 2016. Ed. : J. H. Cheon, 715–744, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-53890-6_24
A Distributed Key Management Approach.
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2016.0089
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting.
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
A Microservice Architecture for the Intranet of Things and Energy in Smart Buildings.
Bao, K.; Mauser, I.; Kochanneck, S.; Xu, H.; Schmeck, H.
2016. Proceedings of the Article17th Annual Middleware Conference (ACM/IFIP/USENIX Middleware) - First International Workshop on Mashups of Things and APIs (MOTA) - Trento, Italy, December 12-16, 2016, Article No.3, Association for Computing Machinery (ACM). doi:10.1145/3007203.3007215
Smarter Energy by an Intranet of Things in Buildings.
Bao, K.; Fiebig, F.; Frank, L.; Kochanneck, S.; Mauser, I.; Schmeck, H.
2016. VDE-Kongress : Internet der Dinge : Technologien, Anwendungen, Perspektiven - Mannheim, 7.-8. November 2016, CD-ROM, VDE Verlag
Standard security does not imply indistinguishability under selective opening.
Hofheinz, D.; Rao, V.; Wichs, D.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016. Ed. : A. Smith, 121–145, Springer Verlag. doi:10.1007/978-3-662-53644-5_5
Public-key encryption with simulation-based selective-opening security and compact ciphertexts.
Hofheinz, D.; Jager, T.; Rupp, A.
2016. 14th International Conference on Theory of Cryptography, TCC 2016-B; Beijing; China; 31 October 2016 through 3 November 2016, 146–168, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-53644-5_6
A Formal Treatment of Privacy in Video Data.
Fetzer, V.; Müller-Quade, J.; Nilges, T.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Eliciting and refining requirements for comprehensible security.
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Pseudo-Random Number Generator Verification: A Case Study.
Dörre, F.; Klebanov, V.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing. doi:10.1007/978-3-319-29613-5_4
Bücher
Modeling and Simulating Software Architectures – The Palladio Approach.
Reussner, R. H.; Becker, S.; Happe, J.; Heinrich, R.; Koziolek, A.; Koziolek, H.; Kramer, M.; Krogmann, K. (Hrsg.).
2016. MIT Press
Zeitschriftenaufsätze
Challenges in Secure Software Evolution - The Role of Software Architecture.
Seifermann, S.; Taspolatoglu, E.; Reussner, R. H.; Heinrich, R.
2016. Softwaretechnik-Trends, 36 (1)
Challenges to Trading-Off Performance and Privacy of Component-Based Systems.
Seifermann, S.; Yurchenko, K.; Kramer, M. E.
2016. Softwaretechnik-Trends, 36 (4)
Spot the phish by checking the pruned URL.
Volkamer, M.; Renaud, K.; Gerber, P.
2016. Information and computer security, 24 (4), 372–385. doi:10.1108/ICS-07-2015-0032
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
Gerber, P.; Renaud, K.; Volkamer, M.
2016. Journal of information security and applications, 34 (1), 8–26. doi:10.1016/j.jisa.2016.10.003
Why don’t UK citizens protest against privacy-invading dragnet surveillance?.
Renaud, K.; Flowerday, S.; English, R.; Volkamer, M.
2016. Information and computer security, 24 (4), 400–416. doi:10.1108/ICS-06-2015-0024
SecIVo: a quantitative security evaluation framework for internet voting schemes.
Neumann, S.; Volkamer, M.; Budurushi, J.; Prandini, M.
2016. Annals of telecommunications, 71 (7/8), 337–352. doi:10.1007/s12243-016-0520-0
Untersuchung des Sicherheitsbewusstseins im Kontext von "E-Mail made in Germany“.
Budurushi, J.; Hilt, A.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 300–304. doi:10.1007/s11623-016-0600-3
Bewertung der GMX/Mailvelope-Ende-zu-Ende-Verschlüsselung.
Schochlow, V.; Neumann, S.; Braun, K.; Volkamer, M.
2016. Datenschutz und Datensicherheit, 40 (5), 295–299. doi:10.1007/s11623-016-0599-5
An Investigation into the Usability of Electronic Voting Systems for Complex Elections.
Budurushi, J.; Reanaud, K.; Volkamer, M.; Woide, M.
2016. Annals of telecommunications, 71 (7-8), 309–322. doi:10.1007/s12243-016-0510-2
A Framework for a Uniform Quantitative Description of Risk with Respect to Safety and Security.
Beyerer, J.; Geisler, J.
2016. European Journal for Security Research, 1 (2), 135–150. doi:10.1007/s41125-016-0008-y
Zweckkonforme und zweckändernde Weiternutzung.
Müllmann, D.
2016. Neue Zeitschrift für Verwaltungsrecht, 35 (23), 1692–1696
The regulation of commercial profiling - a comparative analysis.
Spiecker gen. Döhmann, I.; Tambou, O.; Bernal, P.; Hu, M.; Molinaro, C.; Negre, E.; Sarlet, I.; Schertel Mendes, L.; Witzleb, N.; Yger, F.
2016. European Data Protection Law Review, 2 (4), 535–554
Industry 4.0: Legal Systems, the Social Contract and Health Care.
Spiecker gen. Döhmann, I.
2016. Society for Computers and Law, (6/7), 26–28
7 Irrtümer zum Datenschutz im Kontext von Smart Data.
Wagner, M.; Raabe, O.
2016. Datenbank-Spektrum, 16 (2), 173–178. doi:10.1007/s13222-016-0218-5
Datenschutz und Datenanalyse.
Steinbach, M.; Krempel, E.; Jung, C.; Hoffmann, M.
2016. Datenschutz und Datensicherheit, 40 (7), 440–445
Establishing location privacy in decentralized long-distance geocast services.
Florian, M.; Pieper, F.; Baumgart, I.
2016. Ad hoc Networks, 37, Part 1, SI (February), 110–121. doi:10.1016/j.adhoc.2015.07.015
Architectural run-time models for performance and privacy analysis in dynamic cloud applications.
Heinrich, R.
2016. ACM SIGMETRICS performance evaluation review, 43 (4), 13–22. doi:10.1145/2897356.2897359
Zuverlässige und sichere Software offener Automatisierungssysteme der Zukunft – Herausforderungen und Lösungswege.
Keller, H. B.; Schneider, O.; Matthes, J.; Hagenmeyer, V.
2016. Automatisierungstechnik, 64 (12), 930–947. doi:10.1515/auto-2016-0060
Integrierte Entwicklung zuverlässiger Software.
Schneider, O.; Keller, H. B.
2016. Softwaretechnik-Trends, 36 (3), 12–16
Software-based smart factory networking.
Bauer, R.; Bless, R.; Haas, C.; Jung, M.; Zitterbart, M.
2016. Automatisierungstechnik, 64 (9), 765–773. doi:10.1515/auto-2016-0072
Tightly secure signatures and public-key encryption.
Hofheinz, D.; Jager, T.
2016. Designs, Codes and Cryptography, 80 (1), 29–61. doi:10.1007/s10623-015-0062-x
Information and communication technology in energy lab 2.0: Smart energies system simulation and control center with an open-street-map-based power flow simulation example.
Hagenmeyer, V.; Cakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Waczowicz, S.; Mikut, R.
2016. Energy Technology, 4 (1), 145–162. doi:10.1002/ente.201500304
2015
Buchaufsätze
Kooperation als Lösungsansatz in Dreiecksbeziehungen des Verwaltungsrechts.
Spiecker genannt Döhmann, I.
2015. 100 Jahre Rechtswissenschaft in Frankfurt. Hrsg.: Fachbereich Rechtswissenschaft der Goethe-Universität Frankfurt am Main, 201–215, Klostermann
Recht und Verhaltenssteuerung.
Spiecker genannt Döhmann, I.
2015. Recht, Kultur, Normativität. Hrsg.: Jan-Christoph Marschelke, 49–75, transcript Verlag
Staatliche Instrumente zur Bewältigung von Nicht-Wissens-Szenarien.
Spiecker genannt Döhmann, I.
2015. Die Herausforderungen des Rechts in der globalen Risikogesellschaft, Barcelona, 2011. Hrsg.: Merce Darnaculleta Gardella, 43–63
Datenschutz in der Globalisierung - Mission Impossible in einer Welt der Technikzukünfte unter Einwirkung einer neuen europäischen Datenschutz-Grundverordnung?.
Spiecker gen. Döhmann, I.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 63–95, KIT Scientific Publishing
Dissertationen
Tunable Security for Deployable Data Outsourcing. Dissertation.
Köhler, J.
2015. KIT Scientific Publishing. doi:10.5445/KSP/1000048084
Magisterarbeiten
Konzeption und Leistungsbewertung von Database-as-a-Service Ansätzen zur Zugriffsmusterverschleierung. Magisterarbeit.
Degitz, A.
2015. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Funktions- und Performancebewertung von Exploit Mitigation Techniques. Masterarbeit.
Laschinger, M.
2015. Karlsruher Institut für Technologie (KIT)
Modellierung und Simulation des Bitcoin Peer-to-Peer Netzwerkes. Masterarbeit.
Bittner, J.
2015. Karlsruher Institut für Technologie (KIT)
Application agnostic confidentiality enforcement for database-centric SaaS offerings. Masterarbeit.
Fuhry, B.
2015. Karlsruher Institut für Technologie (KIT)
Realitätsnahe Emulation drahtloser Sensornetze in OMNeT++. Masterarbeit.
Jung, M.
2015. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Evaluierung der Kryptographie Bibliothek NaCl zur Anwendung in drahtlosen Sensornetzen. Bachelorarbeit.
Männle, K.
2015. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Security overlay for distributed encrypted containers.
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. SAM2015 : proceedings of the 2015 International Conference on Security & Management : Worldcomp’15 : July 27-30, 2015, Las Vegas, Nevada, USA. Ed.: K. Daimi, 130–136, CSREA Press
Protecting sensitive data in a distributed and mobile environment.
Patzer, F.; Jakoby, A.; Kresken, T.; Müller, W.
2015. ICCWS 2015, 10th International Conference on Cyber Warfare and Security. Proceedings : Kruger National Park, South Africa, 24-25 March 2015. Ed.: J. Zaaiman, 519–524, Academic Conferences and Publishing International Limited
Exploring Mental Models Underlying PIN Management Strategies.
Renaud, K.; Volkamer, M.
2015. World Congress on Internet Security (WorldCIS) : 19 - 21 Oct. 2015, Dublin / IEEE UK/RI Computer Chapter ..., 18–23, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WorldCIS.2015.7359406
“I Am Because We Are”: Developing and Nurturing an African Digital Security Culture.
Renaud, K.; Flowerday, S.; Othmane, L. B.; Volkamer, M.
2015. ACCC 2015: African Cyber Citizenship Conference, Port Elizabeth South Africa, 2 - 3 November 2015. Ed.: J.F. Van Niekerk, 94–104, Sc hool of ICT Nelson Mandela Metropolitan University South Africa
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing.
Mayer, P.; Volkamer, M.
2015. Annual Computer Security Applications Conference, 431–440, Association for Computing Machinery (ACM). doi:10.1145/2818000.2818043
Branchenreport UX/Usability 2015.
Diefenbach, S.; Tretter, S.; Ullrich, D.; Kolb, N.
2015. Mensch und Computer - Usability Professionals 2015. Hrsg.: Anja Endmann, Holger Fischer, Malte Krökel, 7–20, Oldenbourg Verlag
3, 2, 1, meins! Analyse der Nutzerziele beim Onlineshopping mittels der "Mental Model Diagramm"-Methode.
Kolb, N.; Diefenbach, S.; Niklas, S.
2015. Mensch und Computer 2015 - Usability Professionals. Hrsg.: Holger Fischer, Anja Endmann, Malte Krökel, 113–122, Oldenbourg Verlag
A Socio-Technical Investigation into Smartphone Security.
Volkamer, M.; Renaud, K.; Kulyk, O.; Emeröz, S.
2015. Security and Trust Management (STM). Hrsg.: Sara Foresti, 265–273, Springer. doi:10.1007/978-3-319-24858-5_17
Über die Wirksamkeit von Anti-Phishing-Training.
Stockhardt, S.; Reinheimer, B.; Volkamer, M.
2015. Mensch und Computer 2015 Workshopband. Ed. A. Weisbecker, 647–655, Oldenbourg Verlag
Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness.
Volkamer, M.; Renaud, K.; Braun, K.; Canova, G.; Reinheimer, B.
2015. 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, Heraklion, Greece, 24 August 2015 through 26 August 2015. Hrsg.: Mauro Conti, Matthias Schunter, Ioannis Askoxylakis, 104–122, Springer. doi:10.1007/978-3-319-22846-4_7
Extending Helios Towards Private Eligibility Verifiability.
Kulyk, O.; Teague, V.; Volkamer, M.
2015. E-Voting and Identity : 5th International Conference, VoteID 2015, Bern, Switzerland, September 2-4, 2015, proceedings / edited by Rolf Haenni, Reto E. Koenig, Douglas Wikström. Hrsg.: Rolf Haenni, Reto Koenig, Douglas Douglas, 57–73, Springer. doi:10.1007/978-3-319-22270-7_4
Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting.
Kulyk, O.; Neumann, S.; Budurushi, J.; Volkamer, M.; Haenni, R.; Koenig, R.; Bergen, P. von.
2015. International Conference on Availability, Reliability and Security (ARES), Toulouse, France, 24.-28.08.2015, 224–229, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2015.75
Learn To Spot Phishing URLs with the Android NoPhish App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.; Reinheimer, B.; Stockhardt, S.; Tenberg, R.
2015. Information Security Education Across the Curriculum (IFIP): 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015: Proceedings, 87–100, Springer. doi:10.1007/978-3-319-18500-2_8
Zertifizierte Apps.
Maseberg, S.; Bodden, E.; Kus, M.; Brucker, A.; Rasthofer, S.; Berger, B.; Huber, S.; Sohr, K.; Gerber, P.; Volkamer, M.
2015. Deutscher IT-Sicherheitskongress des BSI: Risiken kennen, Herausforderungen annehmen, Lösungen gestalten: Tagungsband zum 14. Deutschen IT-Sicherheitskongress ; [vom 19. bis 21. Mai 2015 in Bonn]. Hrsg.: Michael Hange, 505–516, SecuMedia-Verl
NoPhish App Evaluation: Lab and Retention Study.
Canova, G.; Volkamer, M.; Bergmann, C.; Reinheimer, B.
2015. NDSS Workshop on Usable Security (USEC), San Diego, California, February 8-11, 2015, 10 S., Internet Society
A quantitative risk model for a uniform description of safety and security.
Beyerer, J.; Geisler, J.
2015. Proceedings of the 10th Future Security - Security Research Conference "Future Security", Berlin, 10, 2015, 317–324, Fraunhofer Verlag
Executive Summary.
Hutchison, D.; Nahrstedt, K.; Schöller, M.; Spiecker gen. Döhmann, I.; Tauber, M.
2015. Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations - Report from Dagstuhl (Seminar 15151), Wadern, Germany, 07. – 10. April 2015, 1–4, Schloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH (LZI)
On the Security of Public Cloud Storage.
Müller, S.; Pallas, F.; Balaban, S.
2015. 10th Future Security Conference 2015 (Future Security 2015). Ed.: J. Beyerer, Fraunhofer Verlag
Idealizing Identity-Based Encryption.
Hofheinz, D.; Matt, C.; Maurer, U.
2015. Advances in Cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security (Proceedings Part 1), Auckland, New Zealand, 29th November - 3rd December 2015. Ed.: T. Iwata, 495–520, Springer Verlag. doi:10.1007/978-3-662-48797-6_21
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
Hofheinz, D.; Koch, J.; Striecks, C.
2015. PKC 2015 : Public-Key Cryptography : 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, Maryland, USA, 30th March - 1st April 2015. Ed.: J. Katz Public key cryptography - PKC 2015 ; 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015 . Ed.: J. Katz, 799–822, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-662-46447-2
Tightly-Secure Authenticated Key Exchange.
Bader, C.; Hofheinz, D.; Jager, T.; Kiltz, E.; Li, Y.
2015. Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Proceedings Part I, Warsaw, Poland, 23th - 25th March 2015. Ed.: Y. Dodis, 629–658, Springer Verlag. doi:10.1007/978-3-662-46494-6_26
Privacy Score: Making privacy aspects of surveillance systems comparable.
Krempel, E.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Hrsg.: Jürgen Beyerer, 65–72, Fraunhofer Verlag
Graphical Model-based Privacy Policy Editing for Smart Video Surveillance.
Birnstill, P.; Burkert, C.; Beyerer, J.
2015. Security Research Conference: 10th Future Security, Berlin, September 15-17, 2015, proceedings. Ed.: Jürgen Beyerer, 81–811, Fraunhofer Verlag
A user study on anonymization techniques for smart video surveillance.
Birnstill, P.; Ren, D.; Beyerer, J.
2015. 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS 2015) : Karlsruhe, Germany, 25 - 28 August 2015 : [including workshop papers], 1–6, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2015.7301805
SECURUS : A Provably Secure Database Outsourcing Scheme.
Nilges, T.; Köhler, J.
2015. Security Research Conference : 10th Future Security, Proceedings, Berlin, Germany, 15th - 17th September 2015. Ed.: J. Beyerer, 57–67, Fraunhofer Verlag
Zur Architektonik des europäischen und deutschen Datenschutzes im Zeitalter von Vorratsdatenspeicherung, Big Data und IT-Enhancement im Lichte der Google-Spain-Entscheidung des Europäischen Gerichtshofs.
Spiecker genannt Döhmann, I.
2015. Datenschutz im digitalen Zeitalter - global, europäisch, national, Vortragsveranstaltung des Instituts für Rundfunkrecht an der Universität zu Köln vom 16. Mai 2014., 61–91, Verlag C.H.Beck
Evaluation der Kryptografiebibliothek NaCl im Kontext drahtloser Sensornetze.
Jung, M.; Hergenröder, A.; Männle, K.
2015. 14. GI/ITG KuVS Fachgespräch Sensornetze der GI/ITG Fachgruppe Kommunikation und Verteilte Systeme (FGSN), Erlangen, 23.-24. September 2015. Hrsg.: J. Eckert, 37–40, Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups.
Beckert, B.; Grebing, S.; Böhl, F.
2015. International Conference on Software Engineering and Formal Methods : SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS - Workshop on Human-Oriented Formal Methods (HOFM), Grenoble, France, September 1-2, 2014. Ed.: C. Canal, 3–19, Springer Verlag. doi:10.1007/978-3-319-15201-1_1
Security of electricity supply in 2030.
Raskob, W.; Bertsch, V.; Ruppert, M.; Strittmatter, M.; Happe, L.; Broadnax, B.; Wandler, S.; Deines, E.
2015. Critical Infrastructure Protection and Resilience Europe, Den Haag, Netherlands, 4th - 5th March 2015
Informed Schema Design for Column Store-based Database Services.
Bermbach, D.; Müller, S.; Eberhardt, J.; Tai, S.
2015. 8th IEEE International Conference on Service Oriented Computing & Applications (SOCA), Rome, Italy, 19-21 October, 2015, 163–172, IEEE Computer Society. doi:10.1109/SOCA.2015.29
Sybil-Resistant Pseudonymization and Pseudonym Change without Trusted Third Parties.
Florian, M.; Walter, J.; Baumgart, I.
2015. ACM 14th Workshop on Privacy in the Electronic Society, WPES 2015; Denver; United States; 12 October 2015, 65–74, Association for Computing Machinery (ACM). doi:10.1145/2808138.2808145
OMNeTA: A Hybrid Simulator for a Realistic Evaluation of Heterogeneous Networks.
Jung, M.; Hergenröder, A.
2015. Q2SWinet ’15 Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Cancun, Mexico; 2 November 2015 through 6 November 2015, 75–82, Association for Computing Machinery (ACM). doi:10.1145/2815317.2815331
Regression Verification for Java Using a Secure Information Flow Calculus.
Beckert, B.; Klebanov, V.; Ulbrich, M.
2015. Proceedings of the 17th Workshop on Formal Techniques for Java-like Programs (FTfJP ’15) , Prague, Czech Republic, July 7th, 2015, Art.Nr.: a6, Association for Computing Machinery (ACM). doi:10.1145/2786536.2786544
Change-Driven Consistency for Component Code, Architectural Models, and Contracts.
Kramer, M. E.; Langhammer, M.; Messinger, D.; Seifermann, S.; Burger, E.
2015. Proceedings of the 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE’15), Montreal, QC, Canada, May 04 - 08, 2015, 21–26, Association for Computing Machinery (ACM). doi:10.1145/2737166.2737177
JoDroid: Adding Android Support to a Static Information Flow Control Tool.
Mohr, M.; Graf, J.; Hecker, M.
2015. Software Engineering Workshops 2015 - Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2015, Dresden, 17.-18. März 2015. Beiträge zur 8. Arbeitstagung Programmiersprachen (ATPS 2015). Hrsg.: W. Zimmermann, 140–145, CEUR
SHRIFT System-Wide HybRid Information Flow Tracking.
Lovat, E.; Fromm, A.; Mohr, M.; Pretschner, A.
2015. ICT Systems Security and Privacy Protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. Proceedings. Ed.: H. Federrath, 371–385, Springer. doi:10.1007/978-3-319-18467-8_25
A Hybrid Approach for Proving Noninterference of Java Programs.
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Kirsten, M.; Mohr, M.
2015. 28th IEEE Computer Security Foundations Symposium, 13 Jul - 17 Jul 2015, Verona, Italy. Ed.: P. Kellenberger, 305–319, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2015.28
Towards Privacy in Monitored Shared Environments.
Bao, K.; Bräuchle, T.; Schmeck, H.
2015. 10th Future Security, Security Research Conference, September 15 - 17, 2015, Berlin. Ed.: J. Beyerer, 469–472, Fraunhofer Verlag
A Simulation Model for Analysis of Attacks on the Bitcoin Peer-to-Peer Network.
Neudecker, T.; Andelfinger, P.; Hartenstein, H.
2015. 1st IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT), 15th May 2015, Ottawa, Canada. Ed.: R. Badonnel, 1327–1332, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INM.2015.7140490
Information and Communication Technology in Energy Lab 2.0.
Hagenmeyer, V.; Çakmak, H. K.; Düpmeier, C.; Faulwasser, T.; Isele, J.; Keller, H. B.; Kohlhepp, P.; Kühnapfel, U.; Stucky, U.; Mikut, R.
2015. Energy, Science and Technology 2015. The energy conference for scientists and researchers. Book of Abstracts, EST, Energy Science Technology, International Conference & Exhibition, 20-22 May 2015, Karlsruhe, Germany, 57, Karlsruher Institut für Technologie (KIT)
Index Optimization for L-Diversified Database-as-a-Service.
Köhler, J.; Hartenstein, H.
2015. 9th International Workshop on Data Privacy Management, DPM 2014, 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014 and 3rd International Workshop on Quantitative Aspects in Security Assurance, QASA 2014 held in conjunction with 19th Annual European Research Event in Computer Security Symposium, ESORICS 2014; Wroclaw; Poland; 10 September 2014 through 11 September 2014. Ed.: J. Posegga, 114–132, Springer. doi:10.1007/978-3-319-17016-9_8
Bücher
Certification of ICTs in Elections.
Wolf, P.; Barrat, J.; Bolo, E.; Bravo, A.; Krimmer, R.; Neumann, S.; Parreno, A.; Schürmann, C.; Volkamer, M.
2015. International Institute for Democracy and Electoral Assistance
Zeitschriftenaufsätze
Nudging Bank Account Holders Towards More Secure PIN Management.
Gutmann, A.; Renaud, K.; Volkamer, M.
2015. Journal of Internet Technology and Secured Transactions, 4 (2), 380–386. doi:10.20533/jitst.2046.3723.2015.0048
Cast-as-intended-Verifizierbarkeit für das Polyas-Internetwahlsystem.
Neumann, S.; Volkamer, M.; Strube, M.; Jung, W.; Brelle, A.
2015. Datenschutz und Datensicherheit, 39 (11), 747–752. doi:10.1007/s11623-015-0512-7
Usability versus privacy instead of usable privacy: Google’s balancing act between usability and privacy.
Gerber, P.; Volkamer, M.; Renaud, K.
2015. ACM SIGCAS Computers and Society, 45 (1), 16–21. doi:10.1145/2738210.2738214
Usability und Privacy im Android Ökosystem.
Gerber, P.; Volkamer, M.
2015. Datenschutz und Datensicherheit, 39 (2), 108–113. doi:10.1007/s11623-015-0375-y
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Daten verschlüsselt speichern und verarbeiten in der Cloud.
Müller-Quade, J.; Huber, M.; Nilges, T.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Intelligente Videoüberwachung in Kranken- und Pflegeeinrichtungen von morgen: eine Analyse der Bedingungen nach den Entwürfen der EU-Kommission und des EU-Parlaments für eine DS-GVO.
Bretthauer, S.; Krempel, E.; Birnstill, P.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 31, 239–245. doi:10.9785/cr-2015-0406
A new framework for information markets - The ECJ Google Spain decision.
Spiecker gen. Döhmann, I.
2015. Common market law review, 52 (4), 1033–1057
Intelligente Videoueberwachung in Kranken- und Pflegeeinrichtungen von morgen.
Bretthauer, S.; Birnstill, P.; Krempel, E.
2015. Computer und Recht : CR ; Zeitschrift für die Praxis des Rechts der Informationstechnologien, 2015 (4), 239–245
EuGH : Videoaufzeichnung öffentlichen Straßenraums mit privater Überwachungskamera.
Bretthauer, S.
2015. Computer und Recht, (2), 100–103
GNUC: A New Universal Composability Framework.
Hofheinz, D.; Shoup, V.
2015. Journal of cryptology, 28 (3), 423–508. doi:10.1007/s00145-013-9160-y
Cryptographic theory meets practice: Efficient and privacy-preserving payments for public transport.
Rupp, A.; Baldimtsi, F.; Hinterwaelder, G.; Paar, C.
2015. ACM transactions on information and system security, 17 (3), Art. Nr.: 10. doi:10.1145/2699904
Privacy-preserving surveillance: an interdisciplinary approach.
Birnstill, P.; Bretthauer, S.; Greiner, S.; Krempel, E.
2015. International Data Privacy Law, 5 (4), 298–308. doi:10.1093/idpl/ipv021
An extensive systematic review on the Model-Driven Development of secure systems.
Nguyen, P. H.; Kramer, M.; Klein, J.; Le Traon, Y.
2015. Information & software technology, 68, 62–81. doi:10.1016/j.infsof.2015.08.006
A new algorithm for low-deterministic security.
Giffhorn, D.; Snelting, G.
2015. International journal of information security, 14 (3), 263–287. doi:10.1007/s10207-014-0257-6
Implementation-level Verification of Algorithms with KeY.
Bruns, D.; Mostowski, W.; Ulbrich, M.
2015. International journal on software tools for technology transfer, 17 (6), 729–744. doi:10.1007/s10009-013-0293-y
Understanding probabilistic software leaks.
Snelting, G.
2015. Science of computer programming, 97 (P1), 122–126. doi:10.1016/j.scico.2013.11.008
Confidential database-as-a-service approaches: taxonomy and survey.
Köhler, J.; Jünemann, K.; Hartenstein, H.
2015. Journal of Cloud Computing, 4 (1), 1–14. doi:10.1186/s13677-014-0025-1
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?.
Bellare, M.; Hofheinz, D.; Kiltz, E.
2015. Journal of cryptology, 28 (1), 29–48. doi:10.1007/s00145-013-9167-4
Confined Guessing: New Signatures From Standard Assumptions.
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Striecks, C.
2015. Journal of Cryptology, 28 (1), 176–208. doi:10.1007/s00145-014-9183-z
2014
Buchaufsätze
A holistic framework for the evaluation of internet voting systems.
Neumann, S.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 76–91, IGI Global
Analysis of Security and Cryptographic Approaches to Provide Secret and Verifiable Electronic Voting.
Neumann, S.; Budurushi, J.; Volkamer, M.
2014. Design, Development, and Use of Secure Electronic Voting Systems. Ed.: D. Zissis, 27–61, IGI Global. doi:10.4018/978-1-4666-5820-2.ch002
Side Channels in Secure Database Outsourcing on the Example of the MimoSecco Scheme.
Huber, M.; Hartung, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar, 35–48, Springer. doi:10.1007/978-3-319-12718-7_3
Soziologie der Verfassung – ein Kommentar.
Spiecker genannt Döhmann, I.
2014. Soziologie der Verfassung, (Fundamenta Juris Publici). Hrsg.: M. Morlok, 87–120, Mohr Siebeck
Kommentierung zu § 21g, h EnWG.
Raabe, O.; Lorenz, M.
2014. Berliner Kommentar zum Energierecht ; Energierecht, Band 1, Halbband 1. Hrsg.: Franz Jürgen Säcker, 1716, Dt. Fachverl
Diplomarbeiten
Formal Verification of Voting Schemes. Diplomarbeit.
Kirsten, M.
2014. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000092716
Privatheit, Smart-Metering und Sensornetze. Diplomarbeit.
Munz, S.
2014. Karlsruher Institut für Technologie (KIT)
Bachelorarbeiten
Entwicklung und Evaluation eines Sicherheitsbegriffs zur Anonymisierung von Videodaten. Bachelorarbeit.
Fetzer, V.
2014. Karlsruher Institut für Technologie (KIT)
Implementierung und Evaluierung eines lastverteilenden Routing-Protokolls für energieeffiziente Sensornetze. Bachelorarbeit.
Niedermann, M.
2014. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
The ‘Hedonic’ in Human-Computer Interaction – History, Contributions, and Future Research Directions.
Diefenbach, S.; Kolb, N.; Hassenzahl, M.
2014. Conference on Designing interactive systems (DIS), Vancouver, BC, Canada, June 21 - 25, 2014, 305–314, Association for Computing Machinery (ACM). doi:10.1145/2598510.2598549
Unterstützung für ein risikobewusstes Verhalten im Internet.
Bartsch, S.; Boos, C.; Dyck, D.; Schwarz, C.; Theuerling, H.; Henhapl, B.; Volkamer, M.
2014. Vielfalt der Informatik: Ein Beitrag zu Selbstverständnis und Außenwirkung. Hrsg.: Anja Zeising, Claude Draude, Heidi Schelhowe, Susanne Maaß, 168–171, Universität
Authentication Schemes - Comparison and Effective Password Spaces.
Mayer, P.; Volkamer, M.; Kauer, M.
2014. Information Systems Security (ICISS), Hyderabad, India, December 16-20, 2014. Ed.: A. Prakash, 204–225, Springer. doi:10.1007/978-3-319-13841-1_12
Electronic Voting with Fully Distributed Trust and Maximized Flexibility Regarding Ballot Design.
Kulyk, O.; Feier, C.; Köster, T.; Neumann, S.; Volkamer, M.
2014. Electronic Voting: Verifying the Vote (EVOTE), Lochau, Austria, 29-31 October 2014, 1–10, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001142
Implementation and Evaluation of the EasyVote Tallying Component and Ballot.
Budurushi, J.; Renaud, K.; Volkamer, M.; Woide, M.
2014. 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE) : Lochau/Bregenz, Austria, 29 - 31 Oct. 2014. Hrsg.: Robert Krimmer, Melanie Volkamer, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EVOTE.2014.7001140
Pretty Understandable Democracy 2.0.
Neumann, S.; Feier, C.; Sahin, P.; Fach, S.
2014. 6th International Conference on Electronic Voting (EVOTE), Lochau, 29-31 October 2014, 69–72, TUT Press
What Deters Jane from Preventing Identification and Tracking on the Web?.
Shirazi, F.; Volkamer, M.
2014. Workshop on Privacy in the Electronic Society (WPES), Scottsdale, Arizona, USA, November 03 - 03, 2014, 107–116, Association for Computing Machinery (ACM). doi:10.1145/2665943.2665963
NoPhish: An Anti-Phishing Education App.
Canova, G.; Volkamer, M.; Bergmann, C.; Borza, R.
2014. 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017: Proceedings. Ed.: Giovanni Livraga, Chris Mitchell, 188–192, Springer International Publishing
Shake hands to bedevil: Securing email with wearable technology.
Renkema-Padmos, A.; Baum, J.; Renaud, K.; Volkamer, M.
2014. International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth, UK, July 8-9, 2014. Ed.: N. Clarke, 90–100, Centre for Security
Entwicklung eines Common Criteria Schutzprofils für elektronische Wahlgeräte mit Paper Audit Trail.
Budurushi, J.; Neumann, S.; Shala, G.; Volkamer, M.
2014. INF - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, 25th September, 2014. Hrsg.: Plödereder, Erhard; Grunske, Lars; Schneider, Eric; Ull, Dominik, 1415–1426, Köllen Druck+Verlag GmbH
Coercion-Resistant Internet Voting in Practice.
Feier, C.; Neumann, S.; Volkamer, M.
2014. Informatik 2014 : Big Data - Komplexität meistern (INF) - Workshop: Elektronische Wahlen: Unterstützung der Wahlprozesse mittels Technik, Stuttgart, 22. - 26. September 2014. Ed.: E. Plödereder, 1401–1414, Gesellschaft für Informatik (GI)
Why doesn’t Jane protect her privacy?.
Volkamer, M.; Renaud, K.; Renkema-Padmos, A.
2014. International Symposium on Privacy Enhancing Technologies (PETS). Amsterdam, The Netherlands, July 16-18, 2014. Ed.: E. Cristofaro, 244–262, Springer. doi:10.1007/978-3-319-08506-7_13
A Usable Android Application Implementing Distributed Cryptography For Election Authorities.
Neumann, S.; Kulyk, O.; Volkamer, M.
2014. Ninth International Conference on Availability, Reliability and Security (ARES) - Ninth International Workshop on Frontiers in Availability, Reliability, and Security (FARES), Fribourg, Switzerland, 8-12 September 2014, 207–2016, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2014.35
Interdisziplinäres Bewertungskonzept für Risiken auf Webseiten.
Bartsch, S.; Boos, C.; Canova, G.; Dyck, D.; Henhapl, B.; Schultheis, M.; Volkamer, M.
2014. Informatik: RiskKom-Workshop. Hrsg.: E. Plödereder, 2069–2078, Gesellschaft für Informatik (GI)
Helios Verification: To Alleviate, or to Nominate: Is That The Question, Or Shall We Have Both?.
Neumann, S.; Olembo, M. M.; Renaud, K.; Volkamer, M.
2014. International Conference on Electronic Government and the Information Systems Perspective (EGOVIS), Munich, Germany, September 1 - 3, 2014. Ed.: A. Kö, 246–260, Springer. doi:10.1007/978-3-319-10178-1_20
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen = Certified data security for Android applications based on static program analyses.
Sohr, K.; Bartsch, S.; Volkamer, M.; Berger, B.; Bodden, E.; Brucker, A.; Maseberg, S.; Kus, M.; Heider, J.
2014. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit - Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik - 7th Annual Conference of the German Informatics Society; Wien; Austria; 19 - 21 March 2014. Hrsg.: S. Katzenbeisser, 283–291, Gesellschaft für Informatik (GI)
Feasibility Analysis of Various Electronic Voting Systems for Complex Elections.
Budurushi, J.; Volkamer, M.
2014. CeDEM14 : proceedings of the International Conference for E-democracy and Open Government 2014, 21-23 May 2014, Krems, Austria. Hrsg.: Peter Parycek, Noella Edelmann, 141–152, Edition Donau-Universität
Building castles in quicksand: blueprint for a crowdsourced study.
Renkema-Padmos, A.; Volkamer, M.; Renaud, K.
2014. Extended abstracts of the 32nd CHI conference on human factors in computing systems, Toronto, Ontario, Canada, April 26 - May 01, 2014, 643–651, Association for Computing Machinery (ACM). doi:10.1145/2559206.2578861
Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote.
Budurushi, J.; Woide, M.; Volkamer, M.
2014. Workshop on Usable Security, USEC 2014, San Diego, California, 23.02.2014, Internet Society. doi:10.14722/usec.2014.23037
ACCESS: Describing and Contrasting Authentication Mechanisms.
Renaud, K.; Volkamer, M.; Maguire, J.
2014. International Conference on Human Aspects of Information Security, Privacy, and Trust (HAS), 183–194, Springer. doi:10.1007/978-3-319-07620-1_17
Paper Audit Trails and Voters’ Privacy Concerns.
Budurushi, J.; Stockhardt, S.; Woide, M.; Volkamer, M.
2014. 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014, Heraklion, GR, June 22-27, 2014. Hrsg.: T. Tryfonas, 400–409, Springer. doi:10.1007/978-3-319-07620-1_35
Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention.
Kolb, N.; Bartsch, S.; Volkamer, M.; Vogt, J.
2014. Human Aspects of Information Security, Privacy, and Trust (HAS) Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Ed.: T. Tryfonas, 172–182, Springer. doi:10.1007/978-3-319-07620-1_16
An Agency Perspective to Cloud Computing.
Pallas, F.
2014. GECON 2014 : 11th International Conference on Economics of Grids, Clouds, Systems, and Services (Revised Selected Papers), Cardiff, UK, 16-18 September 2014. Ed.: J. Altmann, 36–51, Springer International Publishing. doi:10.1007/978-3-319-14609-6_3
Establishing location-privacy in decentralized long-distance geocast services.
Florian, M.; Pieper, F.; Baumgart, I.
2014. 2014 IEEE Vehicular Networking Conference (VNC), Paderborn, Germany, 3–5 December 2014. Ed.: B. Scheuermann, 151–158, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/VNC.2014.7013334
The European Approach towards Data Protection in a Global World of Data Transfer.
Spiecker genannt Döhmann, I.
2014. Privacy in the Internet Age: Proceedings of the 8th Privacy Discussion Forum, 46–70
„Offlinetags – A Novel Privacy Approach to Online Photo Sharing“.
Pallas, F.; Ulbricht, M.-R.; Jaume-Palasí L.; Höppner U.
2014. CHI EA 2014, CHI EA ’14: CHI ’14, Toronto, ON, Canada, 26.4. - 1.5. 2014, Extended Abstracts on Human Factors in Computing Systems, Work-in-Progress, 2179–2184, Association for Computing Machinery (ACM). doi:10.1145/2559206.2581195
Extending and Applying a Framework for the Cryptographic Verification of Java Programs.
Küsters, R.; Scapin, E.; Truderung, T.; Graf, J.
2014. Principles of Security and Trust, POST 2014, Part of ETAPS 2014, Grenoble, France, April 5-13, 2014, 220–239, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-642-54792-8_12
Big Data und der Grundsatz der Zweckbindung.
Kring, M.
2014. Informatik 2014, Big Data – Komplexität meistern, 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, 22. – 26. September 2014. Hrsg.: E. Plödereder, 1–12
Proposal for a Multi-View Modelling Case Study: Component-Based Software Engineering with UML, Plug-ins, and Java.
Kramer, M. E.; Langhammer, M.
2014. Proceedings of the 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling, VAO ’14, York, United Kingdom, 22 July 2014, 7:7–7:10, Association for Computing Machinery (ACM). doi:10.1145/2631675.2631676
Poster Abstract: Secure Metering Communication in the Energy Smart Home Lab.
Hergenröder, A.; Bao, K.; Bräuchle, T.
2014. Poster and Demo Session of the 11th European Conference on Wireless Sensor Networks (EWSN), Oxford, U.K., 17 - 19 Februar 2014. Ed.: A. Cerpa, 32–33, EWSN
Secure Database Outsourcing to the Cloud using the MimoSecco Middleware.
Gabel, M.; Hübsch, G.
2014. Trusted Cloud Computing. Ed.: H. Krcmar. Part III, 187–202, Springer Verlag. doi:10.1007/978-3-319-12718-7_12
SMART-ER: peer-based privacy for smart metering.
Finster, S.; Baumgart, I.
2014. IEEE Conference on Computer Communications workshops (INFOCOM WKSHPS 2014) - INFOCOM Workshop on Communications and Control for Smart Energy Systems - Toronto, ON, Canada, 27 April-2 May 2014, 652–657, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2014.6849308
Videomonitoring zur Sturzdetektion und Alarmierung – Eine technische und rechtliche Analyse.
Bretthauer, S.; Krempel, E.
2014. Transparenz IRIS 2014 : Tagungsband des 17. Internationalen Rechtsinformatik Symposions, Salzburg, 20. - 22. Februar 2014. Hrsg.: E. Schweighofer, 525–534, Österreichische Computer-Ges
Energiemanagementsysteme der Zukunft : Anforderungen an eine datenschutzkonforme Verbrauchsvisualisierung.
Bräuchle, T.
2014. Big Data & Co : Neue Herausforderungen für das Informationsrecht - 15. Herbstakademie 2014 / DSRI, Deutsche Stiftung für Recht und Informatik; 10-13 September 2014, Mainz. Hrsg.: J. Taeger, 455–469, Oldenburger Verl. für Wirtschaft
Die datenschutzrechtliche Einwilligung in Smart Metering Systemen : Kollisionslagen zwischen Datenschutz- und Energiewirtschaftsrecht = The legal data protection consent in Smart Metering Systems : Situations involving conflicts between data protection act and energy industry legislation.
Bräuchle, T.
2014. Informatik 2014 : Big Data - Komplexität meistern : 44. Jahrestagung der Gesellschaft für Informatik, Stuttgart, Germany, 22.-26. September 2014. Hrsg.: E. Plödereder, 515–526, Köllen Verlag
Enhancing Privacy by Design From a Developer’s Perspective.
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2014. Privacy technologies and policy : revised selected papers - First Annual Privacy Forum (APF), Limassol, Cyprus, October 10 - 11, 2012. Ed.: B. Preneel, 73–85, Springer Verlag
Lessons Learned From Microkernel Verification.
Beckert, B.; Bormer, T.
2014. International Workshop on Automated Verification of Critical Systems (AVoCS), Bamberg, Germany, Sep 18 - 20, 2012. Eds.: G. Lüttgen, Elsevier
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender.
Böhl, F.; Greiner, S.; Scheidecker, P.
2014. 13th International Conference on Cryptology and Network Security (CANS) - Heraklion, Crete, Greece, October 22-24, 2014. Ed.: D. Gritzalis, 175–190, Springer Verlag
Automating Regression Verification.
Felsing, D.; Grebing, S.; Klebanov, V.; Rümmer, P.; Ulbrich, M.
2014. ASE ’14 : proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering : September 15-19, 2014, Västerås, Sweden, 349–359, Association for Computing Machinery (ACM). doi:10.1145/2642937.2642987
Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems.
Müller, S.; Bermbach, D.; Tai, S.; Pallas, F.
2014. 2nd IEEE International Conference on Cloud Engineering, IC2E 2014; Boston; United States; 10 March 2014 through 14 March 2014, 27–36, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IC2E.2014.48
Gesellschaftliche Relevanz der Informatik als Strukturtechnologie.
Keller, H. B.
2014. Chancen und Risiken der Wagnisgesellschaft : Dokumentation der Veranstaltung am 15.Oktober 2014 in der Bundesanstalt für Materialforschung und -prüfung (BAM), 16–39, FORUM46 - Interdisziplinäres Forum für Europa e.V
JKelloy: A Proof Assistant for Relational Specifications of Java Programs.
El Ghazi, A. A.; Ulbrich, M.; Gladisch, C.; Tyszberowicz, S.; Taghdiri, M.
2014. NASA Formal Methods - 6th International Symposium (NFM’14), Houston, Texas/USA, April 29 - May 1, 2014. Ed.: J. M. Badger, 173–187, Springer US. doi:10.1007/978-3-319-06200-6_13
Standard versus Selective Opening Security: Separation and Equivalence Results.
Hofheinz, D.; Rupp, A.
2014. Theory of Cryptography - 11th Theory of Cryptography Conference (TCC’14), San Diego, California/USA, February 24-26, 2014. Ed.: Y. Lindell, 591–615, Springer Verlag. doi:10.1007/978-3-642-54242-8_25
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.
Hofheinz, D.; Striecks, C.
2014. Topics in Cryptology - The Cryptographer’s Track at the RSA Conference (CT-RSA’14), San Francisco, California/USA, February 25-28, 2014. Ed.: J. Benaloh, 48–63, Springer US. doi:10.1007/978-3-319-04852-9_3
Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks.
Böhl, F.; Davies, G. T.; Hofheinz, D.
2014. Public-Key Cryptography - 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC’14), Buenos Aires, Argentina, March 26-28, 2014. Ed.: H. Krawczyk, 483–500, Springer Verlag. doi:10.1007/978-3-642-54631-0_28
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations.
Herold, G.; Hesse, J.; Hofheinz, D.; Rafols, C.; Rupp, A.
2014. Advances in Cryptology - 34th Annual Cryptology Conference (CRYPTO’14), Santa Barbara, California/USA, August 17-21, 2014. Ed.: J. A. Garay, 261–279, Springer Verlag. doi:10.1007/978-3-662-44371-2_15
Universally Composable Non-Interactive Key Exchange.
Freire, E. S. V.; Hesse, J.; Hofheinz, D.
2014. 9th International Conference on Security and Cryptography for Networks, SCN 2014; Amalfi; Italy; 3 September 2014 through 5 September 2014. Ed.: M. Abdalla, 1–20, Springer US. doi:10.1007/978-3-319-10879-7_1
Reasoning About Vote Counting Schemes Using Light-weight and Heavy-weight Methods.
Beckert, B.; Bormer, T.; Gore, R.; Kirsten, M.; Meumann, T.
2014. 8th International Verification Workshop (VERIFY´14), Wien, Österreich, July 23-24, 2014
TAM-VS: A Technology Acceptance Model for Video Surveillance.
Krempel, E.; Beyerer, J.
2014. Privacy Technologies and Policy - 2nd Annual Privacy Forum (APF’14), Athens, Greece, May 20-21, 2014. Ed.: B. Preneel, 86–100, Springer US. doi:10.1007/978-3-319-06749-0_6
Privacy-aware smart video surveillance revisited.
Fischer, Y.; Krempel, E.; Birnstill, P.; Unmüßig, G.; Monari, E.; Moßgraber, J.; Schenk, M.; Beyerer, J.
2014. 9th Security Research Conference ’Future Security’, Berlin, September 16-18, 2014. Ed.: K. Thoma, 91–99, Fraunhofer Verlag
Securus: From Confidentiality and Access Requirements to Data Outsourcing Solutions.
Köhler, J.; Jünemann, K.
2014. Privacy and Identity Management for Emerging Services and Technologies : 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013. [Konferenz]. Ed.: M. Hansen, 139–149, Springer Verlag
Zeitschriftenaufsätze
Implementing and evaluating a software-independent voting system for polling station elections.
Budurushi, J.; Jöris, R.; Volkamer, M.
2014. Journal of information security and applications, 19 (2), 1–10. doi:10.1016/j.jisa.2014.03.001
Rechtliche und technische Nutzerunterstützung bei der Button-Lösung.
Boos, C.; Bartsch, S.; Volkamer, M.
2014. Computer und Recht, (2), 119–127. doi:10.9785/ovs-cr-2014-119
Voter, What Message Will Motivate You to Verify Your Vote?.
Olembo, M. M.; Renaud, K.; Bartsch, S.; Volkamer, M.
2014. OR spectrum, 40 (1), 265–310. doi:10.14722/usec.2014.23038
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland.
Buchmann, J.; Neumann, S.; Volkamer, M.
2014. Datenschutz und Datensicherheit, 38 (2), 98–102
A specious unlinking strategy.
Friedl, S.; Nagel, M.; Powell, M.
2014. Periodica mathematica Hungarica, 69 (2), 207–210. doi:10.1007/s109980140063y
Überschussdaten in Retinabildern : Ein Beitrag zum datenschutzfreundlichen Entwurf biometrischer Systeme.
Friedewald, M.; Wawrzyniak, S.; Pallas, F.
2014. Datenschutz und Datensicherheit - DuD, 2014 (7)
Datenschutz im "SmartHome".
Raabe, O.
2014. Recht der Datenverarbeitung, 2014 (5), 177–186
Steuerung im Datenschutzrecht: Ein Recht auf Vergessen wider Vollzugsdefizite und Typisierung.
Spiecker genannt Döhmann, I.
2014. Kritische Vierteljahresschrift für Gesetzgebung und Rechtswissenschaft, 97 (1), 28–43. doi:10.5771/2193-7869-2014-1-28
Editorial: Big Brother unter der Motorhaube.
Spiecker genannt Döhmann, I.
2014. Neue juristische Wochenschrift, 10, 1 S
Big Data intelligent genutzt: Rechtskonforme Videoüberwachung im öffentlichen Raum.
Spiecker gen. Döhmann, I.
2014. Kommunikation & Recht, 17, 549–555
Anmerkung zu EuGH Rs. C-293/12 und C-594/12 – Vorratsdatenspeicherung.
Spiecker genannt Döhmann, I.
2014. Juristenzeitung, 69, 1109–1113
Ich sehe ‘was, was Du nicht siehst - Rechtliche Probleme intelligenter Videoüberwachung.
Spiecker genannt Döhmann, I.
2014. DGRI-Jahrbuch, 147–163
Precise Quantitative Information Flow Analysis – A Symbolic Approach.
Klebanov, V.
2014. Theoretical computer science, 538 (C), 124–139. doi:10.1016/j.tcs.2014.04.022
Tagungsbericht DGRI Jahrestagung 2013.
Haase, S.; Kring, M.; Pieper, F.
2014. Kommunikation & Recht, 2, 5
Energy Informatics - Current and Future Research Directions.
Goebel, C.; Jacobsen, H.-A.; del Razo, V.; Doblander, C.; Rivera, J.; Ilg, J.; Flath, C.; Schmeck, H.; Weinhardt, C.; Pathmaperuma, D.; Appelrath, H.-J.; Sonnenschein, M.; Lehnhoff, S.; Kramer, O.; Staake, T.; Fleisch, E.; Neumann, D.; Strüker, J.; Erek, K.; Zarnekow, R.; Ziekow, H.; Lässig, J.
2014. Business & information systems engineering, 6 (1), 25–31. doi:10.1007/s12599-013-0304-2
Die Zukunft des europäischen Datenschutzes nach der Europawahl.
Bretthauer, S.; Kring, M.
2014. Deutsches Verwaltungsblatt, 2014 (15), 977–978
A Survey on Testbeds and Experimentation Environments for Wireless Sensor Networks.
Horneber, J.; Hergenröder, A.
2014. IEEE communications surveys & tutorials, 16 (4), 1820–1838. doi:10.1109/COMST.2014.2320051
Privacy-Preserving Cooperative Route Planning.
Florian, M.; Finster, S.; Baumgart, I.
2014. IEEE Internet of Things Journal, 1 (6), 590–599. doi:10.1109/JIOT.2014.2361016
Checking probabilistic noninterference using JOANA.
Snelting, G.; Giffhorn, D.; Graf, J.; Hammer, C.; Hecker, M.; Mohr, M.; Wasserab, D.
2014. Information technology, 56 (6), 280–287. doi:10.1515/itit-2014-1051
Reasoning and Verification: State of the Art and Current Trends.
Beckert, B.; Hahnle, R.
2014. IEEE intelligent systems & their applications, 29 (1), 20–29. doi:10.1109/MIS.2014.3
How to Put Usability into Focus: Using Focus Groups to Evaluate the Usability of Interactive Theorem Provers.
Beckert, B.; Grebing, S.; Böhl, F.
2014. Electronic proceedings in theoretical computer science, 167, 4–13. doi:10.4204/EPTCS.167.3
Verifying voting schemes.
Beckert, B.; Gore, R.; Schürmann, C.; Bormer, T.; Wang, J.
2014. Journal of information security and applications, 19 (2), 115–129. doi:10.1016/j.jisa.2014.04.005
Optimization of data life cycles.
Jung, C.; Gasthuber, M.; Giesler, A.; Hardt, M.; Meyer, J.; Rigoll, F.; Schwarz, K.; Stotzka, R.; Streit, A.
2014. Journal of physics / Conference Series, 513 (TRACK 3), Art. Nr.: 032047. doi:10.1088/1742-6596/513/3/032047
SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service.
Köhler, J.; Jünemann, K.; Hartenstein, H.
2014. Praxis der Informationsverarbeitung und Kommunikation, 37 (2), 149–155. doi:10.1515/pik-2014-0011
2013
Buchaufsätze
Mental Models: General Introduction and Review of Their Application to Human-Centred Security.
Volkamer, M.; Renaud, K.
2013. Number theory and cryptography: papers in honor of Johannes Buchmann on the occasion of his 60th birthday. Eds.: Marc Fischlin, Stefan Katzenbeisser, 255–280, Springer Verlag. doi:10.1007/978-3-642-42001-6_18
Towards A Practical JCJ / Civitas Implementation.
Neumann, S.; Feier, C.; Volkamer, M.; Koenig, R.
2013. Workshop "Elektronische Wahlen: Ich sehe was, das Du nicht siehst – öffentliche und geheime Wahl": 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 804–818
E-Voting System Usability: Lessons for Interface Design, User Studies, and Usability Criteria.
Olembo, M.; Volkamer, M.
2013. Human-centered system design for electronic governance. Ed.: S. Saeed, 172–201, Information science reference. doi:10.4018/978-1-4666-3640-8.ch011
The Difference between Online and Offline Communication as a Factor in the Balancing of Interests with Freedom of Speech.
Döhmann, I. S. genannt.
2013. Free Speech in the Internet Era. Ed.: C. Walker, 91–106, Carolina Academic Press
Kommentierung von §§ 1, 46, 63, 64 KrWAbfG.
Spiecker genannt Döhmann, I.
2013. GK-KrWG : Gemeinschaftskommentar zum Kreislaufwirtschaftsgesetz (KrWG) sowie zur Verpackungsverordnung (VerpackV), zur Altfahrzeugverordnung (AltfahrzeugV), zum Elektro- und Elektronikgesetz (ElektroG), zum Batteriegesetz (BattG), Bioabfallverordnung (BioAbfV), zur Abfallverzeichnisverordnung (AVV) und zur EU-Abfallverbringungsverordnung (VVA). Hrsg. Arndt Schmehl, Heymanns
Die Online-Durchsuchung als Instrument der Sicherheitsgewährleistung.
Spiecker genannt Döhmann, I.
2013. Verfassungsstaatlichkeit im Wandel, Festschrift für Thomas Würtenberger zum 70. Geburtstag Hrsg.: D. Heckmann, 803–821, Duncker & Humblot
Datenschutz und Elektromobilität.
Raabe, O.; Weis, E.; Pallas, F.; Lorenz, M.
2013. Berliner Handbuch zur Elektromobilität, 297–324, Verlag C.H.Beck
Programmiersprachen.
Abke, J.; Braun, O.; Brune, P.; Hagel, G.; Keller, H.; Mottok, J.; Niemetz, M.; Pfeiffer, V.
2013. Perfekte Softwareentwicklung : Prozesse, Technologien und Methoden für erfolgreiche Softwareprojekte. Hrsg.: M. Lang, 247–294, Symposion Publishing
Diplomarbeiten
Entwurf einer BSI-Schutzprofil-konformen Smart Meter Gateway Softwarearchitektur. Diplomarbeit.
Smirek, L. D.
2013. Karlsruher Institut für Technologie (KIT)
Evaluierung der Energie-effizienz von Schlüsselaustauschprotokollen in Concast-Szenarien. Diplomarbeit.
Klock, T.
2013. Karlsruher Institut für Technologie (KIT)
Kommunikation in drahtlosen Sensornetzen - Vergleich zwischen Realität und Simulation. Diplomarbeit.
Benisch, S.
2013. Karlsruher Institut für Technologie (KIT)
Masterarbeiten
Impact of Erasure Coding Algorithms on the Availability of Federated Cloud Storage Systems. Masterarbeit.
Wolf, P.
2013. Karlsruher Institut für Technologie (KIT)
Implementing Smart Meter SpeedDating. Masterarbeit.
Beelmann, P.
2013
Bachelorarbeiten
Implementierung und Evaluierung eines Random-Key-Distribution Verfahren in WSNs. Bachelorarbeit.
Zickner, V.
2013. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
An Architectural Model for Deploying Critical Infrastructure Services in the Cloud.
Schöller, M.; Bless, R.; Pallas, F.; Horneber, J.; Smith, P.
2013. IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), 2013 : 2 - 5 December 2013, Bristol, United Kingdom. Vol. 1, 458–465, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.67
Branchenreport UX/Usability 2013.
Diefenbach, S.; Kolb, N.; Ullrich, D.
2013. Usability Professionals 2013, German UPA Tagungsband 2013. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 264–273, German UPA e.V
Are Graphical Authentication Mechanisms As Strong As Passwords?.
Renaud, K.; Mayer, P.; Volkamer, M.; Maguire, J.
2013. 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013, Krakow, Poland, 8th - 11th September 2013, 837–844, Institute of Electrical and Electronics Engineers (IEEE)
Modeling the German Legal Latitude Principles.
Neumann, S.; Kahlert, A.; Henning, M.; Richter, P.; Jonker, H.; Volkamer, M.
2013. Electronic participation: 5th IFIP WG 8.5 international conference, ePart 2013, Koblenz, Germany, September 17-19, 2013. Hrsg.: Maria A. Wimmer, Efthimios Tambouris, Ann Macintosh, 49–56, Springer Verlag
Adopting the CMU/APWG Anti-Phishing Landing Page idea for Germany.
Volkamer, M.; Stockhardt, S.; Bartsch, S.; Kauer, M.
2013. 3rd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2013 - Co-located with 26th IEEE Computer Security Foundations Symposium, CSF 2013, New Orleans, LA, 29th June 2013. Ed.: Giampaolo Bella, 46–52, IEEEXplore. doi:10.1109/STAST.2013.12
Machbarkeitsanalyse der UniWahl4 Software für Wahlen an der TU Darmstadt.
Braun, K.; Budurushi, J.; Volkamer, M.
2013. INF - Workshop: Elektronische Wahlen: Ich sehe was, das Du nicht siehst - öffentliche und geheime Wahl; 43. Jahrestagung, Gesellschaft für Informatik e.V. (GI), Koblenz, 17. September 2013. Hrsg.: Matthias Horbach, 752–766, Gesellschaft für Informatik (GI)
Effectively Communicate Risks for Diverse Users: A Mental-Models Approach for Individualized Security Interventions.
Bartsch, S.; Volkamer, M.
2013. Risikokommunikation im Kontext von IT-Sicherheit (RiskKom), Koblenz, 16. September 2013, 1971–1984, Gesellschaft für Informatik (GI)
Mental Models of Verifiability in Voting.
Olembo, M.; Bartsch, S.; Volkamer, M.
2013. E-voting and identify : 4th international conference ; proceedings / Vote-ID 2013, Guildford, UK, July 17 - 19, 2013. Ed.: James Heather..., 142–155, Springer Verlag. doi:10.1007/978-3-642-39185-9_9
Vote Casting in Any Preferred Constituency: A New Voting Channel.
Budurushi, J.; Henning, M.; Volkamer, M.
2013. E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings. Ed..: S. Schneider, 61–75, Springer Verlag. doi:10.1007/978-3-642-39185-9_4
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs.
Bernhard, D.; Neumann, S.; Volkamer, M.
2013. E-voting and identity : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013 ; proceedings. Ed..: Schneider, Steve; Heather, James; Teague, Vanessa, 176–192, Springer Verlag. doi:10.1007/978-3-642-39185-9_11
Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme.
Budurushi, J.; Neumann, S.; Olembo, M.; Volkamer, M.
2013. Eighth International Conference on Availability, Reliability and Security (ARES), 2013 : Regensburg, Germany, 2 - 6 Sept. 2013, proceedings. Hrsg.: Pernul, Günther; Sandhu, Ravi, 198–207, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2013.27
A Comparison of American and German Folk Models of Home Computer Security.
Kauer, M.; Günther, S.; Storck, D.; Volkamer, M.
2013. Human aspects of information security, privacy, and trust: first international conference, HAS 2013, held as part of HCI International 2013, Las Vegas, NV, USA, July 21 - 26, 2013 ; proceedings. Ed.: Louis Marinos, 100–109, Springer Verlag. doi:10.1007/978-3-642-39345-7-11
Contextualized Web warnings, and how they cause distrust.
Bartsch, S.; Volkamer, M.; Theuerling, H.; Karayumak, F.
2013. 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, London, UK, June 17-19, 2013, 205–222, Springer Verlag. doi:10.1007/978-3-642-38908-5_16
Contextualized Security Interventions in Password Transmission Scenarios.
Volkamer, M.; Bartsch, S.; Kauer, M.
2013. European Information Security Multi-Conference, EISMC 2013; Lisbon, Portugal, 8th - 10th May 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 12–22, Centre for Security
Developing and Testing a Visual Hash Scheme.
Olembo, M.; Stockhardt, S.; Hülsing, A.; Volkamer, M.
2013. Proceedings of the European Information Security Multi-Conference (EISMC 2013) : Lisbon, Portugal, 8-10 May, 2013. Eds.: Steven Furnell, Nathan Clarke, Vasilis Katos, 91–100, Centre for Security
Informatische Modellierung der Prinzipien des gesetzlichen Gestaltungsspielraums im Hinblick auf Wahlsysteme.
Neumann, S.; Kahlert, A.; Henning, M.; Jonker, H.; Volkamer, M.
2013. Abstraktion und Applikation : Tagungsband des 16. Internationalen Rechtsinformatiksymposiums IRIS 2013, Universität Salzburg, 21. bis 23. Februar 2013 = Abstraction and application / Hrsg.: Erich Schweighofer, Franz Kummer, Walter Hötzendorfer, 277–284, Oesterreichische Computer Gesellschaft
P4R : Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.
Rupp, A.; Hinterwälder, G.; Baldimtsi, F.; Paar, C.
2013. FC 2013 : 17th International Conference on Financial Cryptography and Data Security : Revised Selected Papers, Okinawa, Japan, 1st - 5th April 2013. Ed.: A.-R. Sadeghi, 205–212, Springer Verlag GmbH Deutschland. doi:10.1007/978364239884117
Symbolic Universal Composability.
Bohl, F.; Unruh, D.
2013. 2013 IEEE 26th Computer Security Foundations Symposium, CSF 2013; New Orleans, LA; United States; 26 June 2013 through 28 June 2013, 257–271, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CSF.2013.24
Die Durchsetzung datenschutzrechtlicher Mindestanforderungen bei Facebook und anderen sozialen Netzwerken.
Spiecker genannt Döhmann, I.
2013. Der Schutz der Persönlichkeit im Internet ; [Vorträge, die während des 12. @kit-Kongresses, der zugleich das 2. Forum "Kommunikation & Recht" war und am 21./22. Juni 2012 in Hamburg unter dem Generalthema "Der Schutz der Persönlichkeit im Internet" stattfand, gehalten wurden]. Hrsg.: Stefan Leible, 33–54, Boorberg
Systemdienstleistungen und Elektromobilität im Verteilnetz : Rollen und Regulierung.
Raabe, O.; Weis, E.; Ullmer, J.
2013. Informatik 2013: Informatik angepasst an Mensch, Organisation und Umwelt, Koblenz, Deutschland, 16. - 20. September 2013, 1485–1499, Köllen
Privacy Impact Assessment als besondere Form der Technikfolgenabschätzung.
Pallas, F.; Rettke, A.
2013. 13. Österreichische Konferenz zur Technikfolgenabschätzung, Wien, 3. Juni 2013
Modeling Quality Attributes of Cloud-Standby-Systems : A Long-Term Cost and Availability Model.
Pallas, F.; Lenk, A.
2013. ESOCC 2013 : Second European Conference on Service-Oriented and Cloud Computing, Málaga, Spain, 1st - 3rd September 2013. Ed.: K.-K. Lau, 49–63, Springer Verlag GmbH Deutschland. doi:10.1007/978-3-642-40651-5_5
Structural Composition Attacks on Anonymized Data.
Nilges, T.; Müller-Quade, J.; Huber, M.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
A Systematic Review of Model-Driven Security.
Nguyen, P. H.; Klein, J.; Kramer, M. E.; Traon, Y. L.
2013. 20th Asia-Pacific Software Engineering Conference (APSEC 2013) : Bangkok, Thailand, 2 - 5 December 2013, [proceedings], 432–441, IEEE Computer Society. doi:10.1109/APSEC.2013.64
SAT-based Analysis and Quantification of Information Flow in Programs.
Klebanov, V.; Manthey, N.; Muise, C.
2013. Quantitative Evaluation of Systems : 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013, Proceedings. Ed.: K. Joshi, 177–192, Springer Verlag. doi:10.1007/978-3-642-40196-1_16
Defining Privacy Based on Distributions of Privacy Breaches.
Huber, M.; Müller-Quade, J.; Nilges, T.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer Verlag. doi:10.1007/978-3-642-42001-6_15
Cumulus4j: A Provably Secure Database Abstraction Layer.
Huber, M.; Gabel, M.; Schulze, M.; Bieber, A.
2013. Security engineering and intelligence informatics : proceedings / CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2 - 6, 2013. Ed.: A. Cuzzocrea, 180–193, Springer Verlag. doi:10.1007/978-3-642-40588-4_13
Energy-Efficient Security in Smart Metering Scenarios.
Hergenröder, A.; Haas, C.
2013. IEEE 38th Conference on Local Computer Networks (LCN), Sydney, Australia, 21 Oct - 24 Oct 2013, 1–3, Institute of Electrical and Electronics Engineers (IEEE)
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs.
Haynberg, R.; Rill, J.; Achenbach, D.; Jörn Müller-Quade.
2013. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavík, Iceland, 29 - 31 July, 2013 : [part of ICETE 2013, 10th International Joint Conference on e-Business and Telecommunications]. Ed.: P. Samarati, 403–410, SciTePress
Using JOANA for Information Flow Control in Java Programs – A Practical Guide.
Graf, J.; Hecker, M.; Mohr, M.
2013. Software Engineering 2013 : Workshopband (inkl. Doktorandensymposium) : Fachtagung des GI-Fachbereichs Softwaretechnik , Aachen, 26.02. - 01.03.2013. Hrsg.: S. Wagner, 123–138, Ges. für Informatik
On the Detectability of Weak DoS Attacks in Wireless Sensor Networks.
Dudek, D.
2013. Data Privacy Management and Autonomous Spontaneous Security : 7th International Workshop (DPM 2012) and 5th International Workshop (SETOP 2012) : Revised Selected Papers, Pisa, Italy, 13th - 14th September 2012. Ed.: R. Di Pietro, 243–257, Springer Verlag. doi:10.1007/978-3-642-35890-6_18
Datensicherheit in intelligenten Infrastrukturen.
Bretthauer, S.; Bräuchle, T.
2013. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, 2104–2118, Ges. für Informatik
Enforcing privacy through usage-controlled video surveillance.
Birnstill, P.; Pretschner, A.
2013. 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) : Krakow, Poland ; 27 - 30 Aug. 2013, 318–323, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/AVSS.2013.6636659
Usage-controlled Video Surveillance – Revealing its Potentials for Privacy.
Birnstill, P.
2013. 8th future security : Security Research Conference, Berlin, September 17 - 19, 2013. Ed.: M. Lauster, 502–503, Fraunhofer Verlag
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective.
Bier, C.
2013. 4th International Workshop on Data Usage Management (DUMA) ; co-located with the IEEE Symposium on Security and Privacy (SP) - San Francisco, Calif., USA; 23 May 2013, 13–17, Institute of Electrical and Electronics Engineers (IEEE)
Analysing Vote Counting Algorithms Via Logic. And its Application to the CADE Election System.
Beckert, B.; Goré, R.; Schürmann, C.
2013. Proceedings, 24th International Conference on Automated Deduction (CADE), Lake Placid, NY, USA Hrsg.: Maria Paola Bonacina, 135–144, Springer Verlag. doi:10.1007/978-3-642-38574-2_9
Non simplificate nubes! Ein rechtlicher Blick hinter die Kulissen informatischer Cloud-Forschung.
Balaban, S.; Pallas, F.
2013. Law as a service (LaaS) : Recht im Internet- und Cloud-Zeitalter ; Tagungsband Herbstakademie / DSRI, Deutsche Stiftung für Recht und Informatik ; Oldenburg : 2013.09. Hrsg.: J. Taeger. Bd.: 1, 325–342, Oldenburger Verl. für Wirtschaft
Deduction soundness: prove one, get five for free.
Böhl, F.; Cortier, V.; Warinschi, B.
2013. CCS ’13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany — November 04 - 08, 2013. Ed.: A.-R. Sadeghi, 1261–1272, Association for Computing Machinery (ACM). doi:10.1145/2508859.2516711
Compliance-preserving Cloud Storage Federation based on Data-driven Usage Control.
Wüchner, T.; Müller, S.; Fischer, R.
2013. 2013 IEEE Fifth International Conference on Cloud Computing Technology and Science, Bristol, United Kingdom, 2-5 December 2013 (CloudCom 2013). Proceedings, 285–288, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CloudCom.2013.149
Web technologies and privacy policies for the Smart Grid.
Speiser, S.; Wagner, A.; Raabe, O.; Harth, A.
2013. IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society : Austria Center Vienna, Vienna, Austria, 10 - 14 November, 2013. Proceedings, 4809–4814, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/IECON.2013.6699913
Smart Grid-Ready Communication Protocols And Services For A Customer-Friendly Electromobility Experience.
Mültin, M.; Gitte, C.; Schmeck, H.
2013. Informatik 2013 : 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz. [Konferenz]. Hrsg.: M. Horbach, 1470–1484, Gesellschaft für Informatik (GI)
Eine Bestandsaufnahme von Standardisierungspotentialen und -lücken im Cloud Computing.
Fischer, R.; Janiesch, C.; Strach, J.; Bieber, N.; Zink, W.; Tai, S.
2013. Proceedings of the 11th International Conference on Wirtschaftsinformatik (WI2013), Feb 27 - Mar 01 2013 University Leipzig, Germany. Vol. 2. Hrsg. R. Alt, 1359–1373, Merkur
On the Specification and Verification of Voting Schemes.
Beckert, B.; Gore, R.; Schürmann, C.
2013. E-Voting and Identify - 4th International Conference, Guildford, United Kingdom, July 17-19, 2013 - Proceedings. Ed.: J. Heather, 25–40, Springer Verlag. doi:10.1007/978-3-642-39185-9_2
Demo: Overdrive - An overlay-based geocast service for smart traffic applications.
Florian, M.; Andreev, S.; Baumgart, I.
2013. 19th Annual International Conference on Mobile Computing & Networking (MobiCom’13), Miami, Florida/USA, September 30 - October 4, 2013, 147–150, Association for Computing Machinery (ACM). doi:10.1145/2500423.2505297
Evaluating energy-efficiency of hardware-based security mechanisms.
Haas, C.; Munz, S.; Wilke, J.; Hergenroder, A.
2013. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops’13), San Diego, California/USA, March 18-22, 2013, 560–565, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/PerComW.2013.6529559
Overdrive an overlay-based geocast service for smart traffic applications.
Heep, B.; Florian, M.; Volz, J.; Baumgart, I.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578313
Energy-efficiency of concast communication in Wireless Sensor Networks.
Wilke, J.; Haas, C.
2013. 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS’13), Banff, Canada, March 18-20, 2013, 34–38, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/WONS.2013.6578318
Elderberry: A peer-to-peer, privacy-aware smart metering protocol.
Finster, S.; Baumgart, I.
2013. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’13), Turin, Italy, April 14-19, 2013, 37–42, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INFCOMW.2013.6562905
Pseudonymous Smart Metering without a Trusted Third Party.
Finster, S.; Baumgart, I.
2013. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), Melbourne, Australia, July 16-18, 2013, 1723–1728, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/TrustCom.2013.234
Smart Meter Speed Dating, short-term relationships for improved privacy in Smart Metering.
Finster, S.
2013. IEEE International Conference on Smart Grid Communications (SmartGridComm’13), Vancouver, Canada, October 21-24, 2013, 426–431, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/SmartGridComm.2013.6687995
Evaluating the Energy-Efficiency of the Rich Uncle Key Exchange Protocol in WSNs.
Haas, C.; Wilke, J.; Knittel, F.
2013. 38th Annual IEEE Conference on Local Computer Networks, LCN 2013; Sydney, NSW; Australia; 21 October 2013 through 24 October 2013, 336–339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCN.2013.6761263
Privacy in Overlay-based Smart Traffic Systems.
Florian, M.; Baumgart, I.
2013. IEEE Workshop on Privacy and Anonymity for the Digital Economy (PADE’13), Sydney, Australia, October 24, 2013, 912–917, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/LCNW.2013.6758531
Reuse and configuration for code generating architectural refinement transformations.
Langhammer, M.; Lehrig, S.; Kramer, M. E.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 6, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489866
View-centric engineering with synchronized heterogeneous models.
Kramer, M. E.; Burger, E.; Langhammer, M.
2013. 1st Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling (VAO’13), Montpellier, France, July 2, 2013, Art. Nr.: 5, Association for Computing Machinery (ACM). doi:10.1145/2489861.2489864
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token.
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer Verlag. doi:10.1007/978-3-642-36594-2_36
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Döttling, N.; Müller-Quade, J.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer Verlag. doi:10.1007/978-3-642-38348-9_2
Non-Interactive Key Exchange.
Freire, E. S. V.; Hofheinz, D.; Kiltz, E.; Paterson, K. G.
2013. Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 - Proceedings. Ed.: K. Kurosawa, 254–271, Springer Verlag. doi:10.1007/978-3-642-36362-7_17
Practical Signatures from Standard Assumptions.
Böhl, F.; Hofheinz, D.; Jager, T.; Koch, J.; Seo, J. H.; Striecks, C.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 461–485, Springer Verlag. doi:10.1007/978-3-642-38348-9_28
Circular Chosen-Ciphertext Security with Compact Ciphertexts.
Hofheinz, D.
2013. Advances in Cryptology - EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013 - Proceedings. Ed.: T. Johansson, 520–536, Springer Verlag. doi:10.1007/978-3-642-38348-9_31
Programable Hash Functions in the Multilinear Setting.
Freire, E. S. V.; Hofheinz, D.; Paterson, K. G.; Striecks, C.
2013. Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, California/USA, August 18-22, 2013 - Proceedings Part I. Ed.: R. Canetti, 513–530, Springer Verlag. doi:10.1007/978-3-642-40041-4_28
Privacy Preserving Surveillance and the Tracking-Paradox.
Greiner, S.; Birnstill, P.; Krempel, E.; Beckert, B.; Beyerer, J.
2013. 8th Future Security - Security Research Conference, Berlin, September 17-19, 2013 - Proceedings. Ed.: M. Lauster, 296–302, Fraunhofer Verlag
Information Flow in Object-Oriented Software.
Beckert, B.; Bruns, D.; Klebanov, V.; Scheben, C.; Schmitt, P. H.; Ulbrich, M.
2013. Logic-Based Program Synthesis and Transformation, LOPSTR 2013, Madrid, Spain, September 16-18, 2013 [Konferenz]. Ed.: G. Gupta, 15–32, Universidad
A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs.
Küsters, R.; Truderung, T.; Beckert, B.; Bruns, D.; Graf, J.; Scheben, C.
2013. Grande Region Security and Reliability Day 2013. April 12, 2013, University of Luxembourg. Ed.: Ch. Hammer, Luxembourg
Dynamic Logic with Trace Semantics.
Beckert, B.; Bruns, D.
2013. Automated Deduction - CADE-24 : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013, Proceedings. Ed.: M.P. Bonacina, 315–329, Springer Verlag
Zeitschriftenaufsätze
Holistic and Law compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA.
Simić-Draws, D.; Neumann, S.; Kahlert, A.; Richter, P.; Grimm, R.; Volkamer, M.; Roßnagel, A.
2013. International journal of information security and privacy, 7 (3), 16–35. doi:10.4018/jisp.2013070102
Smart Energy Systems.
Schmeck, H.
2013. Information technology, 55 (2), 43–44. doi:10.1524/itit.2013.9002
Legal Aspects of Demand Side Management in Germany.
Raabe, O.; Ullmer, J.
2013. Information technology, 55 (2), 63–69. doi:10.1524/itit.2013.0008
Sicherheit, Resilienz und rechtliche Herausforderungen in Bezug auf Cloud Computing und kritische Infrastruktur-IT.
Pallas, F.; Tauber, M.; Wagner, C.
2013. Elektrotechnik und Informationstechnik, 130 (12), 33–36
Informationszugang im Recht der Europäischen Union.
Bretthauer, S.
2013. Die öffentliche Verwaltung, 677–685
Haftung und Beweis bei geschachtelt komponierten Cloud-Services.
Balaban, S.; Pallas, F.
2013. InTeR, 173 (4), 193–198
Cloud Standby System and Quality Model.
Lenk, A.; Pallas, F.
2013. Journal of Cloud Computing, 1 (2), 48–59
Technische Sicherheit und Informationssicherheit.
Freiling, F.; Grimm, R.; Großpietsch, K. E.; Keller, H. B.; Mottok, J.; Münch, I.; Rannenberg, K.; Saglietti, F.
2013. Informatik-Spektrum, 24, 343–353. doi:10.1007/s00287-013-0748-2
Polynomial Runtime and Composability.
Hofheinz, D.; Unruh, D.; Müller-Quade, J.
2013. Journal of Cryptology, 26 (3), 375–441. doi:10.1007/s00145-012-9127-4
Practical Chosen Ciphertext Secure Encryption from Factoring.
Hofheinz, D.; Kiltz, D.; Shoup, V.
2013. Journal of cryptology, 26 (1), 102–118. doi:10.1007/s00145-011-9115-0
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Jager, T.; Schwenk, J.
2013. Journal of cryptology, 26 (2), 225–245. doi:10.1007/s00145-012-9120-y
2012
Buchaufsätze
C4PS - Helping Facebookers Manage Their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics : 4th international conference ; proceedings / SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012. Karl Aberer ... (ed.), 188–201, Springer Verlag. doi:10.1007/978-3-642-35386-4_15
Data Life Cycle Labs, A New Concept to Support Data-Intensive Science.
Wezel, J. van; Streit, A.; Jung, C.; Stotzka, R.; Halstenberg, S.; Rigoll, F.; Garcia, A.; Heiss, A.; Schwarz, K.; Gasthuber, M.; others.
2012. arXiv : Computational Physics (physics.comp-ph), arXiv:1212.5596
Staatliche Informationen des Verbrauchers – Risiken und Nebenwirkungen.
Spiecker gen. Döhmann, I.
2012. Jahrbuch der Juristischen Studiengesellschaft Bremen, 110–136, Bremen
Rechtliche Begleitung der Technikentwicklung im Bereich moderner Infrastrukturen und Informationstechnologien.
Spiecker genannt Döhmann, I.
2012. Die Vermessung des virtuellen Raums. Hrsg.: H. Hill, 137–161, Nomos Verlagsgesellschaft
Beyond Gut Level – Some critical remarks on the German Privacy Approach to Smart Metering.
Pallas, F.
2012. Computers, Privacy and Data Protection (CPDP). Hrsg.: Serge Gutwirth ..., 313–345, Springer Netherlands. doi:10.1007/978-94-007-5170-5_14
Dissertationen
Slicing of Concurrent Programs and its Application to Information Flow Control. Dissertation.
Giffhorn, D.
2012. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000028814
Diplomarbeiten
Evaluierung der Energieeffizienz des Rich Uncle Protokolls. Diplomarbeit.
Knittel, F.
2012. Karlsruher Institut für Technologie (KIT)
Proceedingsbeiträge
Formal Treatment of Distributed Trust in Electronic Voting.
Neumann, S.; Volkamer, M.
2012. ICIMP 2012 : the Seventh International Conference on Internet Monitoring and Protection : May 27-June 1, 2012, Stuttgart, Germany / ICIMP 2012 editors: Arno Wagner, 10 S., IARIA
Branchenreport Usability 2012.
Diefenbach, S.; Ullrich, D.; Kolb, N.
2012. Usability professionals 2012. Hrsg.: Henning Brau, Andreas Lehmann, Kostanija Petrovic, Matthias C. Schroeder, 288–294, German UPA
C4PS - Helping Facebookers Manage their Privacy Settings.
Paul, T.; Stopczynski, M.; Puscher, D.; Volkamer, M.; Strufe, T.
2012. Social informatics: 4th international conference, SocInfo 2012, Lausanne, Switzerland, December 5 - 7, 2012, 188–201, Springer Verlag
The notary based PKI a lightweight PKI for long-term signatures on documents.
Vigil, M.; Moecke, C. T.; Custódio, R. F.; Volkamer, M.
2012. Public key infrastructures, services and applications, 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012. Ed.: Sabrina De Capitani di Vimercati, Chris Mitchell, 85–97, Springer Verlag
Towards the Systematic Development of Contextualized Security Interventions.
Bartsch, S.; Volkamer, M.
2012. Designing Interactive Secure Systems: Workshop at British HCI 2012, University of Birmingham, 11th September 2012
The Secure Platform Problem - Taxonomy and Analysis of Existing Proposals to Address this Problem.
Schläpfer, M.; Volkamer, M.
2012. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 410–418, New York. doi:10.1145/2463728.2463807
Civitas and the Real World: Problems and Solutions from a Practical Point of View.
Neumann, S.; Volkamer, M.
2012. 7th International Conference on Availability, Reliability and Security (ARES 2012) : Prague, Czech Republic, 20 - 24 August 2012, 180–185, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2012.75
The Influence of trustworthiness of website layout on security perception of websites.
Kauer, M.; Kiesel, F.; Ueberschaer, F.; Volkamer, M.; Bruder, R.
2012. Current issues in IT security 2012 : 5. Interdisciplinary Security Conference, Freiburg i.B., Germany, May 8 - 10, 2012. Ed.: J. Jähnke, 215–220, Duncker & Humblot
Partial Verifiability in POLYAS for the GI Elections.
Olembo, M.; Kahlert, A.; Neumann, S.; Volkamer, M.
2012. 5th International Conference on Electronic Voting 2012 (EVOTE2012), Castle Hofen, Bregenz, Austria, July 11 - 14, 2012. Ed.: Kripp, Manuel J; Volkamer, Melanie; Grimm, Rüdiger, 96–109, Gesellschaft für Informatik (GI)
Security versus Trust Indicators in 2011 in Germany.
Volkamer, M.; Karayumak, F.; Kauer, M.; Halim, D.; Bruder, R.
2012. Schriftenreihe des Max-Planck-Instituts für Ausländisches und Internationales Strafrecht / I, Freiburg i.B., Germany, May 8-10, 2012, 79–96, Duncker & Humblot
It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately.
Kauer, M.; Pfeiffer, T.; Volkamer, M.; Theuerling, H.; Bruder, R.
2012. Sicherheit 2012 - Sicherheit, Schutz und Zuverlässigkeit : Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI); Darmstadt, Germany, 7. - 9. März 2012. Ed.: N. Suri, 187–198, Ges. für Informatik
Öffentlichkeit vs. Verifizierbarkeit - Inwieweit erfüllt mathematische Verifizierbarkeit den Grundsatz der Öffentlichkeit der Wahl.
Henning, M.; Demirel, D.; Volkamer, M.
2012. International Legal Informatics Symposium (IRIS), Kuching, Sarawak, Malaysia, 4 - 6 September 2012. Ed.: Ahmad Khushairy Makhtar ..., 213–220, Curran Associates, Inc
Transparency and Technical Measures to Establish Trust in Norwegian Internet Voting.
Spycher, O.; Volkamer, M.; Koenig, R.
2012. E-voting and identity : third international conference, revised selected papers / VoteID 2011, Tallinn, Estonia, September 28 - 30, 2011. Ed.: Aggelos Kiayias, Helger Lipmaa, 19–35, Springer Verlag. doi:10.1007/978-3-642-32747-6_2
Introduction.
Spiecker gen. Döhmann, I.
2012. Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt; Tagung vom 16.-20. September 2013 in Koblenz. Hrsg.: M. Horbach, Gesellschaft für Informatik (GI)
User-centric Protection and Privacy in Smart Surveillance Systems.
Vagts, H.; Krempel, E.; Beyerer, J.
2012. 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4 - 6, 2012, 237–248, Springer Verlag. doi:10.1007/978-3-642-33161-9_36
Privacy-aware access control for video data in intelligent surveillance systems.
Vagts, H.; Jakoby, A.
2012. Mobile multimedia/image processing, security, and applications 2012 : 23 - 24 April 2012, Baltimore, Maryland, United States ; [at SPIE Defense, Security + Sensing], SPIE. doi:10.1117/12.920623
Data Protection and Smart Grid Communication: The European Perspective.
Pallas, F.
2012. IEEE PES Innovative Smart Grid Technologies, ISGT 2012, Washington, DC, United States, 16.1. - 20.1.2012, Art. Nr.: 6175695, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175695
Integration of electric vehicles in smart homes - an ICT-based solution for V2G scenarios.
Multin, M.; Allerding, F.; Schmeck, H.
2012. IEEE PES innovative smart grid technologies (ISGT 2012) : [conference], Washington, DC, USA, 16 - 20 January 2012, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175624
A Framework for the Cryptographic Verification of Java-like Programs.
Küsters, R.; Truderung, T.; Graf, J.
2012. IEEE 25th Computer Security Foundations Symposium (CSF), 2012, 198–212, IEEE Computer Society. doi:10.1109/CSF.2012.9
Precise Quantitative Information Flow Analysis Using Symbolic Model Counting.
Klebanov, V.
2012. QASA 2012 International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS Pisa, Italy - September 14, 2012. Hrsg.: F. Martinelli
Coercion-Resistant Electronic Elections with Write-In Candidates.
Kempka, C.
2012. EVT/WOTE ’12 : 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2012, Bellevue, WA, August 6 - 7, Advanced Computing Systems Association (USENIX)
Evaluating the Energy-Efficiency of Key Exchange Protocols in Wireless Sensor Networks.
Haas, C.; Wilke, J.
2012. 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N) , Paphos, Cyprus — October 21 - 22, 2012, 133–140, Association for Computing Machinery (ACM). doi:10.1145/2387191.2387210
Collaborative Detection of Traffic Anomalies Using First Order Markov Chains.
Dudek, D.
2012. 2012 Ninth International Conference on Networked Sensing Systems (INSS) - Antwerp, Belgium ; 11 - 14 June 2012, 1–4, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/INSS.2012.6240522
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer Verlag. doi:10.1007/978-3-642-34961-4_30
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer Verlag. doi:10.1007/978-3-642-32284-6_5
Common Privacy Patterns in Video Surveillance and Smart Energy.
Bier, C.; Krempel, E.
2012. 7th International Conference on Computing and Convergence Technology (ICCCT), Seoul, Korea, 3 - 5 Dec. 2012. Ed.: K. Kwack, 610–615, Institute of Electrical and Electronics Engineers (IEEE)
How is Positive-Sum Privacy Feasible?.
Bier, C.; Birnstill, P.; Krempel, E.; Vagts, H.; Beyerer, J.
2012. Future Security : 7th Security Research Conference, Bonn, Germany, September 4-6, 2012. Ed.: N. Aschenbruck, 265–268, Springer Verlag. doi:10.1007/978-3-642-33161-9_39
Evaluating the Usability of Interactive Verification Systems.
Beckert, B.; Grebing, S.
2012. 1st International Workshop on Comparative Empirical Evaluation of Reasoning Systems (COMPARE), Manchester, UK, June 30, 2012. Ed.: V. Klebanov, 3–17, CEUR
Mind the Gap: Formal Verification and the Common Criteria.
Beckert, B.; Bruns, D.; Grebing, S.
2012. 6th International Verification Workshop – VERIFY-2010 - What are the verification problems? What are the deduction techniques? Edinburgh, Great Britain, July 20–21, 2010. Hrsg.: M. Aderhold, 4–12, EasyChair
Lessons Learned From Microkernel Verification: Specification is the New Bottleneck.
Baumann, C.; Beckert, B.; Blasum, H.; Bormer, T.
2012. Seventh Conference on Systems Software Verification (SSV), Sydney, Australia, 28-30 November 2012. Ed.: F. Cassez, 18–32, NICTA
User interaction interface for Energy Management in Smart Homes.
Becker, B.; Kellerer, A.; Schmeck, H.
2012. 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012; Washington, DC; United States; 16 January 2012 through 20 January 2012, Art. Nr.: 6175616, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ISGT.2012.6175616
Electrical Load Management in Smart Homes Using Evolutionary Algorithms.
Allerding, F.; Premm, M.; Shukla, P. K.; Schmeck, H.
2012. Evolutionary Computation in Combinatorial Optimization - 12th European Conference, EvoCOP 2012, Málaga, Spain, April 11-13, 2012 - Proceedings. Ed.: J.-K. Hao, 99–110, Springer Verlag. doi:10.1007/978-3-642-29124-1_9
Formal Semantics of Model Fields in Annotation-based Specifications.
Beckert, B.; Bruns, D.
2012. KI 2012: advances in artificial intelligence : 35th Annual German Conference on AI, Saarbrücken, Germany, September 24-27, 2012. Ed.: B. Glimm, 13–24, Springer Verlag
On the security of TLS-DHE in the standard model.
Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J.
2012. 32nd Annual International Cryptology Conference, CRYPTO 2012; Santa Barbara, CA; United States; 19 August 2012 through 23 August 2012. Ed.: R. Canetti, 273–293, Springer Verlag. doi:10.1007/978-3-642-32009-5_17
Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Jager, T.; Schinzel, S.; Somorovsky, J.
2012. 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10-12, 2012. Ed.: S. Foresti, 752–769, Springer Verlag. doi:10.1007/978-3-642-33167-1
Improving the usability of specification languages and methods for annotation-based verification.
Beckert, B.; Bormer, T.; Klebanov, V.
2012. Proceeding FMCO’10 Proceedings of the 9th international conference on Formal Methods for Components and Objects, 61–79, Springer Verlag. doi:10.1007/978-3-642-25271-6_4
Integration of Bounded Model Checking and Deductive Verification.
Beckert, B.; Bormer, T.; Merz, F.; Sinz, C.
2012. Formal Verification of Object-Oriented Software : international conference; revised selected papers, FoVeOOS 2011, Turin, Italy, October 5 - 7, 2011. Ed.: B. Beckert, 86–104, Springer Verlag. doi:10.1007/978-3-642-31762-0_7
Maintenance and Privacy in Unstructured GeoCast Overlays for Smart Traffic Applications.
Heep, B.; Baumgart, I.
2012. Proceedings of the 4th International Conference on Ubiquitous and Future Networks (ICUFN 2012), Phuket, Thailand, Juli 2012, 286–287, IEEE Computer Society. doi:10.1109/ICUFN.2012.6261712
Extending the Palladio Component Model using Profiles and Stereotypes.
Kramer, M. E.; Durdik, Z.; Hauck, M.; Henss, J.; Küster, M.; Merkle, P.; Rentschler, A.
2012. Palladio Days 2012. Proceedings, 8 - 9 November 2012, Universität Paderborn, Germany. Ed.: S. Becker, 7–15, Karlsruher Institut für Technologie (KIT)
Waters Signatures with Optimal Security Reduction.
Hofheinz, D.; Jager, T.; Knapp, E.
2012. Public Key Cryptography -PKC 2012 15th International Conference on Practice and Theory in Public Key Cryptography Darmstadt, Germany, May 21-23, 2012. Proceedings. Ed.: M. Fischlin, 66–83, Springer Verlag. doi:10.1007/978-3-642-30057-8_5
All-But-Many Lossy Trapdoor Functions.
Hofheinz, D.
2012. Advances in Cryptology -EUROCRYPT 2012 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques Cambridge, UK, April 15-19, 2012. Proceedings. Ed.: D. Pointcheval, 209–227, Springer Verlag. doi:10.1007/978-3-642-29011-4_14
Tightly Secure Signatures and Public-Key Encryption.
Hofheinz, D.; Jager, T.
2012. Advances in Cryptology - CRYPTO 2012 32nd Annual Cryptology Conference Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Ed.: R. Safavi-Naini, 590–607, Springer Verlag. doi:10.1007/978-3-642-32009-5_35
On definitions of selective opening security.
Böhl, F.; Hofheinz, D.; Kraschewski, D.
2012. 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012; Darmstadt; Germany; 21 May 2012 through 23 May 2012, 522–539, Springer Verlag. doi:10.1007/978-3-642-30057-8_31
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2012. 6th International Conference on Information Theoretic Security, ICITS 2012 Montreal, QC, Canada, August 15-17, 2012 Proceedings. Ed.: A. Smith, 111–128, Springer Verlag. doi:10.1007/978-3-642-32284-6_7
Bücher
Trust and Trustworthy Computing: 5th international conference, TRUST 2012, Vienna, Austria, June 13 - 15, 2012, proceedings.
Katzenbeisser, S.; Weippl, E.; Camp, J.; Volkamer, M.; Reiter, M.; Zhang, X.
2012. Springer Verlag. doi:10.1007/978-3-642-30921-2
Recht ex machina – Formalisierung des Rechts im Internet der Dienste.
Raabe, O.; Wacker, R.; Oberle, D.; Baumann, C.; Funk, C.
2012. Springer Verlag
Zeitschriftenaufsätze
Usable Secure Email Communications - Criteria and evaluation of existing approaches.
Moecke, C. T.; Volkamer, M.
2012. Information and computer security, 21 (1), 41–52. doi:10.1108/09685221311314419
Legal Aspects of Service Robotics.
Spiecker genannt Döhmann, I.; Dreier, T.
2012. Poiesis & praxis, 9 (3/4), 201–217. doi:10.1007/s10202-012-0115-4
Engineering Compliant Services: Advising Developers by Automating Legal Reasoning.
Raabe, O.; Oberle, D.; Drefs, F.; Wacker, R.; Baumann, C.
2012. Script-ed, 9 (3), 280–313. doi:10.2966/scrip.090312.280
Model generation for quantified formulas with application to test data generation.
Gladisch, C. D.
2012. International journal on software tools for technology transfer, 14 (4), 439–459. doi:10.1007/s10009-012-0227-0
Der Verwaltungsprozess und das erste deutsche Mediationsgesetz - Streit über den Weg der Streitschlichtung.
Eisenbarth, M.; Döhmann, I. S. genannt.
2012. Deutsches Verwaltungsblatt, 127 (16), 993–999
Oblivious Transfer Based on the McEliece Assumptions.
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
2012. IEICE transactions / E / A, E95.A (2), 567–575
A CCA2 Secure Variant of the McEliece Cryptosystem.
Döttling, N.; Dowsley, R.; Jörn Müller-Quade; Anderson C. A. Nascimento.
2012. IEEE transactions on information theory, 58 (10), 6672–6680. doi:10.1109/TIT.2012.2203582
Schutz der Forschungsfreiheit nach dem Informationsfreiheitsgesetz (IFG).
Bretthauer, S.
2012. Neue Zeitschrift für Verwaltungsrecht, 2012 (18), 1144–1148
Intelligente Videoüberwachung – Schreckensszenario oder Gewinn für den Datenschutz?.
Bier, C.; Döhmann, I. S. genannt.
2012. Computer und Recht, 28 (9), 610–619. doi:10.9785/ovs-cr-2012-610.
Eine formale Semantik für die Java Modeling Language.
Bruns, D.
2012. Informatik-Spektrum, 35 (1), 45–49. doi:10.1007/s00287-011-0532-0
2011
Buchaufsätze
Online- und Offline-Nutzung von Daten: Einige Überlegungen zum Umgang mit Informationen im Internetzeitalter.
Spiecker genannt Döhmann, I.
2011. Internet – Überholt die Wirklichkeit das Recht? Nürnberg, 07.10. – 09.10.2010, 39–54, Schmidt
Teil-Verfassungordnung Datenschutz.
Spiecker genannt Döhmann, I.
2011. Der Eigenwert des Verfassungsrechts. Hrsg.: St. Korioth, 278–304, Mohr Siebeck
Prozessbezogener Datenschutz im Smart Grid.
Raabe, O.
2011. Sicherheit und Datenschutz bei Smart Energy. Hrsg.: H. Thielmann; D. Klumpp; J. Eberspächer, 42 ff, Münchner Kreis
Proceedingsbeiträge
Feasibility Analysis of Pret a Voter for German Federal Elections.
Demirel, D.; Henning, M.; Ryan, P. Y. A.; Schneider, S.; Volkamer, M.
2011. E-Voting and identity: third international conference, VoteID 2011, Tallinn, Estonia, 28-30 September 2011, 158–173, Springer Verlag. doi:10.1007/978-3-642-32747-6_10
Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements.
Frankland, R.; Demirel, D.; Budurushi, J.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE), 2011, Trento, Italy, 29 th August 2011, 37–46, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045914
Vote casting device with VV-SV-PAT for elections with complicated ballot papers.
Volkamer, M.; Budurushi, J.; Demirel, D.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE 2011) : Trento, Italy, 29th August, 2011, 1–8, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045910
Introducing Verifiability in the POLYAS Remote Electronic Voting System.
Olembo, M.; Schmidt, P.; Volkamer, M.
2011. AReS 2011 : The Sixth International Conference on Availability, Reliability and Security, Vienna University of Technology, Austria, August 22nd - 26th, 2011, 127–134, IEEE Computer Society. doi:10.1109/ARES.2011.26
Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting System.
Karayumak, F.; Olembo, M.; Kauer, M.; Volkamer, M.
2011. EVT/WOTE ’11 : 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, San Francisco, CA, August 8 - 9, 2011, 16 S., Advanced Computing Systems Association (USENIX)
User Study of the Improved Helios Voting System Interface.
Karayumak, F.; Kauer, M.; Olembo, M.; Volk, T.; Volkamer, M.
2011. 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011) : Milan, Italy, 8th September 2011. Ed.: Giampaolo Bella ..., 37–44, IEEEXplore. doi:10.1109/STAST.2011.6059254
Robust Electronic Voting: Introducing robustness in Civitas.
Shirazi, F.; Neumann, S.; Ciolacu, I.; Volkamer, M.
2011. International Workshop on Requirements Engineering for Electronic Voting Systems, REVOTE 2011 - In Conjunction with the 19th IEEE International Requirements Engineering Conference 2011, RE 2011, Trento, Italy, 29th August 2011, 47–55, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/REVOTE.2011.6045915
Measures to Establish Trust in Internet Voting.
Volkamer, M.; Spycher, O.; Dubuis, E.
2011. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 1–10, Association for Computing Machinery (ACM). doi:10.1145/2072069.2072071
Voting software to support election preparation, counting, and tallying.
Demirel, D.; Frankland, R.; Popovic, D.; Volkamer, M.
2011. International Conference for E-Democracy and Open Government (CeDEM), 5. - 6. May, Krems, Österreich. Ed.: Peter Parycek, Manuel J. Kripp, Noella Edelmann, 287–300, Edition Donau-Universität
A Formal Approach Towards Measuring Trust in Distributed Systems.
Schryen, G.; Volkamer, M.; Habib, S. M.; Ries, S.
2011. 26th Annual ACM Symposium on Applied Computing, SAC 2011, TaiChung, Taiwan, 21st - 24th March 2011, 1739–1745, Association for Computing Machinery (ACM). doi:10.1145/1982185.1982548
Die Vermessung der Welt als Problem des Datenschutzrechts – zum Umgang mit Geodaten im Internet.
Spiecker genannt Döhmann, I.
2011. Perspektiven des deutschen, polnischen und europäischen Informationsrechts : Ergebnisse einer deutsch-polnischen Alexander von Humboldt-Institutspartnerschaft, 91–109, V&R unipress
Die Nutzung elektronischer Medien: REACh-Datenbanken, Veröffentlichung von Genehmigungsverfahren im Internet und Geodaten-Vermittlung wie Google Maps.
Spiecker genannt Döhmann, I.
2011. Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz, 26. Trierer Kolloquium zum Umwelt- und Technikrecht vom 5. bis 7. September 2010. Hrsg.: R. Hendler, 155–186, Schmidt
Sicherheit in der Informationstechnik-Verantwortungsteilung zwischen Nutzern, Wirtschaft und Staat.
Schallbruch, M.; Micklitz, S.; Kurz, C.; Steels, L.; Broy, M.; Dolev, D.; Weßel, C.; Meyer, K.; Zwingenberger, F.; Donges, M.; others.
2011. Informatik 2011: Informatik schafft Communities, Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 4. - 7.10.2011 in Berlin, 39, Ges. für Informatik
Verlässliche Software fur kritische Infrastrukturen - Preface.
Beckert, B.; Snelting, G.
2011. INFORMATIK 2011 Informatik schafft Communities – Beiträge der 41. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Berlin, Germany, 4. - 7.10.2011. Ed.: H.-U. Heiß Hrsg.: Hans-Ulrich Heiß; Peter Pepper; Holger Schlingloff; Jörg Schneider, 347, Ges. für Informatik
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions.
Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings, 364–381, Springer Verlag. doi:10.1007/978-3-642-19571-6_22
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 8th Theory of Cryptography Conference, TCC 2011. Extended full version in the IACR ePrint Archive, 164–181, Springer Verlag
Short Signatures from Weaker Assumptions.
Hofheinz, D.; Jager, T.; Kiltz, E.
2011. Advances in Cryptology - ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security Seoul, South Korea, December 4-8, 2011., 647–666, Springer Verlag. doi:10.1007/978-3-642-25385-0_35
Efficient Reductions for Non-Signaling Cryptographic Primitives.
Döttling, N.; Kraschewski, D.; Müller-Quade, J.
2011. 5th International Conference on Information Theoretic Security, ICITS 2011; Amsterdam; Netherlands; 21 May 2011 through 24 May 2011. Ed.: S. Fehr, 120–137, Springer Verlag. doi:10.1007/978-3-642-20728-0_12
The 1st Verified Software Competition: Experience Report.
Klebanov, V.; Müller, P.; Shankar, N.; Leavens, G. T.; Wüstholz, V.; Alkassar, E.; Arthan, R.; Bronish, D.; Chapman, R.; Cohen, E.
2011. FM 2011: Formal Methods 17th International Symposium on Formal Methods Limerick, Ireland, June 20-24, 2011 Proceedings. Ed.: M. Butler, 154–168, Springer Verlag. doi:10.1007/978-3-642-21437-0_14
Information flow analysis via path condition refinement.
Taghdiri, M.; Snelting, G.; Sinz, C.
2011. Formal Aspects of Security and Trust 7th InternationalWorkshop, FAST 2010 Pisa, Italy, September 16-17, 2010. Ed.: P. Degano Revised Selected Papers, 65–79, Springer Verlag
User behavior prediction for energy management in smart homes.
Bao, K.; Allerding, F.; Schmeck, H.
2011. Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011, Jointly with the 2011 7th International Conference on Natural Computation, ICNC’11; Shanghai; China; 26 July 2011 through 28 July 201, 1335–1339, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/FSKD.2011.6019758
Organic smart Home - Architecture for Energy Management in Intelligent Buildings.
Allerding, F.; Schmeck, H.
2011. Workshop Organic Computing as part of ICAC, June 14-18, 2011, Karlsruhe, 67–76, Association for Computing Machinery (ACM). doi:10.1145/1998642.1998654
Zeitschriftenaufsätze
Vertrauensbildung bei Internetwahlen.
Dubuis, E.; Spycher, O.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (3), 126–129
Gebrauchstaugliche Informationssicherheit.
Fischer-Hübner, S.; Grimm, R.; Lo Iacono, L.; Möller, S.; Müller, G.; Volkamer, M.
2011. Die Zeitschrift für Informationssicherheit - Usable Security and Privacy, 14
Gebrauchstaugliche Nutzerauthentifizierung.
Lo Iocano, L.; Kauer, M.; Volkamer, M.
2011. Digma - Zeitschrift für Datenrecht und Informationssicherheit, 11 (4), 172–175
Bonsai Trees, or How to Delegate a Lattice Basis.
Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C.
2011. Journal of cryptology, 25 (4), 601–639. doi:10.1007/s00145-011-9105-2
Die Entscheidung des Bundesverwaltungsgerichts vom 09.06.2010 -– Datei Gewalttäter Sport.
Spiecker genannt Döhmann, I.; Kehr, T.
2011. Deutsches Verwaltungsblatt, 15, 930–936
Harmonisierung konträrer Kommunikationsmodelle im Datenschutzkonzept des EnWG – Stern trifft Kette.
Raabe, O.; Lorenz, M.; Pallas, F.; Weis, E.
2011. Computer und Recht, 27 (12), 831–840. doi:10.9785/ovs-cr-2011-831
KASTEL - An Application-Driven Center of Excellence for IT Security.
Müller-Quade, J.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions.
Döttling, N.; Mie, T.; Jörn Müller-Quade; Nilges, T.
2011. IACR Cryptology ePrint Archive, 2011, 1–32
Kommunikation als Herausforderung: Neue Wege im Datenschutz sozialer Netzwerke.
Spiecker Döhmann, I.
2011. Anwaltsblatt, 61 (4), 256–259
Software Security in Virtualized Infrastructures - The Smart Meter Example.
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Advanced chopping of sequential and concurrent programs.
Giffhorn, D.
2011. Software Quality Journal, 19 (2), 239–294. doi:10.1007/s11219-010-9114-7
Service robotics: do you know your new companion? Framing an interdisciplinary technology assessment.
Decker, M.; Dillmann, R.; Dreier, T.; Fischer, M.; Gutmann, M.; Ott, I.; Spiecker gen. Döhmann, I.
2011. Poiesis & praxis, 8 (1), 25–44. doi:10.1007/s10202-011-0098-6
2010
Buchaufsätze
Electronic Voting in Germany.
Volkamer, M.
2010. Data Protection in a Profiled World. Eds.: Serge GutwirthYves PoulletPaul De Hert, 177–190, Springer Netherlands
Proceedingsbeiträge
Verifizierbarkeit und Öffentlichkeitsgrundsatz bei elektronischen Wahlen.
Richter, P.; Langer, L.; Hupf, K.; Volkamer, M.; Buchmann, J.
2010. Globale Sicherheit und proaktiver Staat - die Rolle der Rechtsinformatik : 13. Internationales Rechtsinformatik Symposion (IRIS), Salzburg, 25. bis 27. Februar 2010. Hrsg.: E. Schweighofer, 61–66, Österreichische Computer Gesellschaft
An Evaluation and Certification Approach to Enable Voting Service Providers.
Schmidt, A.; Volkamer, M.; Buchmann, J.
2010. Electronic voting 2010 : 4th International Conference, co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 135–148, Gesellschaft für Informatik (GI)
A Formal IT-Security Model for the Correction and Abort Requirement of Electronic Voting.
Grimm, R.; Hupf, K.; Volkamer, M.
2010. Electronic voting 2010 (EVOTE2010) : 4th international conference, July 21st - 24th, 2010 in Castle Hofen, Bregenz, Austria. Eds.: Robert Krimmer, Rüdiger Grimm, 89–107, Gesellschaft für Informatik (GI)
Verifiability in Electronic Voting - Explanations for Non Security Experts.
Gharadaghy, R.; Volkamer, M.
2010. Electronic Voting 2010 (EVOTE2010), 4th international conference co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, Bregenz, A, July 21-24, 2010, 151–162, Gesellschaft für Informatik (GI)
Measuring eTrust in distributed systems - General Concept and Application to Internet Voting.
Schryen, G.; Volkamer, M.
2010. 23rd Bled eConference - eTrust: Implications for the Individual, Enterprises and Society, Bled, Slovenia, 20th - 23rd June 2010. Eds.: M. G. A. Plomp, R. C. M .Van Rooij, R. S. Batenburg, 80–90
A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept.
Langer, L.; Volkamer, M.; Schmidt, A.; Buchmann, J.
2010. International Conference on Availability, Reliability and Security (ARES), 475–480, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/ARES.2010.106
Speeding up context-, object- and field-sensitive SDG generation.
Graf, J.
2010. 10th IEEE International Working Conference on Source Code Analysis and Manipulation, Timisoara, Romania , September 12-13, 2010. Ed.: J. Vinju, 105–114, Institute of Electrical and Electronics Engineers (IEEE)
Proving Information Flow Noninterference by Reusing a Machine-Checked Correctness Proof for Slicing.
Wasserrab, D.; Lohner, D.
2010. 6th International Verification Workshop - VERIFY-2010, Edinburgh, July 20-21, 2010
Experiences with PDG-based IFC.
Hammer, C.
2010. Engineering secure software and systems - second international symposium, ESSoS 2010, Pisa, Italy, February 3 - 4, 2010. Proceedings. Ed.: F. Massacci, 44–60, Springer Verlag
Gateway Decompositions for Constrained Reachability Problems.
Katz, B.; Krug, M.; Lochbihler, A.; Rutter, I.; Snelting, G.; Wagner, D.
2010. Experimental Algorithms - 9th International Symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings. Ed.: P. Festa, 449–461, Springer Verlag
Zeitschriftenaufsätze
Evaluierungsverfahren für Internetwahlsysteme.
Volkamer, M.
2010. Information technology, 52 (3), 169–172. doi:10.1524/itit.2010.0587
Information Flow Noninterference via Slicing.
Wasserrab, D.
2010. The Archive of Formal Proofs, (3), 44 S
2009
Buchaufsätze
Developing a Legal Framework for Remote Electronic Voting.
Schmidt, A.; Heinson, D.; Langer, L.; Opitz-Talidou, Z.; Richter, P.; Volkamer, M.; Buchmann, J.
2009. E-Voting and Identity. Hrsg.: P. Y. A. Ryan, 92–105, Springer Verlag. doi:10.1007/978-3-642-04135-8_6
Proceedingsbeiträge
Towards Long-Term Free and Secret Electronic Elections Providing Voter-Verifiability in the Bulletin Board Model.
Langer, L.; Weber, S.; Schmidt, A.; Buchmann, J.; Volkamer, M.
2009. International Conference on Theory and Practice of Electronic Governance (ICEGOV), 203–210, Association for Computing Machinery (ACM). doi:10.1145/1693042.1693084
Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Volkamer, M.; Schryen, G.; Langer, L.; Schmidt, A.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft für Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, 1827–1836, Gesellschaft für Informatik (GI)
Classifying Privacy and Verifiability Requirements for Electronic Voting.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009, Lübeck, 28. September - 2. Oktober 2009. Hrsg.: S. Fischer, Stefan, 1837–1846, Köllen
Towards the impact of the operational environment on the security of e-voting.
Schmidt, A.; Volkamer, M.; Langer, L.; Buchmann, J.
2009. 39th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Im Focus das Leben, INFORMATIK 2009 , Lübeck, 28. September - 2. Oktober 2009.Hrsg.: S. Fischer, 1814–1826, Gesellschaft für Informatik (GI)
Determine the Resilience of Evaluated Internet Voting Systems.
Volkamer, M.; Grimm, R.
2009. 2009 1st International Workshop on Requirements Engineering for E-Voting Systems (Re-Vote’09), Atlanta, GA, August 31, 2009, 47–54, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.2
Evaluation von Internetwahlsystemen.
Volkamer, M.
2009. Ausgezeichnete Informatikdissertationen 2008. Hrsg.: Dorothea Wagner, 301–310, Gesellschaft für Informatik (GI)
Ein PKI-basiertes Protokoll für sichere und praktikable Onlinewahlen.
Langer, L.; Schmidt, A.; Volkamer, M.; Buchmann, J.
2009. Proceedings of EDEM 2009. Tagungsband Elektronische Demokratie in Österreich. Hrsg.: A. Prosser, 243–253, OCG Verlag
Specification of a Voting Service Provider.
Schmidt, A.; Langer, L.; Buchmann, J.; Volkamer, M.
2009. First International Workshop on Requirements Engineering for E-Voting Systems (RE-VOTE), Atlanta, GA, USA, 31 - 31 Aug. 2009, 9–18, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/RE-VOTE.2009.8
Zeitschriftenaufsätze
Verifizierbarkeit elektronischer Wahlen.
Langer, L.; Schmidt, A.; Volkamer, M.
2009. eGovernment Review, 4 (Juli), 20–21
Polynomial runtime in simulatability definitions.
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
2009. Journal of computer security, 17 (5), 703–735. doi:10.3233/JCS-2009-0354
Backing up Slicing : Verifying the Interprocedural Two-Phase Horwitz-Reps-Binkley Slicer.
Wasserrab, D.
2009. The Archive of Formal Proofs, (11), 543 S
On Temporal Path Conditions in Dependence Graphs.
Lochbihler, A.; Snelting, G.
2009. Automated Software Engineering, 16 (2), 263–290
Flow-Sensitive, Context-Sensitive, and Object-sensitive Information Flow Control Based on Program Dependence Graphs.
Hammer, C.; Snelting, G.
2009. International journal of information security, 8 (6), 399–422
2008
Proceedingsbeiträge
Trust Models for Remote Electronic Voting.
Grimm, R.; Volkamer, M.
2008. Electronic Government: 7th Internationall Conference EGOV 2008 Proceedings of ongoing research, project contributions and workshops, Turin, I, September 1-4, 2008. Ed.: E. Ferro, 197–204, Trauner Verlag
Implementierbare Zustandsübergänge eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Grimm, R.; Volkamer, M.
2008. 38th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Beherrschbare Systeme - Dank Informatik, INFORMATIK 2008, München, 8. - 13. September 2008. Hrsg.: H.-G. Hegering, 429–436, Gesellschaft für Informatik (GI)
Entwicklung eines formalen IT-Sicherheitsmodells für Online-Wahlsysteme.
Krimm, R.; Volkamer, M.
2008. Internationales Rechtsinformatik Symposion Universität Salzburg, 21.-23. Februar 2008, 145–156, Boorberg Verlag
Observing Threats to Voters Anonymity: Election Observation of Electronic Voting.
Krimmer, R.; Volkamer, M.
2008. E-Voting - Perspectives and Experiences. Eds.: Jaya Krishna, Naveen Kumar Agarwal, 13 S
Development of a Formal IT-Security Model for Remote Electronic Voting Systems.
Grimm, R.; Volkamer, M.
2008. 3rd International Conference on Electronic Voting 2008, EVOTE 2008, Bregenz, A, 6. - 9. August 2008, 185–196, Gesellschaft für Informatik (GI)
Precise Analysis of Java Programs using JOANA.
Giffhorn, D.; Hammer, C.
2008. Proceedings of the 8th IEEE International Working Conference on Source Code Analysis and Manipulation. Ed.: S. Kawada, 267–268, IEEE Computer Society
2007
Proceedingsbeiträge
Independent Audits of Remote Electronic Voting – Developing a Common Criteria Protection Profile.
Volkamer, M.; Krimmer, R.; Grimm, R.
2007. Elektronische Demokratie in Österreich, proceedings der EDem2007, 27. - 28. September 2007, Wien. Hrsg.: Alexander Prosser, Peter Parycek, 115–126, Österr. Computer-Ges
Requirements and Evaluation Techniques for Online-Voting.
Volkamer, M.; Krimmer, R.
2007. Electronic Government, 6 th International EGOV Conference, proceedings of ongoing research, project contributions and workshops, Regensburg, Germany, September 3-6, 2007. Ed.: Ake Grönlund, 37–46, Universitätsverlag Rudolf Trauner
The Development of Remote E-Voting Around the World: A Review of Roads and Directions.
Krimmer, R.; Triessnig, S.; Volkamer, M.
2007. E-Voting and identity : First International Conference, VOTE-ID 2007, Bochum, Germany, October 4 - 5, 2007, revised selected papers. Eds.: Ammar Alkassar, 1–15, Springer Verlag
Compliance of RIES to the proposed e-voting protection profile.
Jonker, H.; Volkamer, M.
2007. 1st International Conference on E-Voting and Identity, VOTE-ID 2007, Bochum, Germany, 4th - 5th October, 2007, 50–61, Springer Verlag
Requirements and Evaluation Procedures for eVoting.
Volkamer, M.; McGaley, M.
2007. The Second International Conference on Availability, Reliability and Security, 2007, ARES 2007, 10 - 13 April 2007, Vienna, Austria, proceedings., 895–902, IEEE Computer Society. doi:10.1109/ARES.2007.124
Zeitschriftenaufsätze
Zukunft von Online-Wahlen - Aktuelle rechtliche, politische, soziale und technisch-organisatorische Fragen.
Helbach, J.; Krimmer, R.; Meletiadou, A.; Meissner, N.; Volkamer, M.
2007. Datenschutz und Datensicherheit, 31 (6), 434–440
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (I).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (9), 692–695
Zum Nutzen hoher Zertifizierungsstufen nach den Common Criteria (II).
Volkamer, M.; Hauff, H.
2007. Datenschutz und Datensicherheit, 31 (10), 766–768. doi:10.1007/s11623-007-0250-6
2006
Proceedingsbeiträge
New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness.
Volkamer, M.; Vogt, R.
2006. Frontiers in Electronic Elections - FEE ’06
FUSE - ein Internetwahlsystem für zeitlich unbegrenzt geheime Betriebswahlen.
Volkamer, M.; Reinhard, W.; Vogt, R.
2006. Sicherheit 2006: Haupttagung "Sicherheit - Schutz und Zuverlässigkeit" ; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006) ; Workshop "Kryptographie in Theorie und Praxis" ; Konferenzband der 3. Jahrestagung der Gesellschaft für Informatik e.V. (GI) ; Otto-von-Guericke Universität Magdeburg, 20. - 22. Februar 2006 ; [Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)]. Hrsg.: Jana Dittmann, 159–170, Gesellschaft für Informatik (GI)
Online-Wahlen und die Forderung nach zeitlich unbegrenzt geheimen Wahlen.
Volkamer, M.; Krimmer, R.
2006. Internationales Rechtsinformatik Symposion Universität Wien, 16.-18. Februar 2006, 12 S
Overview Online-Wahlen.
Volkamer, M.; Krimmer, R.
2006. D-A-CH Security 2006, Bestandsaufnahme, Konzepte, Anwendungen, Perspektive. Hrsg.: Horster, Patrick, 339–350, syssec
Information Flow Analysis Based Security Checking of Health Service Composition Plans.
Hutter, D.; Klusch, M.; Volkamer, M.
2006. European Conference on eHealth 2006 : proceedings of the ECEH’06; Fribourg, Switzerland, October 12-13, 2006. Eds.: H. Stormer, 59–70, Ges. für Informatik
Information Flow Control to Secure Dynamic Web Service Composition.
Hutter, D.; Volkamer, M.
2006. Security in Pervasive Computing. Hrsg.: Clark, John; Paige, Richard; Polack, Fiona; Brooke, Phillip, 196–210, Springer Verlag. doi:10.1007/11734666_15
Ver-/Misstrauen Schaffende Maßnahme beim e-Voting.
Volkamer, M.; Krimmer, R.
2006. 36th Jahrestagung der Gesellschaft fur Informatik e.V. (GI): Informatik fur Menschen, INFORMATIK 2006, 36th Annual Conference of the German Informatics Society (GI). Ed.: Christian Hochberger, Rüdiger Liskowsky, 418–425, Gesellschaft für Informatik (GI)
Enabling the Application of Open Systems like PCs for Online Voting.
Volkamer, M.; Alkassar, A.; Sadeghi, A.-R.; Schulz, S.
2006. Frontiers in Electronic Elections
Security Requirements for Non-political Internet Voting.
Grimm, R.; Krimmer, R.; Meißner, N.; Reinhard, K.; Volkamer, M.; Weinand, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 203–212, Gesellschaft für Informatik (GI)
Multiple Cast in Online Voting - Analyzing Chances.
Grimm, R.; Volkamer, M.
2006. Electronic Voting 2006: 2nd International Workshop Co-organized by Council of Europe, ESF TED, IFIP WG 8.5 and E-Voting.CC August, 2nd–4th, 2006 in Castle Hofen, Bregenz, Austria. Ed.: Robert Krimmer, 97–106, Ges. für Informatik
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols.
Volkamer, M.; Krimmer, R.
2006. The First International Conference on Availability, Reliability and Security, 2006 : ARES 2006, Vienna, Austria, 20 - 22 April 2006, 340–347, Institute of Electrical and Electronics Engineers (IEEE)
Zeitschriftenaufsätze
Die Online-Wahl auf dem Weg zum Durchbruch.
Volkamer, M.; Krimmer, R.
2006. Informatik-Spektrum, 29 (2), 98–113. doi:10.1007/s00287-006-0064-1
2005
Proceedingsbeiträge
Bits or Paper? Comparing Remote Electronic Voting to Postal Voting.
Krimmer, R.; Volkamer, M.
2005. Electronic government : workshop and poster proceedings of the Fourth International EGOV Conference 2005, August 22 - 26, 2005, Copenhagen, Denmark. Ed.: Kim V. Andersen, 225–232, Univ.-Verl. Trauner
Wählen auf Distanz: Ein Vergleich zwischen elektronischen und nicht elektronischen Verfahren.
Krimmer, R.; Volkamer, M.
2005. Effizienz von e-Lösungen in Staat und Gesellschaft : aktuelle Fragen der Rechtsinformatik ; Tagungsband des 8. Internationalen Rechtsinformatik-Symposions / hrsg. von Erich Schweighofer... Hrsg.: Erich Schweighöfer, Doris Liebwald, Silvia Augeneder, Thomas Menzel, 256–262, Boorberg
Zeitschriftenaufsätze
Online-Wahlen für Gremien – Wahlen in Gremien als Einsatzgebiet für Wahlen ohne vertrauenswürdige Instanz.
Alkassar, A.; Krimmer, R.; Volkamer, M.
2005. Datenschutz und Datensicherheit, 8, 480–482
2004
Proceedingsbeiträge
From Legal Principles to an Internet Voting System.
Volkamer, M.; Hutter, D.
2004. Electronic voting in Europe - technology, law, politics and society workshop of the ESF TED Programme together with GI and OCG, July 7th - 9th, 2004 in Schloss Hofen/Bregrenz, Lake of Constance, Austria. Eds.: Alexander Prosser, Robert Krimmer, Robert, 111–120, Gesellschaft für Informatik (GI)