default search action
BibTeX records: Zinaida Benenson
@inproceedings{DBLP:conf/chi/WeinbergerEB23, author = {Lydia Weinberger and Christian Eichenm{\"{u}}ller and Zinaida Benenson}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {Interplay of Security, Privacy and Usability in Videoconferencing}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {185:1--185:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3585683}, doi = {10.1145/3544549.3585683}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WeinbergerEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SchillerAB23, author = {Katharina Schiller and Florian Adamsky and Zinaida Benenson}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {288:1--288:15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3585658}, doi = {10.1145/3544549.3585658}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/SchillerAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BumillerEB23, author = {Franziska Bumiller and Christian Eichenm{\"{u}}ller and Zinaida Benenson}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters}, title = {"You're not smart enough for it. You can't do it anyway." - Experiences and Coping Strategies of Female System Administrators}, booktitle = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {326:1--326:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544549.3585648}, doi = {10.1145/3544549.3585648}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/BumillerEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-15259, author = {Julia Wunder and Andreas Kurtz and Christian Eichenm{\"{u}}ller and Freya Gassmann and Zinaida Benenson}, title = {Shedding Light on {CVSS} Scoring Inconsistencies: {A} User-Centric Study on Evaluating Widespread Security Vulnerabilities}, journal = {CoRR}, volume = {abs/2308.15259}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.15259}, doi = {10.48550/ARXIV.2308.15259}, eprinttype = {arXiv}, eprint = {2308.15259}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-15259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/GruberVBF22, author = {Jan Gruber and Lena L. Voigt and Zinaida Benenson and Felix C. Freiling}, title = {Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations}, journal = {Digit. Investig.}, volume = {43}, number = {Supplement}, pages = {301438}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301438}, doi = {10.1016/J.FSIDI.2022.301438}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/GruberVBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KorberKMB22, author = {Michael K{\"{o}}rber and Anatoli Kalysch and Werner Massonne and Zinaida Benenson}, editor = {Weizhi Meng and Simone Fischer{-}H{\"{u}}bner and Christian Damsgaard Jensen}, title = {Usability of Antivirus Tools in a Threat Detection Scenario}, booktitle = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11 International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {648}, pages = {306--322}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06975-8\_18}, doi = {10.1007/978-3-031-06975-8\_18}, timestamp = {Tue, 21 Jun 2022 15:17:37 +0200}, biburl = {https://dblp.org/rec/conf/sec/KorberKMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/RenaudBO20, author = {Karen Renaud and Zinaida Benenson and Daniela Oliveira}, title = {Balancing resistance and resilience}, journal = {Netw. Secur.}, volume = {2020}, number = {7}, pages = {20}, year = {2020}, url = {https://doi.org/10.1016/S1353-4858(20)30083-0}, doi = {10.1016/S1353-4858(20)30083-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/RenaudBO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/PuglieseRGB20, author = {Gaston Pugliese and Christian Riess and Freya Gassmann and Zinaida Benenson}, title = {Long-Term Observation on Browser Fingerprinting: Users' Trackability and Perspective}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {558--577}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0041}, doi = {10.2478/POPETS-2020-0041}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/PuglieseRGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MorgnerMKFB20, author = {Philipp Morgner and Christoph Mai and Nicole Koschate{-}Fischer and Felix C. Freiling and Zinaida Benenson}, title = {Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {429--446}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00021}, doi = {10.1109/SP40000.2020.00021}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/MorgnerMKFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-01644, author = {Juan Quintero and Zinaida Benenson}, title = {Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View}, journal = {CoRR}, volume = {abs/2011.01644}, year = {2020}, url = {https://arxiv.org/abs/2011.01644}, eprinttype = {arXiv}, eprint = {2011.01644}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-01644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/SchillerFBM19, author = {Jan Schiller and Felix C. Freiling and Zinaida Benenson and Werner Massonne}, title = {Berufsbegleitendes Studieren an Universit{\"{a}}ten - Ein Zukunftsfeld f{\"{u}}r die IT-Sicherheit}, journal = {Inform. Spektrum}, volume = {42}, number = {1}, pages = {38--47}, year = {2019}, url = {https://doi.org/10.1007/s00287-019-01145-6}, doi = {10.1007/S00287-019-01145-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/SchillerFBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmknechtBMMR19, author = {Frederik Armknecht and Zinaida Benenson and Philipp Morgner and Christian M{\"{u}}ller and Christian Riess}, title = {Privacy implications of room climate data}, journal = {J. Comput. Secur.}, volume = {27}, number = {1}, pages = {113--136}, year = {2019}, url = {https://doi.org/10.3233/JCS-181133}, doi = {10.3233/JCS-181133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmknechtBMMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ReinfelderLB19, author = {Lena Reinfelder and Robert Landwirth and Zinaida Benenson}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Security Managers Are Not The Enemy Either}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {433}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300663}, doi = {10.1145/3290605.3300663}, timestamp = {Sun, 02 Jun 2019 21:13:35 +0200}, biburl = {https://dblp.org/rec/conf/chi/ReinfelderLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlmi2/QuinteroB19, author = {Juan Quintero and Zinaida Benenson}, title = {Understanding Usability and User Acceptance of Usage-Based Insurance from Users' View}, booktitle = {Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, {MLMI} 2019, Jakarta, Indonesia, September 18-20, 2019}, pages = {52--57}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3366750.3366759}, doi = {10.1145/3366750.3366759}, timestamp = {Thu, 09 Mar 2023 12:23:53 +0100}, biburl = {https://dblp.org/rec/conf/mlmi2/QuinteroB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07841, author = {Lamya Abdullah and Felix C. Freiling and Juan Quintero and Zinaida Benenson}, title = {Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing}, journal = {CoRR}, volume = {abs/1906.07841}, year = {2019}, url = {http://arxiv.org/abs/1906.07841}, eprinttype = {arXiv}, eprint = {1906.07841}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07841.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-11094, author = {Philipp Morgner and Christoph Mai and Nicole Koschate{-}Fischer and Felix C. Freiling and Zinaida Benenson}, title = {Security Update Labels: Establishing Economic Incentives for Security Patching of IoT Consumer Products}, journal = {CoRR}, volume = {abs/1906.11094}, year = {2019}, url = {http://arxiv.org/abs/1906.11094}, eprinttype = {arXiv}, eprint = {1906.11094}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-11094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BenensonJOS19, author = {Zinaida Benenson and Marianne Junger and Daniela Oliveira and Gianluca Stringhini}, title = {Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)}, journal = {Dagstuhl Reports}, volume = {9}, number = {7}, pages = {117--154}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.7.117}, doi = {10.4230/DAGREP.9.7.117}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BenensonJOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbdullahFQB18, author = {Lamya Abdullah and Felix C. Freiling and Juan Quintero and Zinaida Benenson}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing}, booktitle = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, pages = {137--152}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12786-2\_9}, doi = {10.1007/978-3-030-12786-2\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AbdullahFQB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MorgnerPSB18, author = {Philipp Morgner and Stefan Pfennig and Dennis Salzner and Zinaida Benenson}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Malicious IoT Implants: Tampering with Serial Communication over the Internet}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {535--555}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_25}, doi = {10.1007/978-3-030-00470-5\_25}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/MorgnerPSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HanschSPFB18, author = {Norman H{\"{a}}nsch and Andrea Schankin and Mykolai Protsenko and Felix C. Freiling and Zinaida Benenson}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {341--356}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/hansch}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/HanschSPFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ReinfelderSRB18, author = {Lena Reinfelder and Andrea Schankin and Sophie Russ and Zinaida Benenson}, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {An Inquiry into Perception and Usage of Smartphone Permission Models}, booktitle = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, pages = {9--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1\_2}, doi = {10.1007/978-3-319-98385-1\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/ReinfelderSRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerFB18, author = {Philipp Morgner and Felix C. Freiling and Zinaida Benenson}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {208--211}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212486}, doi = {10.1145/3212480.3212486}, timestamp = {Mon, 16 Sep 2019 13:25:53 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12035, author = {Philipp Morgner and Zinaida Benenson}, title = {Exploring Security Economics in IoT Standardization Efforts}, journal = {CoRR}, volume = {abs/1810.12035}, year = {2018}, url = {http://arxiv.org/abs/1810.12035}, eprinttype = {arXiv}, eprint = {1810.12035}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MorgnerMRERAB17, author = {Philipp Morgner and Christian M{\"{u}}ller and Matthias Ring and Bj{\"{o}}rn M. Eskofier and Christian Riess and Frederik Armknecht and Zinaida Benenson}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Privacy Implications of Room Climate Data}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {324--343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_18}, doi = {10.1007/978-3-319-66399-9\_18}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MorgnerMRERAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BenensonGL17, author = {Zinaida Benenson and Freya Gassmann and Robert Landwirth}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Unpacking Spear Phishing Susceptibility}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {610--627}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_39}, doi = {10.1007/978-3-319-70278-0\_39}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/BenensonGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mc/ReinfelderB17, author = {Lena Reinfelder and Zinaida Benenson}, editor = {Manuel Burghardt and Raphael Wimmer and Christian Wolff and Christa Womser{-}Hacker}, title = {Exploring Security Processes in Organizations: the Case of Smartphones}, booktitle = {Mensch und Computer 2017 - Workshopband, Regensburg, Germany, September 10-13, 2017}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2017}, url = {https://doi.org/10.18420/muc2017-ws05-0403}, doi = {10.18420/MUC2017-WS05-0403}, timestamp = {Thu, 07 Dec 2023 20:48:59 +0100}, biburl = {https://dblp.org/rec/conf/mc/ReinfelderB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17, author = {Philipp Morgner and Stephan Mattejat and Zinaida Benenson and Christian M{\"{u}}ller and Frederik Armknecht}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {230--240}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098254}, doi = {10.1145/3098243.3098254}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SangerHGBLS16, author = {Johannes S{\"{a}}nger and Norman H{\"{a}}nsch and Brian Glass and Zinaida Benenson and Robert Landwirth and M. Angela Sasse}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Look Before You Leap: Improving the Users' Ability to Detect Fraud in Electronic Marketplaces}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {3870--3882}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858555}, doi = {10.1145/2858036.2858555}, timestamp = {Wed, 01 Jun 2022 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/chi/SangerHGBLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerABM16, author = {Christian M{\"{u}}ller and Frederik Armknecht and Zinaida Benenson and Philipp Morgner}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {On the security of the ZigBee Light Link touchlink commissioning procedure}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {229--240}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/874}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stast/2016, editor = {Gabriele Lenzini and Giampaolo Bella and Zinaida Benenson and Carrie E. Gates}, title = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3046055}, doi = {10.1145/3046055}, isbn = {978-1-4503-4826-3}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stast/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MorgnerMB16, author = {Philipp Morgner and Stephan Mattejat and Zinaida Benenson}, title = {All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems}, journal = {CoRR}, volume = {abs/1608.03732}, year = {2016}, url = {http://arxiv.org/abs/1608.03732}, eprinttype = {arXiv}, eprint = {1608.03732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MorgnerMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/KrontirisBGSRS15, author = {Ioannis Krontiris and Zinaida Benenson and Anna Girard and Ahmad Sabouri and Kai Rannenberg and Peter Schoo}, editor = {Bettina Berendt and Thomas Engel and Demosthenes Ikonomou and Daniel Le M{\'{e}}tayer and Stefan Schiffner}, title = {Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers}, booktitle = {Privacy Technologies and Policy - Third Annual Privacy Forum, {APF} 2015, Luxembourg, October 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9484}, pages = {104--123}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31456-3\_6}, doi = {10.1007/978-3-319-31456-3\_6}, timestamp = {Sat, 09 Apr 2022 12:38:57 +0200}, biburl = {https://dblp.org/rec/conf/apf/KrontirisBGSRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BenensonLOPU15, author = {Zinaida Benenson and Gabriele Lenzini and Daniela Oliveira and Simon Parkin and Sven Uebelacker}, editor = {Anil Somayaji and Paul C. van Oorschot and Mohammad Mannan and Rainer B{\"{o}}hme}, title = {Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security}, booktitle = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015, Twente, The Netherlands, September 8-11, 2015}, pages = {85--99}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2841113.2841120}, doi = {10.1145/2841113.2841120}, timestamp = {Thu, 25 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BenensonLOPU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/BenensonGK15, author = {Zinaida Benenson and Anna Girard and Ioannis Krontiris}, title = {User Acceptance Factors for Anonymous Credentials: An Empirical Investigation}, booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS} 2015, Delft, The Netherlands, 22-23 June, 2015}, year = {2015}, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_benenson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/weis/BenensonGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/StamatiouBGKLPT15, author = {Yannis C. Stamatiou and Zinaida Benenson and Anna Girard and Ioannis Krontiris and Vasiliki Liagkou and Apostolos Pyrgelis and Welderufael Tesfay}, editor = {Kai Rannenberg and Jan Camenisch and Ahmad Sabouri}, title = {Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust}, booktitle = {Attribute-based Credentials for Trust: Identity in the Information Society}, pages = {197--239}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14439-9\_7}, doi = {10.1007/978-3-319-14439-9\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/p/StamatiouBGKLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/HanschB14, author = {Norman H{\"{a}}nsch and Zinaida Benenson}, title = {Specifying {IT} Security Awareness}, booktitle = {25th International Workshop on Database and Expert Systems Applications, {DEXA} 2014, Munich, Germany, September 1-5, 2014}, pages = {326--330}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DEXA.2014.71}, doi = {10.1109/DEXA.2014.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/HanschB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/BenensonGKLRS14, author = {Zinaida Benenson and Anna Girard and Ioannis Krontiris and Vassia Liagkou and Kai Rannenberg and Yannis C. Stamatiou}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {User Acceptance of Privacy-ABCs: An Exploratory Study}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second International Conference, {HAS} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8533}, pages = {375--386}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07620-1\_33}, doi = {10.1007/978-3-319-07620-1\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/BenensonGKLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BenensonGHL14, author = {Zinaida Benenson and Anna Girard and Nadina Hintz and Andreas Luder}, title = {Susceptibility to URL-based Internet attacks: Facebook vs. email}, booktitle = {2014 {IEEE} International Conference on Pervasive Computing and Communication Workshops, PerCom 2014 Workshops, Budapest, Hungary, March 24-28, 2014}, pages = {604--609}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PerComW.2014.6815275}, doi = {10.1109/PERCOMW.2014.6815275}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BenensonGHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HintzEBF14, author = {Nadina Hintz and Markus Engelberth and Zinaida Benenson and Felix C. Freiling}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung von Phishing-Experimenten}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {37--51}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20067}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ReinfelderBG14, author = {Lena Reinfelder and Zinaida Benenson and Freya Gassmann}, editor = {Claudia Eckert and Sokratis K. Katsikas and G{\"{u}}nther Pernul}, title = {Differences between Android and iPhone Users in Their Security and Privacy Awareness}, booktitle = {Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8647}, pages = {156--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09770-1\_14}, doi = {10.1007/978-3-319-09770-1\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/ReinfelderBG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BenensonGR13, author = {Zinaida Benenson and Freya Gassmann and Lena Reinfelder}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {Android and iOS users' differences concerning security and privacy}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts}, pages = {817--822}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2468356.2468502}, doi = {10.1145/2468356.2468502}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/BenensonGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/BenensonKK12, author = {Zinaida Benenson and Olaf Kroll{-}Peters and Matthias Krupp}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {Security feeling of mobile phone users}, booktitle = {Federated Conference on Computer Science and Information Systems - FedCSIS 2012, Wroclaw, Poland, 9-12 September 2012, Proceedings}, pages = {1179--1183}, year = {2012}, url = {https://fedcsis.org/proceedings/2012/pliks/207.pdf}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fedcsis/BenensonKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonKK12, author = {Zinaida Benenson and Olaf Kroll{-}Peters and Matthias Krupp}, editor = {Neeraj Suri and Michael Waidner}, title = {Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endger{\"{a}}te}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {7--24}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18284}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BenensonDEFMMVS11, author = {Zinaida Benenson and Andreas Dewald and Hans{-}Georg E{\ss}er and Felix C. Freiling and Tilo M{\"{u}}ller and Christian Moch and Stefan V{\"{o}}mel and Sebastian Schinzel and Michael Spreitzenbarth and Ben Stock and Johannes St{\"{u}}ttgen}, title = {Exploring the Landscape of Cybercrime}, booktitle = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands, July 6, 2011}, pages = {71--74}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.23}, doi = {10.1109/SYSSEC.2011.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/BenensonDEFMMVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/BestehornBBJBF10, author = {Markus Bestehorn and Zinaida Benenson and Erik Buchmann and Marek Jawurek and Klemens B{\"{o}}hm and Felix C. Freiling}, title = {Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {9}, number = {1-2}, pages = {85--107}, year = {2010}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-85-107/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/BestehornBBJBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/it/BenensonBF10, author = {Zinaida Benenson and Erik{-}Oliver Bla{\ss} and Felix C. Freiling}, title = {Attacker Models for Wireless Sensor Networks (Angreifermodelle f{\"{u}}r drahtlose Sensornetze)}, journal = {it Inf. Technol.}, volume = {52}, number = {6}, pages = {320--324}, year = {2010}, url = {https://doi.org/10.1524/itit.2010.0609}, doi = {10.1524/ITIT.2010.0609}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/it/BenensonBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/KrontirisBGFD09, author = {Ioannis Krontiris and Zinaida Benenson and Thanassis Giannetsos and Felix C. Freiling and Tassos Dimitriou}, editor = {Utz Roedig and Cormac J. Sreenan}, title = {Cooperative Intrusion Detection in Wireless Sensor Networks}, booktitle = {Wireless Sensor Networks, 6th European Conference, {EWSN} 2009, Cork, Ireland, February 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5432}, pages = {263--278}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00224-3\_17}, doi = {10.1007/978-3-642-00224-3\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/KrontirisBGFD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Benenson2008, author = {Zinaida Benenson}, title = {Access control in wireless sensor networks}, school = {University of Mannheim, Germany}, year = {2008}, url = {http://madoc.bib.uni-mannheim.de/madoc/volltexte/2009/2393/}, urn = {urn:nbn:de:bsz:180-madoc-23938}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Benenson2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/BenensonBBFJ08, author = {Zinaida Benenson and Markus Bestehorn and Erik Buchmann and Felix C. Freiling and Marek Jawurek}, editor = {David Coudert and David Simplot{-}Ryl and Ivan Stojmenovic}, title = {Query Dissemination with Predictable Reachability and Energy Usage in Sensor Networks}, booktitle = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference, {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5198}, pages = {279--292}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85209-4\_22}, doi = {10.1007/978-3-540-85209-4\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/BenensonBBFJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsware/BrustARB07, author = {Matthias R. Brust and Adrian Andronache and Steffen Rothkugel and Zinaida Benenson}, editor = {Sanjoy Paul and Henning Schulzrinne and G. Venkatesh}, title = {Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc and Sensor Networks}, booktitle = {Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE {(COMSWARE} 2007), January 7-12, 2007, Bangalore, India}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/COMSWA.2007.382475}, doi = {10.1109/COMSWA.2007.382475}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsware/BrustARB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Benenson07, author = {Zinaida Benenson}, editor = {Dorothea Wagner and Roger Wattenhofer}, title = {Lower Bounds}, booktitle = {Algorithms for Sensor and Ad Hoc Networks, Advanced Lectures [result from a Dagstuhl seminar]}, series = {Lecture Notes in Computer Science}, volume = {4621}, pages = {117--130}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74991-2\_7}, doi = {10.1007/978-3-540-74991-2\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Benenson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/BenensonFC07, author = {Zinaida Benenson and Felix C. Freiling and Peter M. Cholewinski}, editor = {Christian Becker and Christian S. Jensen and Jianwen Su and Daniela Nicklas}, title = {Advanced Evasive Data Storage in Sensor Networks}, booktitle = {8th International Conference on Mobile Data Management {(MDM} 2007), Mannheim, Germany, May 7-11, 2007}, pages = {146--151}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/MDM.2007.29}, doi = {10.1109/MDM.2007.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/BenensonFC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/BenesonFHKP06, author = {Zinaida Benenson and Felix C. Freiling and Thorsten Holz and Dogan Kesdogan and Lucia Draque Penso}, editor = {Wolfgang Karl and J{\"{u}}rgen Becker and Karl{-}Erwin Gro{\ss}pietsch and Christian Hochberger and Erik Maehle}, title = {Safety, Liveness, and Information Flow: Dependability Revisited}, booktitle = {{ARCS} 2006 - 19th International Conference on Architecture of Computing Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main, Germany}, series = {{LNI}}, volume = {{P-81}}, pages = {56--65}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/29437}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BenensonFPRW06, author = {Zinaida Benenson and Felix C. Freiling and Birgit Pfitzmann and Christian Rohner and Michael Waidner}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {165--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_15}, doi = {10.1007/11964254\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FortFPBK06, author = {Milan Fort and Felix C. Freiling and Lucia Draque Penso and Zinaida Benenson and Dogan Kesdogan}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {TrustedPals: Secure Multiparty Computation Implemented with Smart Cards}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {34--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_3}, doi = {10.1007/11863908\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/FortFPBK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/AchtzehnBR06, author = {Andreas Achtzehn and Zinaida Benenson and Christian Rohner}, title = {Implementing Agreement Protocols in Sensor Networks}, booktitle = {{IEEE} 3rd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2006, 9-12 October 2006, Vancouver, BC, Canada}, pages = {858--863}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MOBHOC.2006.278665}, doi = {10.1109/MOBHOC.2006.278665}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/AchtzehnBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BenensonPFL06, author = {Zinaida Benenson and Lexi Pimenidis and Felix C. Freiling and Stefan Lucks}, title = {Authenticated Query Flooding in Sensor Networks}, booktitle = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy}, pages = {644--647}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PERCOMW.2006.23}, doi = {10.1109/PERCOMW.2006.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BenensonPFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BenensonFHLP06, author = {Zinaida Benenson and Felix C. Freiling and Ernest Hammerschmidt and Stefan Lucks and Lexi Pimenidis}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Authenticated Query Flooding in Sensor Networks}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {38--49}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_4}, doi = {10.1007/0-387-33406-8\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BenensonFHLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {Jana Dittmann}, title = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {26--29}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24799}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {104--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_9}, doi = {10.1007/11734666\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BenensonKL05, author = {Zinaida Benenson and Ulrich K{\"{u}}hn and Stefan Lucks}, editor = {Irene Eusgeld and Felix C. Freiling and Ralf H. Reussner}, title = {Cryptographic Attack Metrics}, booktitle = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005]}, series = {Lecture Notes in Computer Science}, volume = {4909}, pages = {133--156}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-68947-8\_12}, doi = {10.1007/978-3-540-68947-8\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BenensonKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, title = {An algorithmic framework for robust access control in wireless sensor networks}, booktitle = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul, Turkey, January 31 - February 2, 2005, Proceedings}, pages = {158--165}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/EWSN.2005.1462007}, doi = {10.1109/EWSN.2005.1462007}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewsn/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcs/BenensonCF05, author = {Zinaida Benenson and Peter M. Cholewinski and Felix C. Freiling}, editor = {S. Q. Zheng}, title = {Simple Evasive Data Storage in Sensor Networks}, booktitle = {International Conference on Parallel and Distributed Computing Systems, {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}}, pages = {779--784}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Wed, 09 Nov 2022 13:58:44 +0100}, biburl = {https://dblp.org/rec/conf/pdcs/BenensonCF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Hannes Federrath}, title = {Secure Multi-Party Computation with Security Modules}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {41--52}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28394}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/BenensonGK04, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Peter Dadam and Manfred Reichert}, title = {User Authentication in Sensor Networks}, booktitle = {34. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik verbindet, {INFORMATIK} 2004, Ulm, Germany, September 20-24, 2004, Band 2}, series = {{LNI}}, volume = {{P-51}}, pages = {385--389}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/28800}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gi/BenensonGK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.