Cybersicherheit: Wissenschaftliche Publikationen

JahrTitel/AutorDokumentart
201828. SmartCard Workshop 2018. Tagungsband: 21. und 22. Februar 2018, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
2018Emerging and unconventional: New attacks and innovative detection techniques. Editorial
Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Zander, Sebastian
Zeitschriftenaufsatz
2018The EU general data protection regulation and its effects on designing assistive environments
Krempel, Erik; Beyerer, Jürgen
Konferenzbeitrag
201727. SIT-SmartCard Workshop 2017: 15. und 16. Februar 2017, Darmstadt
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
2017Ambient Intelligence. 13th European Conference, AmI 2017: Malaga, Spain, April 26-28, 2017, Proceedings
Braun, Andreas (Ed.); Wichert, Reiner (Ed.); Gomez, Antonio Maña (Ed.)
Tagungsband
2017Automated detection of instruction cache leaks in modular exponentiation software
Zankl, A.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2017ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications
Santis, F. de; Schauer, A.; Sigl, G.
Konferenzbeitrag
2017The cloud4health Project. Secondary use of clinical data with secure cloud-based text mining services
Fluck, Juliane; Senger, Philipp; Ziegler, Wolfgang; Claus, Steffen; Schwichtenberg, Horst
Aufsatz in Buch
2017Cybersicherheit beyond 2020!: Herausforderungen für die IT-Sicherheitsforschung
Eckert, C.
Zeitschriftenaufsatz
2017Data residency challenges and opportunities for standardization
Abramson, Mike; Arbuckle, Brian; Baudoin, Claude; Dani, Jayant; DiPaula-Coyle, Michael; Gawade, Preetam; Gharote, Mangesh; Harris, David; Iyengar, Sridhar; Jung, Christian; Kumar Nutheti, Kiran; O'Neill, Dennis; Scaduto, Justin; Schalk, Karolyn; Schwarz, Reinhard; Stavros, Nick; Tessier, Denise; Tumashov, Alex; Wales, Char
Bericht
2017Datenpotenziale sicher nutzen
Reis, Claudia; Jung, Christian; Ochs, Michael A.
Zeitschriftenaufsatz
2017Digital watermarking for verification of perception-based integrity of audio data
Zmudzinski, Sascha; Waidner, Michael; Steinebach, Martin
Dissertation
2017Hiding secrecy leakage in leaky helper data
Hiller, M.; Önalan, A.G.
Konferenzbeitrag
2017Internet-wide study of DNS cache injections
Klein, A.; Shulman, H.; Waidner, M.
Konferenzbeitrag
2017Introducing remote attestation and hardware-based cryptography to OPC UA
Birnstill, Pascal; Haas, Christian; Hassler, D.; Beyerer, Jürgen
Konferenzbeitrag
2017Mythos Blockchain: Herausforderungen für den Öffentlichen Sektor
Welzel, Christian; Eckert, Klaus-Peter; Kirstein, Fabian; Jacumeit, Volker
Bericht
2017Offline Mode for Corporate Mobile Client Security Architecture
Galibus, T.; Vieira, T.P.D.; Freitas, E.P. de; Albuquerque, R.D.; Costa, J.P.C.L. da; Sousa, R.T. de; Krasnoproshin, V.; Zaleski, A.; Vissia, H.E.R.M.; Galdo, G. del
Zeitschriftenaufsatz
2017One key to sign them all considered vulnerable: Evaluation of DNSSEC in the internet
Shulman, Haya; Waidner, Michael
Konferenzbeitrag
2017Positionspapier: Cybersicherheit in Deutschland
Waidner, Michael; Backes, Michael; Müller-Quade, Jörn; Waidner, Michael
Bericht
2017Preemptive: An integrated approach to intrusion detection and prevention in industrial control systems
Miciolino, E.E.; Noto, D. di; Griscioli, F.; Pizzonia, M.; Kippe, Jörg; Pfrang, Steffen; Clotet, X.; Leon, G.; Kassim, F.B.; Lund, D.; Costante, E.
Zeitschriftenaufsatz
2017Ratgeber für eine sichere zentrale Softwareverteilung
Herfert, Michael; Kunz, Thomas; Wolf, Ruben; Waidner, Michael
Buch
2017Securing FPGA SoC configurations independent of their manufacturers
Jacob, N.; Wittmann, J.; Heyszl, J.; Hesselbarth, R.; Wilde, F.; Pehl, M.; Sigl, G.; Fischer, K.
Konferenzbeitrag
2017Squeezing polynomial masking in tower fields. A higher-order masked AES S-box
Santis, F. de; Bauer, T.; Sigl, G.
Konferenzbeitrag
2017Systematic pattern approach for safety and security co-engineering in the automotive domain
Amorim, Tiago Luiz Buarque de; Martin, Helmut; Ma, Zhendong; Schmittner, Christoph; Schneider, Daniel; Macher, Georg; Winkler, Bernhard; Krammer, Martin; Kreiner, Christian
Konferenzbeitrag
2017Towards Dependability Engineering of Cooperative Automotive Cyber-Physical Systems
Macher, Georg; Armengaud, Eric; Schneider, Daniel; Brenner, Eugen; Kreiner, Christian
Konferenzbeitrag
2017Towards side-channel secure firmware updates: A minimalist anomaly detection approach
Guillen, O.M.; Santis, F. de; Brederlow, R.; Sigl, G.
Konferenzbeitrag
2017Towards trace-driven cache attacks on Systems-on-Chips - exploiting bus communication
Sepulveda, J.; Gross, M.; Zankl, A.; Sigl, G.
Konferenzbeitrag
2017Using echo state networks for cryptography
Ramamurthy, Rajkumar; Bauckhage, Christian; Buza, Krisztian; Wrobel, Stefan
Konferenzbeitrag
2017Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Immler, V.; Hiller, M.; Liu, Q.; Lenz, A.; Wachter-Zeh, A.
Konferenzbeitrag
2017Die Volksverschlüsselung: Förderung vertrauenswürdiger Ende-zu-Ende-Verschlüsselung durch benutzerfreundliches Schlüssel- und Zertifikatsmanagement
Spychalski, Dominik; Eckstein, Levona; Herfert, Michael; Trick, Daniel; Rubinstein, Tatjana
Konferenzbeitrag
2017Your rails cannot hide from localized EM: How dual-rail logic fails on FPGAs
Immler, V.; Specht, R.; Unterstein, F.
Konferenzbeitrag
201626. SIT-SmartCard Workshop 2016: Darmstadt, 17. und 18. Februar 2016
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
2016Analysing cyber-physical attacks to a Smart Grid: A voltage control use case
Langer, L.; Smith, P.; Hutle, M.; Schaeffer-Filho, A.
Konferenzbeitrag
2016Analyzing the Spanish strip cipher by combining combinatorial and statistical methods
Sanguino, L.A.B.; Leander, G.; Paar, C.; Esslinger, B.; Niebel, I.
Zeitschriftenaufsatz
2016Authentication and searchable symmetric encryption for cloud-based storage of geospatial data
Hiemenz, Benedikt; Kuijper, Arjan (1. Gutachten); Krämer, Michel (Betreuer)
Master Thesis
2016CoKey: Fast token-based cooperative cryptography
Horsch, J.; Wessel, S.; Eckert, C.
Konferenzbeitrag
2016CREDENTIAL: A framework for privacy-preserving cloud-based data sharing
Hörandner, Felix; Krenn, Stephan; Migliavacca, Andrea; Thiemer, Florian; Zwattendorfer, Bernd
Konferenzbeitrag
2016Datennutzungskontrolle mit IND2UCE
Jung, Christian; Feth, Denis
Aufsatz in Buch
2016Developers are not the enemy!: The need for usable security APIs
Green, M.; Smith, M.
Zeitschriftenaufsatz
2016How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire: Presentation held at Dev Con 2016, 12th October 2016, Plymouth
Huber, Stephan; Rasthofer, Siegfried
Vortrag
2016International Conference on Cyberworlds, CW 2016. Proceedings: 28-30 September 2016, Chongqing, China
Sourin, Alexei (Ed.)
Tagungsband
2016Jumping through hoops: Why do Java developers struggle with cryptography APIs?
Nadi, S.; Krüger, S.; Mezini, M.; Bodden, E.
Konferenzbeitrag
2016Laientaugliche Schlüsselgenerierung für die End-zu-End-Verschlüsselung
Herfert, Michael; Selzer, Annika; Waldmann, Ulrich
Zeitschriftenaufsatz
2016Obfuscation combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Konferenzbeitrag
2016Obfuscation Combiners
Fischlin, Marc; Herzberg, Amir; Bin Noon, Hod; Shulman, Haya
Zeitschriftenaufsatz
2016Online reliability testing for PUF key derivation
Hiller, M.; Önalan, A.G.; Sigl, G.; Bossert, M.
Konferenzbeitrag
2016Policy-based implicit attestation for microkernel-based virtualized systems
Wagner, S.; Eckert, C.
Konferenzbeitrag
2016Practical aspects of quantization and tamper-sensitivity for physically obfuscated keys
Immler, V.; Hennig, M.; Kürzinger, L.; Sigl, G.
Konferenzbeitrag
2016A privacy-friendly method to reward participants of online-surveys
Herfert, Michael; Lange, Benjamin; Selzer, Annika; Waldmann, Ulrich
Konferenzbeitrag
2016PrivacyInsight: The next generation privacy dashboard
Bier, Christoph; Kühne, K.; Beyerer, Jürgen
Konferenzbeitrag
2016Risks of Industrie 4.0 - an information technology perspective
Usländer, Thomas; Thomalla, Christoph
Abstract
2016Simple photonic emission attack with reduced data complexity
Carmon, E.; Seifert, J.-P.; Wool, A.
Konferenzbeitrag
2016Towards efficient evaluation of a time-driven cache attack on modern processors
Zankl, A.; Miller, K.; Heyszl, J.; Sigl, G.
Konferenzbeitrag
2016Towards measuring the linkage risk in information flows
Bier, Christoph; Beyerer, Jürgen
Konferenzbeitrag
2016Verwundbarkeitsprüfungen mit Shodan
Simon, Kai; Moucha, Cornelius
Zeitschriftenaufsatz
2016Working and living in interactive environments - requirements for security and privacy
Krempel, Erik; Birnstill, Pascal; Beyerer, Jürgen
Konferenzbeitrag
2016X25519 hardware implementation for low-latency applications
Koppermann, P.; Santis, F. de; Heyszl, J.; Sigl, G.
Konferenzbeitrag
201525. SmartCard Workshop 2015. Tagungsband: Darmstadt, 4./5. Februar 2015
Waldmann, U. ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
20156doku: Towards secure over-the-air preloading of 6LoWPAN nodes using PHY key generation
Krentz, K.-F.; Wunder, G.
Konferenzbeitrag
2015Ambient Intelligence from Senior Citizens' Perspectives: Understanding Privacy Concerns, Technology Acceptance, and Expectations
Kirchbuchner, Florian; Große-Puppendahl, Tobias; Hastall, Matthias R.; Distler, Martin; Kuijper, Arjan
Konferenzbeitrag
2015Cipher-suite negotiation for DNSSEC: Hop-by-hop or end-to-end?
Herzberg, Amir; Shulman, Haya
Zeitschriftenaufsatz
2015Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Heyszl, J.; Rabe, D.; Sigl, G.
Zeitschriftenaufsatz
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Zeitschriftenaufsatz
2015Datensicherheit neu interpretieren. Das "Datengold" und Geschäftsmodelle
Jung, Christian; Kalmar, Ralf
Bericht
2015International Conference on Cyberworlds, CW 2015. Proceedings: 7 - 9 October 2015, Visby, Sweden
Sourin, Alexei ; Institute of Electrical and Electronics Engineers -IEEE-; Association for Computing Machinery -ACM-, Special Interest Group on Computer Graphics and Interactive Techniques -SIGGRAPH-; International Federation for Information Processing -IFIP-
Tagungsband
2015Low-area reed decoding in a generalized concatenated code construction for PUFs
Hiller, M.; Kürzinger, L.; Sigl, G.; Müelich, S.; Puchinger, S.; Bossert, M.
Konferenzbeitrag
2015A new definition and classification of physical unclonable functions
Plaga, R.; Merli, D.
Konferenzbeitrag
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Zeitschriftenaufsatz
2015New interpretation of data security. Treasure trove of date and business models
Jung, Christian; Kalmar, Ralf
Bericht
2015Security overlay for distributed encrypted containers
Patzer, F.; Jakoby, A.; Kresken, Thomas; Müller, Wilmuth
Konferenzbeitrag
2015Smart grid cybersecurity risk assessment: Experiences with the SGIS toolbox
Langer, L.; Smith, P.; Hutle, M.
Konferenzbeitrag
2015SoK: Secure messaging
Unger, N.; Dechand, S.; Bonneau, J.; Fahl, S.; Perl, H.; Goldberg, I.; Smith, M.
Konferenzbeitrag
2015Towards secure integration of cryptographic software
Arzt, Steven; Nadi, S.; Ali, Karim; Bodden, Eric; Erdweg, S.; Mezini, Mira
Konferenzbeitrag
201424. SmartCard Workshop 2014. Tagungsband: Darmstadt, 5./6. Februar 2014
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
2014Ambient Assisted Living. 6. AAL-Kongress 2013: Berlin, Germany, January 22. - 23. 2013
Wichert, Reiner (Ed.); Klausing, Helmut (Ed.) ; Verband der Elektrotechnik, Elektronik, Informationstechnik -VDE-
Tagungsband
2014Automatic data protection certificates for cloud-services based on secure logging
Kunz, Thomas; Selzer, Annika; Waldmann, Ulrich
Aufsatz in Buch
2014Biometrie: Technik, Mythen, Praxisbeispiele: Die Gesellschaft muss intensive Diskussionen führen
Nouak, Alexander
Zeitschriftenaufsatz
2014Closing the gap between speed and configurability of multi-bit fault emulation environments for security and safety-critical designs
Nyberg, R.; Nolles, J.; Heyszl, J.; Rabe, D.; Sigl, G.
Konferenzbeitrag
2014Clustering algorithms for non-profiled single-execution attacks on exponentiations
Heyszl, J.; Ibing, A.; Mangard, S.; Santis, F. de; Sigl, G.
Konferenzbeitrag
2014DNSSEC for cyber forensics
Shulman, Haya; Waidner, Michael
Zeitschriftenaufsatz
2014Don't push it: Breaking iButton security
Brandt, C.; Kasper, M.
Konferenzbeitrag
2014Early propagation and imbalanced routing, how to diminish in FPGAs
Moradi, A.; Immler, V.
Konferenzbeitrag
2014Fragmentation considered leaking: Port inference for DNS poisoning
Shulman, Haya; Waidner, Michael
Konferenzbeitrag
2014Guiding a general-purpose C verifier to prove cryptographic protocols
Dupressoir, François; Gordon, Andrew D.; Jürjens, Jan; Naumann, David A.
Zeitschriftenaufsatz
2014Hashing of RDF graphs and a solution to the blank node problem
Höfig, Edzard; Schieferdecker, Ina
Konferenzbeitrag
2014Increasing the efficiency of syndrome coding for PUFs with helper data compression
Hiller, Matthias; Sigl, Georg
Konferenzbeitrag
2014Key2Share for authentication services
Busold, Christoph; Dmitrienko, Alexandra; Wachsmann, Christian
Konferenzbeitrag
2014On the measurement of data protection compliance for cloud services
Kunz, Thomas; Selzer, Annika; Waldmann, Ulrich
Konferenzbeitrag
2014Physical security primitives: A survey on physically unclonable functions and PUF-based security solutions
Sadeghi, A.-R.; Schulz, S.; Wachsmann, C.
Aufsatz in Buch
2014Privacy preserved duplicate check using multi-biometric fusion
Butt, Moazzam; Damer, Naser; Rathgeb, Christian
Konferenzbeitrag
2014Protecting sensitive law enforcement agencies data - data security in the cloud
Jakoby, A.; Müller, Wilmuth; Vagts, H.
Konferenzbeitrag
2014Realisierung von vertrauenswürdigem Cloud-Computing mit SkIDentity: Der Anwendungsfall in Wertschöpfungsketten der Automobilindustrie
Flach, Guntram; Kubach, Michael; Özmü, Eray; Wehrenberg, Immo
Konferenzbeitrag
2014Robust hashing for 3D models
Berchtold, W.; Schäfer, M.; Rettig, M.; Steinebach, M.
Konferenzbeitrag
2014The role of photons in cryptanalysis
Kramer, J.; Kasper, M.; Seifert, J.-P.
Konferenzbeitrag
2014Security in the cloud
Jakoby, Andreas; Müller, Wilmuth; Vagts, Hauke
Zeitschriftenaufsatz
2014Towards a process model for hash functions in digital forensics
Breitinger, Frank; Liu, Huajian; Winter, Christian; Baier, Harald; Rybalchenko, Alexey; Steinebach, Martin
Konferenzbeitrag
2014Towards forensic analysis of attacks with DNSSEC
Shulman, Haya; Waidner, Michael
Konferenzbeitrag
2014Towards fresh re-keying with leakage-resilient PRFs: chipher design principles and analysis
Belaid, Sonia; Santis, Fabrizio de; Heyszl, Johann; Mangard, Stefan; Medwed, Marcel; Schmidt, Jörn-Marc; Standaert, Francois-Xavier; Tillich, Stefan
Zeitschriftenaufsatz
2014Using a whatsapp vulnerability for profiling individuals
Kurowski, Sebastian
Konferenzbeitrag
2014Using approximate matching to reduce the volume of digital data
Breitinger, Frank; Winter, Christian; Yannikos, York; Fink, Tobias; Seefried, Michael
Konferenzbeitrag
2014Vorrichtung und Verfahren mit einem Träger mit Schaltungsstrukturen
Hennig, Maxim; Schimmel, Oliver; Zieris, Philipp; Filipovic, Bartol
Patent
201323. SmartCard Workshop 2013. Tagungsband: Darmstadt, 6./7. Februar 2013
Waldmann, Ulrich ; Fraunhofer-Institut für Sichere Informationstechnologie -SIT-, Darmstadt
Tagungsband
2013Datenschutz bei der Erhebung biometrischer Testdaten
Opel, Alexander; Körffer, Barbara; Nouak, Alexander
Zeitschriftenaufsatz
2013Distributed privacy-preserving aggregation of metering data in smart grids
Rottondi, C.; Verticale, G.; Krauß, C.
Zeitschriftenaufsatz
2013Experience made using public cloud infrastructure to analyse clinical patient data
Ziegler, Wolfgang; Ihle, Matthias; Claus, Steffen; Senger, Philipp; Mohebbi, Pooya; Khan, Zakir; Fluck, Juliane; Griebel, Lena; Sedlmayr, Martin; Berger, Florian; Laufer, Julian; Chatziastros, Astros; Drepper, Johannes
Konferenzbeitrag
2013Die Gesichtsauflösung in der Informationstechnologie. Wenn Maschinen erkennen sollen
Nouak, Alexander
Aufsatz in Buch
2013Hash-based file content identification using distributed systems
Yannikos, Y.; Schluessler, J.; Steinebach, M.; Winter, C.; Graffi, K.
Konferenzbeitrag
2013Integrating trust establishment into routing protocols of today's MANET's
Oberle, Alexander; Rein, Andre; Kuntze, Nicolai; Rudolph, Carsten; Paatero, Janne; Lunn, Andrew; Racz, Peter
Konferenzbeitrag
2013Multi-Biometrische Gesichtserkennung
Busch, Christoph; Brömme, Arslan; Pflug, Anika; Zhou, Xuebing; Dose, Michael; Brauckmann, Michael; Weber, Frank; Opel, Alexander; Neugebauer, Peter; Leowsky, Katja
Konferenzbeitrag
2013A New Model for Estimating Bit Error Probabilities of Ring-Oscillator PUFs
Hiller, Matthias; Sigl, Georg; Pehl, Michael
Konferenzbeitrag
2013Physical unclonable functions based on crossbar arrays for cryptographic applications
Lugli, P.; Mahmoud, A.; Csaba, G.; Algasinger, M.; Stutzmann, M.; Rührmair, U.
Zeitschriftenaufsatz
2013Privacy preserving surveillance and the tracking-paradox
Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen
Konferenzbeitrag
2013Secure deployment of SmartGrid equipment
Kuntze, N.; Rudolph, C.
Konferenzbeitrag
2013Secure distributed data aggregation in the automatic metering infrastructure of smart grids
Rottondi, Cristina E.M.; Verticale, Giacomo; Krauß, Christoph
Konferenzbeitrag
2013Security Analysis of a Widely Deployed Locking System
Weiner, Michael; Massar, Maurice; Tews, Erik; Giese, Dennis; Wieser, Wolfgang
Konferenzbeitrag
2013Strengths and limitations of high-resolution electromagnetic field measurements for side-channel analysis
Heyszl, J.; Merli, D.; Heinz, B.; Santis, F. de; Sigl, G.
Konferenzbeitrag
2013Was man weiss, was man hat, was man ist: Moderne Verfahren der Biometrie
Nouak, Alexander
Zeitschriftenaufsatz
Diese Publikationsliste wurde aus der Publikationsdatenbank Fraunhofer-Publica erstellt.