Department of Computer Science

Institut für Cyber Security & Privacy Logo

Institute for Cyber Security & Privacy

The Institute for Cyber Security & Privacy (ICSP) at Hochschule Bonn-Rhein-Sieg (H-BRS) bundles research, teaching and transfer on digital security and privacy in cyberspace.
Aims and objectives

ICSP researches, communicates and transfers approaches, technologies and solutions to promote security and privacy in the new digital reality. In doing so, ICSP takes a multi-faceted, technically and organisationally holistic and interdisciplinary multi-perspective view of the field. The institute's goal is to help shape national, European and international research in the long term, as well as to impart the available know-how in the training of highly-qualified Bachelor's and Master's graduates and to transfer it to industry and administration via cooperations and spin-offs.

Research and application fields

Cyber Security & Cyber Privacy are both cross-sectional disciplines that are already of immense importance for the economy, administration and society in a ubiquitously digitalised and interconnected reality of life - especially against the backdrop of constantly increasing threats and criminal acts from the network. The ICSP bundles the activities that are vital for the prevention, detection and response to security incidents from a technical and organisational perspective in research, development and teaching.

Main research fields
  • Security and privacy protection of autonomous, mobile and distributed systems

(e.g. Cloud, IoT, Smart Home, Industry 4.0, RFID/NFC, mobile networks, health systems, payment systems, robotics, self-driving systems, automobiles)

  • Applications of cryptographic processes

(e.g. cryptographic protocols and applications, cryptocurrencies, blockchain technology, identity, privacy, anonymity, and PETs) 

  • Hardware-related implementation security

(e.g. hardware security, firmware security, microarchitecture security, cryptographic implementation, side channel analysis, error analysis, covert information channels, embedded software, smart card security)

  • IT security conception and evaluation of IT products and IT-systems

(e.g. Common Criteria, FIPS-140, special aspect: consumer protection in digitalisation, data literacy)

  • IT security management

(e.g. organisation & processes, governance & standards, audits and controlling, IT security management in SMEs, ISO 27000, VdS 10000)

  • Secure and data protection-friendly development of Machine Learning (ML)
  • Software and system vulnerability analysis

(e.g. security analyses, penetration tests) 

  • Malware analysis and intrusion detection

(e.g. malware analysis, indicators of compromise, threat intelligence)

  • Usable Security & Privacy

Offene Stellen

Wir suchen im ICSP mehrere engagierte Studierende mit Interesse für Tätigkeiten in
laufenden Forschungsprojekten und für die Lehrunterstützung in Laboren.
daccord-logo.png (DE)

D’accord

Teaser Placeholder

BlockTechDiVer - Potenziale der Blockchain-Technologie für die Digitale Verbraucherteilhabe

odea5g.png (DE)

ODEA.5G - Own Device E-Assessment on 5G

Teaser Placeholder

SESAME (Safe and Secure Multi-Robot-Systems)

trust_logo_teaser_1.jpg

TrUSD

uria-logo-teaser_1.jpg

URIA

2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

2024

Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann: 10. Usable Security und Privacy Workshop.
PDF Download (CC BY-NC-SA 4.0) doi:10.18420/muc2024-mci-ws17-105 urn:nbn:de:hbz:1044-opus-85614 BibTeX | RIS

Thomas Neteler, Sascha Fahl, Luigi Lo Iacono: “You received $100,000 from Johnny”: A Mixed-Methods Study on Push Notification Security and Privacy in Android Apps.
PDF Download (CC BY 4.0) doi:10.1109/ACCESS.2024.3439095 urn:nbn:de:hbz:1044-opus-85473 BibTeX | RIS

Florian Dehling, Jan Tolsdorf, Hannes Federrath, Luigi Lo Iacono: Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation.
PDF Download (CC BY 4.0) doi:10.56553/popets-2024-0060 urn:nbn:de:hbz:1044-opus-84843 BibTeX | RIS

Jan Tolsdorf, Luigi Lo Iacono: Expert Perspectives on Information Security Awareness Programs in Medical Care Institutions in Germany.
doi:10.1007/978-3-031-61382-1_7 BibTeX | RIS

Dominik Schneider, Jannik Zeitschner, Michael Kloos, Kerstin Lemke-Rust, Luigi Lo Iacono: Developers: Beware of Timing Side-Channels.
doi:10.1109/MSEC.2024.3399330 BibTeX | RIS

Stephan Wiefling, Marian Hönscheid, Luigi Lo Iacono: A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web.
PDF Download (postprint version) urn:nbn:de:hbz:1044-opus-83218 doi:10.1145/3664476.3664478 BibTeX | RIS

Andre Büttner, Andreas Thue Pedersen, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono: Is It Really You Who Forgot the Password? When Account Recovery Meets Risk-Based Authentication.
doi:10.1007/978-981-97-1274-8_26 arXiv BibTeX | RIS

Florian Dehling, Stefanie Ludborzs, Andreas Weßner, Rodrigo Falcão: Konzepte für gebrauchstaugliche Datenschutzfunktionen in digitalen Ökosystemen.
doi:10.1007/s11623-023-1888-4 BibTeX | RIS

Christian K. Bosse, Florian Dehling, Eduard C. Groen, Simone Salemi, Hartmut Schmitt: Auf dem Weg zu gebrauchstauglichen Datenschutzlösungen für digitale Ökosysteme.
doi:10.1007/s11623-023-1886-6 BibTeX | RIS

Hartmut Schmitt, Christian H. Schunck, Luigi Lo Iacono: Datenökonomie in digitalen Ökosystemen.
doi:10.1007/s11623-023-1885-7 BibTeX | RIS

Denis Feth, Hartmut Schmitt, Luigi Lo Iacono: Datenökonomie trifft Datenschutz.
doi:10.1007/s11623-023-1883-9 BibTeX | RIS

2023

Jan Tolsdorf, Luigi Lo Iacono: Faktor Mensch: Risiko und Chance: Informationssicherheitsbewusstsein in medizinischen Einrichtungen – Expertenansichten (Teil 2).
BibTeX | RIS

Jan Tolsdorf, Luigi Lo Iacono: Medizinisches Personal sensibilisieren: Bewusstsein für Gefährdungen der Patientenversorgung aus dem Cyberraum schaffen – Teil 1.
BibTeX | RIS

Jan Tolsdorf, Luigi Lo Iacono: Data Cart: A Privacy Pattern for Personal Data Management in Organizations.
PDF Download (CC BY 4.0) doi:10.1007/978-3-031-28643-8_18 urn:nbn:de:hbz:1044-opus-82545 BibTeX | RIS

Eduard C. Groen, Denis Feth, Svenja Polst, Jan Tolsdorf, Stephan Wiefling, Luigi Lo Iacono, Hartmut Schmitt: Achieving Usable Security and Privacy Through Human-Centered Design.
PDF Download (CC BY 4.0) doi:10.1007/978-3-031-28643-8_5 urn:nbn:de:hbz:1044-opus-82534 BibTeX | RIS

Luigi Lo Iacono, Stephan Wiefling, Michael Schneider: Programmieren trainieren: Mit über 150 Workouts in Java und Python.
doi:10.3139/9783446478213 BibTeX | RIS

Salman Omar Sohail, Sven Schneider, Nico Hochgeschwender: Automated Testing of Standard Conformance for Robots.
doi:10.1109/CASE56687.2023.10260447 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt, Denis Feth, Andreas Heinemann: 9. Usable Security und Privacy Workshop.
doi:10.18420/muc2023-mci-ws11-114 BibTeX | RIS

Minh Nguyen, Nico Hochgeschwender, Sebastian Wrede: An Analysis of Behaviour-Driven Requirement Specification for Robotic Competitions.
doi:10.1109/RoSE59155.2023.00008 BibTeX | RIS

Desiana Nurchalifah, Sebastian Blumenthal, Luigi Lo Iacono, Nico Hochgeschwender: Analysing the Safety and Security of a UV-C Disinfection Robot.
doi:10.1109/icra48891.2023.10160527 BibTeX | RIS

Stephan Wiefling: Usability, security, and privacy of risk-based authentication.
doi:10.13154/294-9901 URL URL BibTeX | RIS

Florian Nettersheim, Stephan Arlt, Michael Rademacher, Florian Dehling: Katti: An Extensive and Scalable Tool for Website Analyses.
doi:10.1145/3543873.3587351 BibTeX | RIS

Vincent Unsel, Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono: Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example.
PDF Download (postprint version) doi:10.1145/3577923.3583634 urn:nbn:de:hbz:1044-opus-66425 BibTeX | RIS

Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono: Data Protection Officers' Perspectives on Privacy Challenges in Digital Ecosystems.
PDF Download (postprint version) doi:10.1007/978-3-031-25460-4_13 urn:nbn:de:hbz:1044-opus-65973 BibTeX | RIS

Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service.
PDF Download (CC BY 4.0) doi:10.1145/3546069 arXiv urn:nbn:de:hbz:1044-opus-62878 BibTeX | RIS

2022

Luigi Lo Iacono, Jan Tolsdorf: Schlussbericht des Teilvorhabens "Konzeptionierung, Implementierung und Evaluation von Privacy-Dashboards im Arbeitnehmerdatenschutz" im Rahmen des Verbundprojekts "TrUSD - Transparente und selbstbestimmte Ausgestaltung der Datennutzung im Unternehmen".
doi:10.2314/KXP:1843285487 BibTeX | RIS

Argentina Ortega, Nico Hochgeschwender, Thorsten Berger: Testing Service Robots in the Field: An Experience Report.
doi:10.1109/IROS47612.2022.9981789 BibTeX | RIS

Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono: Login Data Set for Risk-Based Authentication.
doi:10.5281/zenodo.6782155 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann: 8. Usable Security und Privacy Workshop.
doi:10.18420/muc2022-mci-ws01-101 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Matthew Smith: Eight Lightweight Usable Security Principles for Developers.
PDF Download (CC BY-NC-ND 4.0) doi:10.1109/MSEC.2022.3205484 urn:nbn:de:hbz:1044-opus-64613 BibTeX | RIS

Jan Tolsdorf: Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the Right to Informational Self-Determination in Employment.
doi:10.53846/goediss-9481 BibTeX | RIS

Dominik Opitz, Nico Hochgeschwender: From Zero to Hero: Generating Training Data for Question-To-Cypher Models.
URL doi:10.1145/3528588.3528655 BibTeX | RIS

Christian Reuter, Luigi Lo Iacono, Alexander Benlian: A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead.
doi:10.1080/0144929X.2022.2080908 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono: Data cart – designing a tool for the GDPR-compliant handling of personal data by employees.
doi:10.1080/0144929X.2022.2069596 BibTeX | RIS

Marco Hünseler, Kerstin Lemke-Rust: Simulating an Ethereum 2.0 Beacon Chain Network.
doi:10.1109/SDS54264.2021.9732095 BibTeX | RIS

Jan Tolsdorf, Delphine Reinhardt, Luigi Lo Iacono: Employees’ privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose.
PDF Download (CC BY-NC-ND) doi:10.2478/popets-2022-0036 urn:nbn:de:hbz:1044-opus-61328 BibTeX | RIS

Deebul S. Nair, Nico Hochgeschwender, Miguel A. Olivares-Mendez: Maximum Likelihood Uncertainty Estimation: Robustness to Outliers.
PDF Download (CC BY 4.0) doi:10.48550/arXiv.2202.03870 urn:nbn:de:hbz:1044-opus-61280 BibTeX | RIS

2021

Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann: 7. Usable Security und Privacy Workshop.
doi:10.18420/muc2021-mci-ws14-124 BibTeX | RIS

Marco Hünseler, Kerstin Lemke-Rust, Eva Pöll, Katja Stoppenbrink: Digitale Verbraucherteilhabe bei Blockchain-Anwendungen.
PDF Download (CC BY 4.0) doi:10.18418/978-3-96043-095-7_01 urn:nbn:de:hbz:1044-opus-60209 BibTeX | RIS

Stephan Wiefling, Jan Tolsdorf, Luigi Lo Iacono: Privacy Considerations for Risk-Based Authentication Systems.
PDF Download (CC BY 4.0) doi:10.1109/EuroSPW54576.2021.00040 urn:nbn:de:hbz:1044-opus-58417 BibTeX | RIS

Florian Dehling, Denis Feth, Svenja Polst, Bianca Steffes, Jan Tolsdorf: Components and Architecture for the Implementation of Technology-Driven Employee Data Protection.
doi:10.1007/978-3-030-86586-3_7 BibTeX | RIS

Artur Baranowski, Nico Hochgeschwender: Grammar-Constrained Neural Semantic Parsing with LR Parsers.
PDF Download (CC BY 4.0) doi:10.18653/v1/2021.findings-acl.108 urn:nbn:de:hbz:1044-opus-57802 BibTeX | RIS

Sophie Jentzsch, Nico Hochgeschwender: A qualitative study of Machine Learning practices and engineering challenges in Earth Observation.
PDF Download (CC BY 4.0) doi:10.1515/itit-2020-0045 urn:nbn:de:hbz:1044-opus-57583 BibTeX | RIS

Salman Omar Sohail, Alex Mitrevski, Nico Hochgeschwender, Paul G. Plöger: Property-Based Testing in Simulation for Verifying Robot Action Execution in Tabletop Manipulation.
arXiv doi:10.1109/ECMR50962.2021.9568837 BibTeX | RIS

Peter Leo Gorski, Sebastian Möller, Stephan Wiefling, Luigi Lo Iacono: "I just looked for the solution!" - On Integrating Security-Relevant Information in Non-Security API Documentation to Support Secure Coding Practices.
PDF Download (postprint version) doi:10.1109/TSE.2021.3094171 urn:nbn:de:hbz:1044-opus-56314 BibTeX | RIS

Santosh Thoduka, Nico Hochgeschwender: Benchmarking Robots by Inducing Failures in Competition Scenarios.
doi:10.1007/978-3-030-77820-0_20 BibTeX | RIS

Andre Büttner, Hoai Viet Nguyen, Nils Gruschka, Luigi Lo Iacono: Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-Based Software Systems.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_22 urn:nbn:de:hbz:1044-opus-55491 BibTeX | RIS

Paul Höller, Alexander Krumeich, Luigi Lo Iacono: XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany.
PDF Download (postprint version) doi:10.1007/978-3-030-78120-0_1 urn:nbn:de:hbz:1044-opus-55487 arXiv BibTeX | RIS

Jan Tolsdorf, Michael Fischer, Luigi Lo Iacono: A Case Study on the Implementation of the Right of Access in Privacy Dashboards.
doi:10.1007/978-3-030-76663-4_2 BibTeX | RIS

Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Sven Quadflieg, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf: Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-32795-8_31 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith, Peter Leo Gorski: Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-32795-8_6 BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: Verify It's You: How Users Perceive Risk-based Authentication.
PDF Download (postprint version) doi:10.1109/MSEC.2021.3077954 urn:nbn:de:hbz:1044-opus-54912 BibTeX | RIS

Johannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono: Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication.
PDF Download (CC BY-SA 4.0) URL urn:nbn:de:hbz:1044-opus-54904 arXiv BibTeX | RIS

Samuel Parra, Sven Schneider, Nico Hochgeschwender: Specifying QoS Requirements and Capabilities for Component-Based Robot Software.
URL doi:10.1109/RoSE52553.2021.00012 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Delphine Reinhardt, Luigi Lo Iacono: Exploring mental models of the right to informational self-determination of office workers in Germany.
PDF Download (CC BY-NC-ND) doi:10.2478/popets-2021-0035 urn:nbn:de:hbz:1044-opus-53837 BibTeX | RIS

Till Schlüter, Kerstin Lemke-Rust: Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers.
doi:10.1007/978-3-030-68487-7_10 BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics.
PDF Download (pre-proceedings version) URL arXiv urn:nbn:de:hbz:1044-opus-53053 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt: Informationelle Selbstbestimmung am Arbeitsplatz.
doi:10.1007/s11623-020-1379-9 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Denis Feth: Benutzerfreundlicher Datenschutz in Cloud-basierten Office-Paketen.
doi:10.1007/s11623-020-1386-x BibTeX | RIS

Svenja Polst, Jan Tolsdorf, Florian Dehling, Denis Feth: Verarbeitung von Beschäftigtendaten: Sichtweisen und Wünsche von Beschäftigten.
doi:10.1007/s11623-020-1383-0 BibTeX | RIS

2020

Sophie F. Jentzsch, Nico Hochgeschwender: Don't Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning Models.
doi:10.1109/ASEW.2019.00025 BibTeX | RIS

Jan Tolsdorf, Florian Dehling, Luigi Lo Iacono: Take Back Control! The Use of Mental Models to Develop Privacy Dashboards.
URL BibTeX | RIS

Jan Tolsdorf, Florian Dehling: In Our Employer We Trust: Mental Models of Office Workers’ Privacy Perceptions.
doi:10.1007/978-3-030-54455-3_9 BibTeX | RIS

Jan Tolsdorf, Christian K. Bosse, Aljoscha Dietrich, Denis Feth, Hartmut Schmitt: Privatheit am Arbeitsplatz: Transparenz und Selbstbestimmung bei Arbeit 4.0.
doi:10.1007/s11623-020-1247-7 BibTeX | RIS

Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, Sascha Fahl: Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs.
doi:10.1145/3313831.3376142 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: CREHMA: Cache-aware REST-ful HTTP Message Authentication.
doi:10.1145/3374664.3375750 BibTeX | RIS

Christian K. Bosse, Aljoscha Dietrich, Patricia Kelbert, Hagen Küchler, Hartmut Schmitt, Jan Tolsdorf, Andreas Weßner: Beschäftigtendatenschutz: Rechtliche Anforderungen und Technische Lösungskonzepte.
BibTeX | RIS

Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono: More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
PDF Download (postprint version) doi:10.1145/3427228.3427243 URL arXiv urn:nbn:de:hbz:1044-opus-50707 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann: 6. Usable Security und Privacy Workshop.
doi:10.18420/muc2020-ws119 BibTeX | RIS

Swaroop Bhandary K, Nico Hochgeschwender, Paul Plöger, Frank Kirchner, Matias Valdenegro-Toro: Evaluating Uncertainty Estimation Methods on 3D Semantic Segmentation of Point Clouds.
arXiv doi:10.48550/arXiv.2007.01787 BibTeX | RIS

Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono: Evaluation of Risk-based Re-Authentication Methods.
PDF Download (postprint version) urn:nbn:de:hbz:1044-opus-49521 URL doi:10.1007/978-3-030-58201-2_19 arXiv BibTeX | RIS

Stephan Wiefling: Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung.
doi:10.18420/sicherheit2020_12 BibTeX | RIS

Luigi Lo Iacono, Stephan Wiefling, Michael Schneider: Programmieren trainieren: Mit über 130 Workouts in Java und Python.
doi:10.3139/9783446460577 BibTeX | RIS

Jan Tolsdorf, Luigi Lo Iacono: Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces.
doi:10.1109/EuroSPW51379.2020.00031 BibTeX | RIS

Carl-Daniel Hailfinger, Kerstin Lemke-Rust, Christof Paar: CCCiCC: A Cross-Core Cache-Independent Covert Channel on AMD Family 15h CPUs.
doi:10.1007/978-3-030-42068-0_10 BibTeX | RIS

Nico Hochgeschwender, Gary Cornelius, Holger Voos: Arguing Security of Autonomous Robots.
doi:10.1109/IROS40897.2019.8967670 BibTeX | RIS

2019

Luigi Lo Iacono, Hartmut Schmitt, Svenja Polst, Andreas Heinemann: 5. Usable Security und Privacy Workshop.
doi:10.18420/muc2019-ws-302 BibTeX | RIS

Nadine Meissler, Annika Wohlan, Nico Hochgeschwender, Andreas Schreiber: Using Visualization of Convolutional Neural Networks in Virtual Reality for Machine Learning Newcomers.
doi:10.1109/AIVR46125.2019.00031 BibTeX | RIS

Nadine Meissler, Annika Wohlan, Nico Hochgeschwender, Andreas Schreiber: Explore Convolutional Neural Networks in Virtual Reality.
doi:10.1109/AIVR46125.2019.00056 BibTeX | RIS

Peter Seipel, Adrian Stock, Sivasurya Santhanam, Artur Baranowski, Nico Hochgeschwender, Andreas Schreiber: Speak to your Software Visualization—Exploring Component-Based Software Architectures in Augmented Reality with a Conversational Interface.
doi:10.1109/VISSOFT.2019.00017 BibTeX | RIS

Federico Ciccozzi, Nico Hochgeschwender, Ivano Malavolta, Andreas Wortmann: Report on the 2nd International Workshop on Robotics Software Engineering (RoSE'19).
doi:10.1145/3356773.3356804 BibTeX | RIS

Annika Wohlan, Nico Hochgeschwender, Nadine Meissler: Visualizing Convolutional Neural Networks with Virtual Reality.
doi:10.1145/3359996.3364817 BibTeX | RIS

Sophie F. Jentzsch, Sviatlana Höhn, Nico Hochgeschwender: Conversational Interfaces for Explainable AI: A Human-Centred Approach.
doi:10.1007/978-3-030-30391-4_5 BibTeX | RIS

Nico Hochgeschwender: Adaptive Deployment of Safety Monitors for Autonomous Systems.
doi:10.1007/978-3-030-26250-1_28 BibTeX | RIS

Peter Seipel, Adrian Stock, Sivasurya Santhanam, Artur Baranowski, Nico Hochgeschwender, Andreas Schreiber: Adopting Conversational Interfaces for Exploring OSGi-Based Software Architectures in Augmented Reality.
doi:10.1109/BotSE.2019.00013 BibTeX | RIS

Peter L. Gorski, Emanuel von Zezschwitz, Luigi Lo Iacono, Matthew Smith: On providing systematized access to consolidated principles, guidelines and patterns for usable security research and development.
doi:10.1093/cybsec/tyz014 BibTeX | RIS

Florian Dehling, Tobias Mengel, Luigi Lo Iacono: Rotten Cellar: Security and Privacy of the Browser Cache Revisited.
doi:10.1007/978-3-030-35055-0_2 URL BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack.
doi:10.1145/3319535.3354215 BibTeX | RIS

Hans Christian Rudolph, Andreas Kunz, Luigi Lo Iacono, Hoai Viet Nguyen: Security Challenges of the 3GPP 5G Service Based Architecture.
doi:10.1109/MCOMSTD.2019.1800034 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Mind the cache: large-scale explorative study of web caching.
doi:10.1145/3297280.3297526 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Peter Leo Gorski: On the Need for a General REST-Security Framework.
doi:10.3390/fi11030056 BibTeX | RIS

Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth: Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild.
doi:10.1007/978-3-030-22312-0_10 URL arXiv BibTeX | RIS

Stephan Wiefling, Nils Gruschka, Luigi Lo Iacono: Even Turing Should Sometimes Not Be Able To Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services.
doi:10.1007/978-3-030-35055-0_12 URL BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Vernetzter Straßenverkehr: Herausforderungen für die IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_17 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Nachweismöglichkeiten der IT-Sicherheit.
doi:10.1007/978-3-658-26945-6_19 BibTeX | RIS

Kerstin Lemke-Rust, Peter Samarin: Exploring Embedded Software with Side Channels and Fault Analysis.
doi:10.1109/EWME.2018.8629479 BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detection of Counterfeit ICs using Public Identification Sequences and Side-Channel Leakage.
doi:10.1109/TIFS.2018.2866333 BibTeX | RIS

2018

Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann: 4. Usable Security und Privacy Workshop.
doi:10.18420/muc2018-ws08-0538 BibTeX | RIS

Nico Hochgeschwender, Geoffrey Biggs, Holger Voos: A Reference Architecture for Deploying Component-Based Robot Software and Comparison with Existing Tools.
doi:10.1109/IRC.2018.00026 BibTeX | RIS

Davide Brugali, Nico Hochgeschwender: Software Product Line Engineering for Robotic Perception Systems.
doi:10.1142/S1793351X18400056 BibTeX | RIS

Gary Cornelius, Nico Hochgeschwender, Holger Voos: Model-Driven Interaction Design for Social Robots.
doi:10.1007/978-3-319-74730-9_20 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath: Systematic Analysis of Web Browser Caches.
doi:10.1145/3240431.3240443 BibTeX | RIS

Peter Leo Gorski: Usability von Security-APIs für massiv-skalierbare vernetzte Service-orientierte Systeme.
doi:10.18420/sicherheit2018_26 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith: Werkzeuge für Usable (Cyber-)Security.
doi:10.1007/978-3-658-19523-6_6 BibTeX | RIS

Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren: Consolidating Principles and Patterns for Human-centred Usable Security Research and Development.
doi:10.14722/eurousec.2018.23010 BibTeX | RIS

Silvia Santano Guillén, Luigi Lo Iacono, Christian Meder: Affective Robots: Evaluation of Automatic Emotion Recognition Approaches on a Humanoid Robot towards Emotionally Intelligent Machines.
BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Jan Tolsdorf: Classification of Android App Permissions: Tell me What app you are and I Tell you What you are Allowed to do.
BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl: Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse.
URL BibTeX | RIS

Christian Reuter, Konstantin Aal, Frank Beham, Alexander Boden, Florian Brauner, Frank Fiedrich, Frank Fuchs-Kittowski, Stefan Geisler, Klaus Gennen, Dominik Herrmann, Marc-André Kaufhold, Michael Klafft, Myriam Lipprandt, Luigi Lo Iacono, Thomas Ludwig, Stephan Lukosch, Tilo Mentler, Simon Nestler, Volkmar Pipek, Jens Pottebaum, Gebhard Rusch, Stefan Sackmann, Stefan Stieglitz, Christian Sturm, Melanie Volkamer, Volker Wulf: Die Zukunft sicherheitskritischer Mensch-Computer-Interaktion.
doi:10.1007/978-3-658-19523-6_30 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Stephan Wiefling, Sebastian Möller: Warn if Secure or How to Deal with Security by Default in Software Development?.
URL BibTeX | RIS

Luigi Lo Iacono, Stephan Wiefling, Michael Schneider: Programmieren trainieren: Mit über 120 Workouts in Java und Python.
doi:10.3139/9783446455030 BibTeX | RIS

Kerstin Lemke-Rust, Peter Samarin: Detektion von Plagiaten eingebetteter Software mittels Seitenkanalanalysen (DePlagEmSoft): Schlussbericht, Berichtszeitraum: 1. Dezember 2013-31. Mai 2018, Projektstart: 1. Dezember 2013, Laufzeit: 4 Jahre, 6 Monate.
doi:10.2314/KXP:1667395300 BibTeX | RIS

Sandro Berndt, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Christian Wieschebrink: Sichere Vehicle-to-X Kommunikation in Europa.
BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers.
doi:10.1007/978-3-319-78556-1_9 BibTeX | RIS

2017

Thomas Barabosch, Niklas Bergmann, Adrian Dombeck, Elmar Padilla: Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps.
doi:10.1007/978-3-319-60876-1_10 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt, Andreas Heinemann: 3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren.
doi:10.18420/muc2017-ws05-0401 BibTeX | RIS

Holger Harms, Collin Rogowski, Luigi Lo Iacono: Guidelines for adopting frontend architectures and patterns in microservices-based systems.
doi:10.1145/3106237.3117775 BibTeX | RIS

Hoai Viet Nguyen, Jan Tolsdorf, Luigi Lo Iacono: On the Security Expressiveness of REST-Based API Definition Languages.
doi:10.1007/978-3-319-64483-7_14 BibTeX | RIS

Luigi Lo Iacono, Nils Gruschka, Peter Nehren: Mobile Personal Identity Provider Based on OpenID Connect.
doi:10.1007/978-3-319-64483-7_2 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt, Peter Nehren, Hoai Viet Nguyen: Usable Security by Design: Unterstützung für kleine und mittlere Softwarehersteller in frühen Phasen der Produktentwicklung.
BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: Sicherheit für REST-basierte Systeme: Zur Notwendigkeit eines generischen Sicherheitsframeworks für REST.
doi:10.1007/s11623-017-0736-9 BibTeX | RIS

Hartmut Schmitt, Peter Leo Gorski, Luigi Lo Iacono: Usable Security – Benutzerfreundliche Sicherheitsfunktionen für Software und interaktive Produkte.
URL BibTeX | RIS

Peter Nehren, Hartmut Schmitt, Luigi Lo Iacono: Usable Security – Werkzeuge für Entwickler.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono: Computer-Sicherheitswarnungen – Benutzerzentrierte Entwurfsansätze der Usable Security-Forschung.
URL BibTeX | RIS

Hartmut Schmitt, Peter Nehren, Luigi Lo Iacono, Peter Leo Gorski: Usable Security und Privacy by Design.
URL BibTeX | RIS

Luigi Lo Iacono, Peter Leo Gorski, Josephine Grosse, Nils Gruschka: Signalling over-privileged mobile applications using passive security indicators.
doi:10.1016/j.jisa.2016.11.006 BibTeX | RIS

Luigi Lo Iacono, Peter Leo Gorski: I Do and I Understand. Not Yet True for Security APIs. So Sad.
doi:10.14722/eurousec.2017.23015 BibTeX | RIS

Stephan Wiefling, Luigi Lo Iacono, Frederik Sandbrink: Anwendung der Blockchain außerhalb von Geldwährungen.
doi:10.1007/s11623-017-0816-x URL BibTeX | RIS

Torsten Jandt, Padmaja Kulkarni, José C. Mayoral, Deebul Nair, Boris Ndimubanzi Senga, Santosh Thoduka, Iman Awaad, Nico Hochgeschwender, Sven Schneider, Gerhard K. Kraetzschmar: b-it-bots RoboCup@Work Team Description Paper.
BibTeX | RIS

Sandro Berndt, Lutz Rittershaus, Carsten Kühnei, Thomas Strubbe, Nicolas Thenee, Markus Ullmann, Hans-Peter Wagner, Christian Wieschebrink: Sichere Vehicle-2-X-Kommunikation in Europa.
BibTeX | RIS

Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender: User study on remotely controlled UAVs with focus on interfaces and data link quality.
doi:10.1109/IROS.2017.8206179 BibTeX | RIS

Nico Hochgeschwender: Model-Based Specification, Deployment and Adaptation of Robot Perception Systems.
URL BibTeX | RIS

Gary Cornelius, Patrice Caire, Nico Hochgeschwender, Miguel A. Olivares-Mendez, Paulo Esteves-Verissimo, Marcus Völp, Holger Voos: A Perspective of Security for Mobile Service Robots.
doi:10.1007/978-3-319-70833-1_8 BibTeX | RIS

Rainer Bischoff, Tim Friedrich, Gerhard K. Kraetzschmar, Sven Schneider, Nico Hochgeschwender: RoCKIn@Work: Industrial Robot Challenge.
PDF Download (CC BY 3.0) doi:10.5772/intechopen.70014 urn:nbn:de:hbz:1044-opus-33084 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Misuse Capabilities of the V2V Communication to Harm the Privacy of Vehicles and Drivers.
URL BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust: Detection of counterfeit ICs using public identification sequences.
doi:10.1109/HST.2017.7951827 BibTeX | RIS

Ulrik Pagh Schultz, Mirko Bordignon, Kasper Stoy, Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede: DSLs in Robotics: A Case Study in Programming Self-reconfigurable Robots.
doi:10.1007/978-3-319-60074-1_5 BibTeX | RIS

Davide Brugali, Nico Hochgeschwender: Managing the Functional Variability of Robotic Perception Systems.
doi:10.1109/IRC.2017.20 BibTeX | RIS

Michael Kiometzis, Markus Ullmann: Fahrdaten für alle? Car-2-Car Kommunikation und die Folgen.
doi:10.1007/s11623-017-0763-6 BibTeX | RIS

Maik Riestock, Frank Engelhardt, Sebastian Zug, Nico Hochgeschwender: Exploring Gridmap-based Interfaces for the Remote Control of UAVs under Bandwidth Limitations.
doi:10.1145/3029798.3038350 BibTeX | RIS

Kerstin Lemke-Rust, Michael Tunstall (Hg.): Smart Card Research and Advanced Applications: 15th International Conference, CARDIS 2016, Cannes, France, November 7–9, 2016, Revised Selected Papers.
doi:10.1007/978-3-319-54669-8 BibTeX | RIS

Loic Gammaitoni, Nico Hochgeschwender: RPSL meets lightning: A model-based approach to design space exploration of robot perception systems.
doi:10.1109/SIMPAR.2016.7862378 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Herman Bruyninckx, Gerhard K. Kraetzschmar: Graph-based software knowledge: Storage and semantic querying of domain models for run-time adaptation.
doi:10.1109/SIMPAR.2016.7862379 BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Poster: V2V communication — Keeping you under non-disputable surveillance.
doi:10.1109/VNC.2016.7835975 BibTeX | RIS

Sebastian Zug, Tim Niemueller, Nico Hochgeschwender, Kai Seidensticker, Martin Seidel, Tim Friedrich, Tobias Neumann, Ulrich Karras, Gerhard Kraetzschmar, Alexander Ferrein: An Integration Challenge to Bridge the Gap among Industry-inspired RoboCup Leagues.
doi:10.1007/978-3-319-68792-6_13 BibTeX | RIS

2016

Khaled Yakdan, Sergej Dechand, Elmar Gerhards-Padilla, Matthew Smith: Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study.
doi:10.1109/SP.2016.18 BibTeX | RIS

Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, Elmar Gerhards-Padilla: A Comprehensive Measurement Study of Domain Generating Malware.
URL BibTeX | RIS

Sebastian Eschweiler, Khaled Yakdan, Elmar Gerhards-Padilla: discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code.
doi:10.14722/ndss.2016.23185 BibTeX | RIS

Hartmut Schmitt, Luigi Lo Iacono, Sascha Wagner: Workshop des Arbeitskreises „Usable Security & Privacy“ – Ziele, Themen, Ausblick.
doi:10.18420/muc2016-up-0012 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt: Usable Security and Privacy: Ansätze und Lösungen zur nutzerzentrierten Entwicklung und Ausgestaltung von digitalen Schutzmechanismen.
doi:10.18420/muc2016-ws03-0000 BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: RESTful IoT Authentication Protocols.
doi:10.1016/B978-0-12-804629-6.00010-9 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Hartmut Schmitt: Usable Security – Results from a Field Study.
doi:10.1515/icom-2016-0026 BibTeX | RIS

Aline Jaritz, Luigi Lo Iacono: Untersuchung des Datenverkehrs aktueller Smart-TVs.
doi:10.1007/s11623-016-0648-0 BibTeX | RIS

Marc Skutnik, Luigi Lo Iacono, Christian Neuhaus: Methods of Data Processing and Communication for a Web-based Wind Flow Visualization.
doi:10.5220/0005846800320041 BibTeX | RIS

Luigi Lo Iacono, Silvia Santano Guillén: Adaptive Push-based Media Streaming in the Web.
doi:10.5220/0005813501210129 URL BibTeX | RIS

Hoai Viet Nguyen, Luigi Lo Iacono: REST-ful CoAP Message Authentication.
doi:10.1109/SIOT.2015.8 BibTeX | RIS

Hartmut Schmitt, Peter Nehren: Usable Security and Privacy by Design - Teil 2: Anwendungsfälle und Musterlösungen für Unternehmenssoftware.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono: Towards the Usability Evaluation of Security APIs.
URL BibTeX | RIS

Markus Ullmann, Christian Wieschebrink, Thomas Strubbe, Dennis Kuegler: Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility.
URL BibTeX | RIS

Markus Ullmann, Thomas Strubbe, Christian Wieschebrink: Technical Limitations, and Privacy Shortcomings of the Vehicle-to-Vehicle Communication.
URL BibTeX | RIS

Markus Ullmann, Khalil El-Khatib (Hg.): VEHICULAR 2016: The Fifth International Conference on Advances in Vehicular Systems, Technologies and Applications. November 13-17, 2016, Barcelona, Spain.
URL BibTeX | RIS

Matthias Neu, Ulrike Korte, Markus Ullmann: Improvement of Fuzzy Vault for Multiple Fingerprints with Angles.
doi:10.1109/BIOSIG.2016.7736926 URL BibTeX | RIS

Jacek Samotyja, Kerstin Lemke-Rust: Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor.
doi:10.1145/2996366.2996371 BibTeX | RIS

Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust: Fault-Channel Watermarks.
doi:10.1007/978-3-319-45931-8_13 BibTeX | RIS

Arne Nordmann, Nico Hochgeschwender, Dennis Wigand, Sebastian Wrede: A Survey on Domain-Specific Modeling and Languages in Robotics.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2016_07_01_p75 urn:nbn:de:hbz:1044-opus-26746 BibTeX | RIS

Shehzad Ahmed, Torsten Jandt, Padmaja Kulkarni, Oscar Lima, Arka Mallick, Alexander Moriarty, Deebul Nair, Santosh Thoduka, Iman Awaad, Rhama Dwiputra, Frederik Hegger, Nico Hochgeschwender, Jose Sanchez, Sven Schneider, Gerhard K. Kraetzschmar: b-it-bots RoboCup@Work Team Description Paper.
BibTeX | RIS

Kerstin Lemke-Rust: Sicherheit der Verbraucher in vernetzten Fahrzeugen.
PDF Download (CC BY-SA 3.0) doi:10.15501/978-3-86336-912-5_4 urn:nbn:de:hbz:1044-opus-25482 BibTeX | RIS

Nico Hochgeschwender, Holger Voos, Gerhard K. Kraetzschmar: Towards Persistent Storage and Retrieval of Domain Models using Graph Database Technology.
arXiv BibTeX | RIS

Jose Sanchez, Sven Schneider, Nico Hochgeschwender, Gerhard Kraetzschmar, Paul G. Plöger: Context-Based Adaptation of In-Hand Slip Detection for Service Robots.
doi:10.1016/j.ifacol.2016.07.765 BibTeX | RIS

Peter Samarin, Kerstin Lemke-Rust, Christof Paar: IP core protection using voltage-controlled side-channel receivers.
doi:10.1109/HST.2016.7495585 BibTeX | RIS

2015

Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla: BotWatcher - Transparent and Generic Botnet Tracking.
doi:10.1007/978-3-319-26362-5_26 BibTeX | RIS

Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith: No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
URL BibTeX | RIS

Viviane Zwanger, Elmar Gerhards-Padilla, Michael Meier: Codescanner: Detecting (Hidden) x86/x64 code in arbitrary files.
doi:10.1109/MALWARE.2014.6999403 BibTeX | RIS

Thomas Barabosch, Elmar Gerhards-Padilla: Host-based code injection attacks: A popular technique used by malware.
doi:10.1109/MALWARE.2014.6999410 BibTeX | RIS

Luigi Lo Iacono, Hartmut Schmitt: Usable Security and Privacy: Nutzerzentrierte Lösungsansätze zum Schutz sensibler Daten.
URL BibTeX | RIS

Sven Hricaj, Luigi Lo Iacono, Hoai Viet Nguyen, Marc Skutnik, Annette Ricke, Sven Wagner: WHELP: Web-Based Holistic E-Learning Platform.
URL BibTeX | RIS

Luigi Lo Iacono: Partial Data Protection via Structure-Preserving Document Partitioning.
doi:10.1109/Trustcom.2015.450 BibTeX | RIS

Wolfgang Börger, Luigi Lo Iacono: User Perception and Response to Computer Security Warnings.
doi:10.1515/9783110443905-087 BibTeX | RIS

Hoai Viet Nguyen: WebSocket - WS^2 2.0.
URL BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen: Towards Conformance Testing of REST-based Web Services.
doi:10.5220/0005412202170227 BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen: Authentication Scheme for REST.
doi:10.1007/978-3-319-19210-9_8 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: Web of Services Security: Mehr als die Sicherheit von Webanwendungen.
doi:10.1007/s11623-015-0420-x BibTeX | RIS

Luigi Lo Iacono, Hoai Viet Nguyen, Tobias Hirsch, Maurice Baiers, Sebastian Möller: UI-Dressing to Detect Phishing.
doi:10.1109/HPCC.2014.126 BibTeX | RIS

Luigi Lo Iacono: Signalschutz im Zeitalter von TV-Ökosystemen: Sicherheits- und Datenschutzaspekte von Google TV.
doi:10.1007/s11623-015-0371-2 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen: WebSockets: Moderne HTML5-Echtzeitanwendungen entwickeln.
doi:10.3139/9783446444386 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hartmut Schmitt: Usable Security und Privacy by Design - Teil 1: Benutzerzentrierte Entwicklung von Sicherheitsfunktionen.
URL BibTeX | RIS

Christoph Pörschmann, Stephan Wiefling: Dynamische Binauralsynthese auf Basis gemessener einkanaliger Raumimpulsantworten.
BibTeX | RIS

Christoph Pörschmann, Stephan Wiefling: Perceptual Aspects of Dynamic Binaural Synthesis based on measured Omnidirectional Room Impulse Responses.
BibTeX | RIS

Markus Ullmann, Ralph Breithaupt: Hands-on Smart Card User Interface Research, Development, and Testing.
URL BibTeX | RIS

Markus Ullmann, Christian Wieschebrink, Dennis Kügler: Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems.
URL BibTeX | RIS

Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann: SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node.
PDF Download (CC BY 4.0) URL urn:nbn:de:hbz:1044-opus-25248 BibTeX | RIS

Peter Schartner, Kerstin Lemke-Rust, Markus Ullmann (Hg.): D-A-CH security 2015: Bestandsaufnahme - Konzepte - Anwendungen - Perspektiven: Arbeitskonferenz D-A-CH Security in St. Augustin bei Bonn, 08.-09. September 2015 ergänzt durch die Workshops der GI Fachgruppe SECMGT und der Allianz für Cyber-Sicherheit.
BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender: RRA: Models and tools for robotics run-time adaptation.
doi:10.1109/IROS.2015.7353608 BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender: Poster: Model-based Run-time Variability Resolution for Robotic Applications.
doi:10.1109/ICSE.2015.269 BibTeX | RIS

Sebastian Blumenthal, Nico Hochgeschwender, Erwin Prassler, Holger Voos, Herman Bruyninckx: An Approach for a Distributed World Model with QoS-based Perception Algorithm Adaptation.
doi:10.1109/IROS.2015.7353612 BibTeX | RIS

Sven Schneider, Frederik Hegger, Nico Hochgeschwender, Rhama Dwiputra, Alexander Moriarty, Jakob Berghofer, Gerhard K. Kraetzschmar: Design and development of a benchmarking testbed for the Factory of the Future.
doi:10.1109/ETFA.2015.7301423 BibTeX | RIS

Nico Hochgeschwender, Miguel A. Olivares-Mendez, Holger Voos, Gerhard K. Kraetzschmar: Context-based selection and execution of robot perception graphs.
doi:10.1109/ETFA.2015.7301631 BibTeX | RIS

Francesco Amigoni, Emanuele Bastianelli, Jakob Berghofer, Andrea Bonarini, Giulio Fontana, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Pedro Miraldo, Daniele Nardi, Viola Schiaffonati: Competitions for Benchmarking: Task and Functionality Scoring Complete Performance Assessment.
doi:10.1109/MRA.2015.2448871 BibTeX | RIS

Ariano-Tim Donda, Peter Samarin, Jacek Samotyja, Kerstin Lemke-Rust, Christof Paar: Remote IP Protection Using Timing Channels.
doi:10.1007/978-3-319-15943-0_14 BibTeX | RIS

Gerhard K. Kraetzschmar, Nico Hochgeschwender, Walter Nowak, Frederik Hegger, Sven Schneider, Rhama Dwiputra, Jakob Berghofer, Rainer Bischoff: RoboCup@Work: Competing for the Factory of the Future.
doi:10.1007/978-3-319-18615-3_14 BibTeX | RIS

2014

Martin Lambertz, Rafael Uetz, Elmar Gerhards-Padilla: Resurrection: A Carver for Fragmented Files.
doi:10.1007/978-3-319-14289-0_5 BibTeX | RIS

Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla: REcompile: A decompilation framework for static analysis of binaries.
doi:10.1109/MALWARE.2013.6703690 BibTeX | RIS

Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla: Bee Master: Detecting Host-Based Code Injection Attacks.
doi:10.1007/978-3-319-08509-8_13 BibTeX | RIS

Luigi Lo Iacono, Silvia Santano Guillén: Efficient and Adaptive Web-native Live Video Streaming.
URL BibTeX | RIS

Peter Leo Gorski, Christian Naldony, Markus Roskosch, Benjamin Horvat, Daniel Behnam Torkian, Hoai Viet Nguyen, Luigi Lo Iacono: SOA und REST-Services: Ist REST reif genug, um SOA-Umgebungen zu verwirklichen?.
URL BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: Service Security Revisited.
doi:10.1109/SCC.2014.68 BibTeX | RIS

Luigi Lo Iacono, Silvia Santano Guillén: Web-native Video Live Streaming.
doi:10.13140/2.1.1729.4400 BibTeX | RIS

Luigi Lo Iacono, Daniel Torkian: A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage.
doi:10.1109/CSC.2013.12 BibTeX | RIS

Peter Leo Gorski, Luigi Lo Iacono, Hoai Viet Nguyen, Daniel Behnam Torkian: SOA-Readiness of REST.
doi:10.1007/978-3-662-44879-3_6 BibTeX | RIS

Markus Ullmann, Ralph Breithaupt: Scuid^Sim: A Platform for Smart Card User Interface Research, Development and Testing.
URL BibTeX | RIS

Nico Hochgeschwender, Roland Philippsen: From the Guest Editors of the Special Issue on Best Practice in Robotic Software Development.
PDF Download (CC BY 3.0) doi:10.6092/JOSER_2014_05_01_p1 urn:nbn:de:hbz:1044-opus-26570 BibTeX | RIS

Luca Gherardi, Nico Hochgeschwender, Christian Schlegel, Ulrik Pagh Schultz, Serge Stinckwich (Hg.): Proceedings of the Fifth International Workshop on Domain-Specific Languages and Models for Robotic Systems (DSLRob 2014).
arXiv BibTeX | RIS

Arne Nordmann, Nico Hochgeschwender, Sebastian Wrede: A Survey on Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_17 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar: Towards a Robot Perception Specification Language.
arXiv BibTeX | RIS

Rhama Dwiputra, Jakob Berghofer, Aamir Ahmad, Iman Awaad, Francesco Amigoni, Rainer Bischoff, Andrea Bonarini, Giulio Fontana, Frederik Hegger, Nico Hochgeschwender, Luca Iocchi, Gerhard Kraetzschmar, Pedro Lima, Matteo Matteucci, Daniele Nardi, Viola Schiaffonati, Sven Schneider: The RoCKIn@Work Challenge.
URL BibTeX | RIS

Nico Hochgeschwender, Luca Gherardi, Azamat Shakhirmardanov, Gerhard K. Kraetzschmar, Davide Brugali, Herman Bruyninckx: A model-based approach to software deployment in robotics.
doi:10.1109/IROS.2013.6696915 BibTeX | RIS

Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Declarative specification of task-based grasping with constraint validation.
doi:10.1109/IROS.2014.6942669 BibTeX | RIS

Sven Schneider, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Structured Design and Development of Domain-Specific Languages in Robotics.
doi:10.1007/978-3-319-11900-7_20 BibTeX | RIS

Nico Hochgeschwender, Sven Schneider, Holger Voos, Gerhard K. Kraetzschmar: Declarative Specification of Robot Perception Architectures.
doi:10.1007/978-3-319-11900-7_25 BibTeX | RIS

2013

Timo Bartkewitz, Kerstin Lemke-Rust: Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines.
doi:10.1007/978-3-642-37288-9_18 BibTeX | RIS

Daniel Plohmann, Sebastian Eschweiler, Elmar Gerhards-Padilla: Patterns of a cooperative malware analysis workflow.
URL BibTeX | RIS

Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini: Botnets.
doi:10.1007/978-1-4471-5216-3 BibTeX | RIS

André Wichmann, Elmar Gerhards-Padilla: Using Infection Markers as a Vaccine against Malware Attacks.
doi:10.1109/GreenCom.2012.121 BibTeX | RIS

Felix Matenaar, André Wichmann, Felix Leder, Elmar Gerhards-Padilla: CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware.
doi:10.1109/MALWARE.2012.6461007 BibTeX | RIS

Nils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz: Applicability of crypto-based security approaches in tactical wireless multi-hop networks.
doi:10.1109/LCN.2012.6423584 BibTeX | RIS

Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk: Making XML Signatures Immune to XML Signature Wrapping Attacks.
doi:10.1007/978-3-319-04519-1_10 BibTeX | RIS

Christoph Sorge, Luigi Lo Iacono, Nils Gruschka: Sicherheit in Kommunikationsnetzen.
doi:10.1524/9783486720174 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Christoph Sorge: Analysis of the current state in website certificate validation.
doi:10.1002/sec.799 BibTeX | RIS

Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Ninja Marnau: Security and Privacy-Enhancing Multicloud Architectures.
doi:10.1109/TDSC.2013.6 BibTeX | RIS

J. Vandorpe, J. Vliegen, R. Smeets, N. Mentens, M. Drutarovsky, M. Varchola, K. Lemke-Rust, P. Plöger, P. Samarin, D. Koch, Y. Hafting, J. Tørresen: Remote FPGA design through eDiViDe - European Digital Virtual Design Lab.
doi:10.1109/FPL.2013.6645621 BibTeX | RIS

Frederik Hegger, Nico Hochgeschwender, Gerhard K. Kraetzschmar, Paul G. Ploeger: People Detection in 3d Point Clouds Using Local Surface Normals.
doi:10.1007/978-3-642-39250-4_15 BibTeX | RIS

Timo Bartkewitz, Kerstin Lemke-Rust: Excellence in security evaluation testing : EXSET: Schlussbericht Hochschule Bonn-Rhein-Sieg, Berichtszeitraum: 1. Juli 2010 - 31. März 2013.
doi:10.2314/GBV:791502910 BibTeX | RIS

Herman Bruyninckx, Markus Klotzbücher, Nico Hochgeschwender, Gerhard Kraetzschmar, Luca Gherardi, Davide Brugali: The BRICS component model: a model-based development paradigm for complex robotics software systems.
doi:10.1145/2480362.2480693 BibTeX | RIS

2012

Christian A. Mueller, Nico Hochgeschwender, Paul G. Ploeger: Towards Robust Object Categorization for Mobile Robots with Combination of Classifiers.
doi:10.1007/978-3-642-32060-6_12 BibTeX | RIS

Thomas Breuer, Geovanny R. Giorgana Macedo, Ronny Hartanto, Nico Hochgeschwender, Dirk Holz, Frederik Hegger, Zha Jin, Christian Müller, Jan Paulus, Michael Reckhaus, Jose Antonio Alvarez Ruiz, Paul G. Plöger, Gerhard K. Kraetzschmar: Johnny: An Autonomous Service Robot for Domestic Environments.
doi:10.1007/s10846-011-9608-y BibTeX | RIS

Florian Schmitt, Jan Gassen, Elmar Gerhards-Padilla: PDF Scrutinizer: Detecting JavaScript-based attacks in PDF documents.
doi:10.1109/PST.2012.6297926 BibTeX | RIS

Elmar Gerhards-Padilla: TOGBAD: ein Verfahren zur Erkennung von Routingangriffen in taktischen multi-hop Netzen.
URL BibTeX | RIS

Daniel Plohmann, Elmar Gerhards-Padilla: Case study of the Miner Botnet.
URL BibTeX | RIS

Daniel Plohmann, Elmar Gerhards-Padilla: Malware and Botnet Analysis Methodology.
URL BibTeX | RIS

Jan Gassen, Elmar Gerhards-Padilla: A Scalable Approach for a Distributed Network of Attack Sensors.
URL BibTeX | RIS

Jan Gassen, Elmar Gerhards-Padilla, Peter Martini: Current Botnet-Techniques and Countermeasures.
doi:10.1515/pik-2012-0002 BibTeX | RIS

Sebastian Eschweiler, Elmar Gerhards-Padilla: Platform-Independent Recognition of Procedures in Binaries Based on Simple Characteristics.
doi:10.1524/itit.2012.0665 BibTeX | RIS

Sebastian Eschweiler, Elmar Gerhards-Padilla: Towards Sound Forensic Acquisition of Volatile Data.
doi:10.1007/978-3-642-33161-9_43 BibTeX | RIS

Meiko Jensen, Holger Junker, Luigi Lo Iacono, Christian Mainka, Jörg Schwenk: XML Signature Wrapping Angriffe wirksam unterbinden.
doi:10.1007/s11623-012-0091-9 BibTeX | RIS

Christian Mainka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk: XSpRES - Robust and Effective XML Signatures for Web Services.
doi:10.5220/0003925701870197 BibTeX | RIS

Tobias Hirsch, Luigi Lo Iacono, Ina Wechsung: How Much Network Security Must Be Visible in Web Browsers?.
doi:10.1007/978-3-642-32287-7_1 BibTeX | RIS

2011

Azamat Shakhimardanov, Nico Hochgeschwender, Michael Reckhaus, Gerhard K. Kraetzschmar: Analysis of software connectors in robotics.
doi:10.1109/IROS.2011.6095183 BibTeX | RIS

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini: TOGBAD - an approach to detect routing attacks in tactical environments.
doi:10.1002/sec.185 BibTeX | RIS

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini: TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities.
doi:10.4230/OASIcs.KiVS.2011.85 BibTeX | RIS

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini: Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD).
doi:10.14279/tuj.eceasst.37.503 BibTeX | RIS

Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono: All your clouds are belong to us.
doi:10.1145/2046660.2046664 BibTeX | RIS

Meiko Jensen, Jorg Schwenk, Jens-Matthias Bohli, Nils Gruschka, Luigi Lo Iacono: Security Prospects through Cloud Computing by Adopting Multiple Clouds.
doi:10.1109/CLOUD.2011.85 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Browser as a Service (BaaS): Security and Performance Enhancements for the Rich Web.
doi:10.4230/OASIcs.KiVS.2011.208 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Server-Side Streaming Processing of Secured MTOM Attachments.
doi:10.1109/ECOWS.2010.23 BibTeX | RIS

Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Norbert Luttenberger: Server-Side Streaming Processing of WS-Security.
doi:10.1109/TSC.2010.61 BibTeX | RIS

Timo Bartkewitz, Kerstin Lemke-Rust: A High-Performance Implementation of Differential Power Analysis on Graphics Cards.
doi:10.1007/978-3-642-27257-8_16 BibTeX | RIS

2010

Heiko Knospe, Kerstin Lemke-Rust: Towards Secure and Privacy-Enhanced RFID Systems.
doi:10.1002/9780470665251.ch16 BibTeX | RIS

Michael Reckhaus, Nico Hochgeschwender, Paul G. Plöger, Gerhard K. Kraetzschmar: A Platform-independent Programming Environment for Robot Control.
arXiv doi:10.48550/arXiv.1010.0886 BibTeX | RIS

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini: Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks.
doi:10.1109/ICDCSW.2010.57 BibTeX | RIS

Nils Aschenbruck, Raphael Ernst, Elmar Gerhards-Padilla, Matthias Schwamborn: BonnMotion: a mobility scenario generation and analysis tool.
doi:10.4108/ICST.SIMUTOOLS2010.8684 BibTeX | RIS

Tillmann Werner, Christoph Fuchs, Elmar Gerhards-Padilla, Peter Martini: Nebula - generating syntactical network intrusion signatures.
doi:10.1109/MALWARE.2009.5403022 BibTeX | RIS

Simone Fischer-Hübner, Luigi Lo Iacono, Sebastian Möller: Usable Security und Privacy.
doi:10.1007/s11623-010-0210-4 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Hariharan Rajasekaran: Identity and access management in multi-institutional medical research.
doi:10.1007/s00502-010-0734-1 BibTeX | RIS

Siegfried Benkner, Antonio Arbona, Guntram Berti, Alessandro Chiarini, Robert Dunlop, Gerhard Engelbrecht, Alejandro F. Frangi, Christoph M. Friedrich, Susanne Hanser, Peer Hasselmeyer, Rod D. Hose, Jimison Iavindrasana, Martin Köhler, Luigi Lo Iacono, Guy Lonsdale, Rodolphe Meyer, Bob Moore, Hariharan Rajasekaran, Paul E. Summers, Alexander Wöhrer, Steven Wood: @neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services.
doi:10.1109/TITB.2010.2049268 PMID BibTeX | RIS

Nils Gruschka, Meiko Jensen, Luigi Lo Iacono: A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages.
doi:10.1109/ARES.2010.23 BibTeX | RIS

Bernice S. Elger, Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Nicolas Roduit, Paul Summers, Jessica Wright: Strategies for health data exchange for secondary, cross-institutional clinical research.
doi:10.1016/j.cmpb.2009.12.001 PMID BibTeX | RIS

Matthias Häsel, Luigi Lo Iacono: Security in OpenSocial-Instrumented Social Networking Services.
doi:10.1007/978-3-642-13241-4_5 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono, Namhi Kang: Packaged HTTP: Reconsidering Web Efficiency.
BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Security for XML Data Binding.
doi:10.1007/978-3-642-13241-4_6 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Password Visualization beyond Password Masking.
URL BibTeX | RIS

Veselina Hensel, Kerstin Lemke-Rust: On an Integration of an Information Security Management System into an Enterprise Architecture.
doi:10.1109/DEXA.2010.75 BibTeX | RIS

Azamat Shakhimardanov, Nico Hochgeschwender, Gerhard K. Kraetzschmar: Component models in robotics software.
doi:10.1145/2377576.2377592 BibTeX | RIS

2009

Michael Vahl, Stefan Böhmer, Thomas Oestreich: Probability Based Risk Analysis for a VoIP System.
doi:10.1109/AICT.2009.79 BibTeX | RIS

Nils Aschenbruck, Elmar Gerhards-Padilla, Peter Martini: Modeling mobility in disaster area scenarios.
doi:10.1016/j.peva.2009.07.009 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Session-Based SOAP Transmission and Processing.
doi:10.1109/ECOWS.2009.10 BibTeX | RIS

Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono: On Technical Security Issues in Cloud Computing.
doi:10.1109/CLOUD.2009.60 BibTeX | RIS

Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, Jörg Schwenk: XML Signature Wrapping Angriffe.
doi:10.1007/s11623-009-0142-z BibTeX | RIS

Luigi Lo Iacono, Hariharan Rajasekaran: Secure Browser-Based Access to Web Services.
doi:10.1109/ICC.2009.5199439 BibTeX | RIS

Nils Gruschka, Luigi Lo Iacono: Vulnerable Cloud: SOAP Message Security Validation Revisited.
doi:10.1109/ICWS.2009.70 BibTeX | RIS

Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust: Differential Cluster Analysis.
doi:10.1007/978-3-642-04138-9_9 BibTeX | RIS

2008

Hariharan Rajasekaran, Luigi Lo Iacono, Peer Hasselmeyer, Jochen Fingberg, Paul Summers, Siegfried Benkner, Gerhard Engelbrecht, Antonio Arbona, Alessandro Chiarini, Christoph M. Friedrich, Martin Hofmann-Apitius, Kai Kumpf, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Henning Mueller, Rod D. Hose, Robert Dunlop, Alejandro Frangi: @neurIST - Towards a System Architecture for Advanced Disease Management through Integration of Heterogeneous Data, Computing, and Complex Processing Services.
doi:10.1109/CBMS.2008.42 BibTeX | RIS

Jun Wang, Luigi Lo Iacono: Intrusion Detection and tolerance in Grid-based applications.
doi:10.1109/SECCOM.2007.4550328 BibTeX | RIS

Luigi Lo Iacono, Hariharan Rajasekaran: Security Architecture for Distributed Medical Information Systems.
URL BibTeX | RIS

Gregory Allen Kohring, Luigi Lo Iacono: Non-Blocking Signature of very large SOAP Messages.
URL BibTeX | RIS

Jimison Iavindrasana, Luigi Lo Iacono, Henning Müller, Ivan Periz, Paul E. Summers, Jessica Wright, Christoph M. Friedrich, Holger Dach, Tobias Gattermayer, Gerhard Engelbrecht, Siegfried Benkner, Martin Hofmann-Apitius, Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Jochen Fingberg, Alessandro Chiarini, Bob Moore, Philippe Bijlenga, Rod D. Hose, Alejandro F. Frangi: The @neurIST project.
URL BibTeX | RIS

Sibylle Hick, Luigi Lo Iacono: Elliptic Curve Cryptography in x.509-based PKI.
URL BibTeX | RIS

Robert Dunlop, Antonio Arbona, Hariharan Rajasekaran, Luigi Lo Iacono, Jochen Fingberg, Paul E. Summers, Siegfried Benkner, Gerhard Engelbrecht, Alessandro Chiarini, Christoph M. Friedrich, Bob Moore, Philippe Bijlenga, Jimison Iavindrasana, Rod D. Hose, Alejandro F. Frangi: @neurIST - Chronic Disease Management through Integration of Heterogeneous Data and Computer-interpretable Guideline Services.
URL BibTeX | RIS

Kai Reichel, Nico Hochgeschwender, Holger Voos: OpCog: an industrial development approach for cognitive agent systems in military UAV applications.
URL BibTeX | RIS

Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers.
doi:10.1109/SIES.2008.4577681 BibTeX | RIS

Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust: Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
doi:10.1007/978-3-540-85886-7_24 BibTeX | RIS

2007

Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, Jens Tolle: Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs.
doi:10.1109/LCN.2007.72 BibTeX | RIS

Nils Aschenbruck, Elmar Gerhards-Padilla, Michael Gerharz, Matthias Frank, Peter Martini: Modelling mobility in disaster area scenarios.
doi:10.1145/1298126.1298131 BibTeX | RIS

Marko Jahnke, Jens Toelle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini: Methodologies and frameworks for testing ids in adhoc networks.
doi:10.1145/1298239.1298259 BibTeX | RIS

Luigi Lo Iacono: Multi-centric Universal Pseudonymisation for Secondary Use of the EHR.
URL BibTeX | RIS

Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar: E-Passport: Cracking Basic Access Control Keys.
doi:10.1007/978-3-540-76843-2_30 BibTeX | RIS

Kerstin Lemke-Rust, Christof Paar: Gaussian Mixture Models for Higher-Order Side Channel Analysis.
doi:10.1007/978-3-540-74735-2_2 BibTeX | RIS

Kerstin Lemke-Rust, Christof Paar: Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
doi:10.1007/978-3-540-74835-9_30 BibTeX | RIS

Kerstin Lemke-Rust: Models and algorithms for physical cryptanalysis.
BibTeX | RIS

Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi: E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
doi:10.1007/978-3-540-71093-6_30 BibTeX | RIS

2006

Luigi Lo Iacono, Sibylle Müller, Christoph Ruland, Norbert Zisky: Sicherheitslösung für die automatisierte Messdatenkommunikation.
doi:10.1007/s11623-006-0105-6 BibTeX | RIS

Jochen Fingberg, Marit Hansen, Markus Hansen, Henry Krasemann, Luigi Lo Iacono, Thomas Probst, Jessica Wright: Integrating Data Custodians in eHealth Grids - A Digest of Security and Privacy Aspects.
URL BibTeX | RIS

Luigi Lo Iacono, Christoph Ruland, Norbert Zisky: Secure transfer of measurement data in open systems.
doi:10.1016/j.csi.2005.07.010 BibTeX | RIS

Wolfgang Ertel, Joachim Fessler, Nico Hochgeschwender: Flexible Combination of Vision, Control and Drive in Autonomous Mobile Robots.
doi:10.1007/3-540-30292-1_31 BibTeX | RIS

Kerstin Lemke-Rust, Christof Paar: An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices.
doi:10.1007/11889700_13 BibTeX | RIS

Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi: Physical Security Bounds Against Tampering.
doi:10.1007/11767480_17 BibTeX | RIS

Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar: Templates vs. Stochastic Methods.
doi:10.1007/11894063_2 BibTeX | RIS

2005

Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland: Impacts of Security Protocols on Real-Time Multimedia Communications.
doi:10.1007/978-3-540-31815-6_1 BibTeX | RIS

Lars Dietze, Bernd Holznagel, Luigi Lo Iacono, Christoph Ruland: Qualifizierte Signatur im eletronischeen Messdatenaustausch.
URL BibTeX | RIS

Wolfgang Ertel, Joachim Fessler, Nico Hochgeschwender: A universal modular autonomous robot architecture.
doi:10.5220/0001164903910394 BibTeX | RIS

Werner Schindler, Kerstin Lemke, Christof Paar: A Stochastic Model for Differential Side Channel Cryptanalysis.
doi:10.1007/11545262_3 BibTeX | RIS

Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble: An Open Approach for Designing Secure Electronic Immobilizers.
doi:10.1007/978-3-540-31979-5_20 BibTeX | RIS

Kerstin Lemke, Christof Paar: Physical Attacks.
doi:10.1007/0-387-23483-7_300 BibTeX | RIS

2004

Kerstin Lemke, Kai Schramm, Christof Paar: DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction.
doi:10.1007/978-3-540-28632-5_15 BibTeX | RIS

2003

Luigi Lo Iacono, Christoph Ruland: Vertrauliche Video-Konferenzen im Internet.
URL BibTeX | RIS

Bert den Boer, Kerstin Lemke, Guntram Wicke: A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
doi:10.1007/3-540-36400-5_18 BibTeX | RIS