Veröffentlichungen
Personal Privacy Assistants for the Internet of Things
2018 - Anupam Das, Martin Degeling, Daniel Smullen, Norman Sadeh
IEEE Pervasive Computing ( Volume: 17 , Issue: 3 , Jul.-Sep. 2018 ) [pdf] [DOI] [IEEE]On Security Research Towards Future Mobile Network Generations
2018 - David Rupprecht, Adrian Dabrowski, Thorsten Holz, Edgar Weippl, Christina Pöpper
IEEE Communications Surveys and Tutorials, Volume: 20, Issue:3, 2018 [arXiv] [IEEE Xplore]What is wrong about Robocops as consultants? A technology-centric critique of predictive policing
2017 - Martin Degeling, Bettina Berendt
AI & SOCIETY, August 2018 [pdf] [DOI]Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding
2017 - Hendrik Meutzner, Santosh Gupta, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa
ACM Transactions on Privacy and Security (TOPS), Volume 19, Issue 4, February 2017May the Force be with You: The Future of Force-Sensitive Authentication
2017 - Katharina Krombholz, Thomas Hupperich, Thorsten Holz
Journal of Internet Computing, Special Issue of Usable Security and Privacy, 2017 [pdf]Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive
2016 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar
Journal of Cryptographic Engineering, Springer, June 2016. [DOI] [pdf]On Network Operating System Security
2016 - Christian Röpke, Thorsten Holz
International Journal of Network Management (IJNM) - Special Issue on Software-Defined Networking and Network Function Virtualization for Flexible Network Management, 2016FPGA Trojans through Detecting and Weakening of Cryptographic Primitives
2015 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Christof Paar
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Volume PP Issue 99, February 2015. [DOI] [pdf]A Trusted Versioning File System for Passive Mobile Storage Devices
2014 - Luigi Catuogno, Hans Löhr, Marcel Winandy, Ahmad-Reza Sadeghi
Journal of Network and Computer Applications, Vol. 38, February 2014, pp. 65-75. http://dx.doi.org/10.1016/j.jnca.2013.05.006 [doi]Mit Sicherheit Mobil: Die Nutzung mobiler Geräte stellt Herausforderungen an Datenschutz und -sicherheit im Klinikalltag
2013 - Agnes Gawlik, Marcel Winandy
E-HEALTH-COM, 06/2013, S. 38-39.