BibTeX records: Zinaida Benenson

download as .bib file

@inproceedings{DBLP:conf/chi/WeinbergerEB23,
  author       = {Lydia Weinberger and
                  Christian Eichenm{\"{u}}ller and
                  Zinaida Benenson},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {Interplay of Security, Privacy and Usability in Videoconferencing},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {185:1--185:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3585683},
  doi          = {10.1145/3544549.3585683},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WeinbergerEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SchillerAB23,
  author       = {Katharina Schiller and
                  Florian Adamsky and
                  Zinaida Benenson},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {Towards an Empirical Study to Determine the Effectiveness of Support
                  Systems against E-Mail Phishing Attacks},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {288:1--288:15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3585658},
  doi          = {10.1145/3544549.3585658},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/SchillerAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BumillerEB23,
  author       = {Franziska Bumiller and
                  Christian Eichenm{\"{u}}ller and
                  Zinaida Benenson},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters},
  title        = {"You're not smart enough for it. You can't do it anyway."
                  - Experiences and Coping Strategies of Female System Administrators},
  booktitle    = {Extended Abstracts of the 2023 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} {EA} 2023, Hamburg, Germany, April 23-28,
                  2023},
  pages        = {326:1--326:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544549.3585648},
  doi          = {10.1145/3544549.3585648},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BumillerEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-15259,
  author       = {Julia Wunder and
                  Andreas Kurtz and
                  Christian Eichenm{\"{u}}ller and
                  Freya Gassmann and
                  Zinaida Benenson},
  title        = {Shedding Light on {CVSS} Scoring Inconsistencies: {A} User-Centric
                  Study on Evaluating Widespread Security Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/2308.15259},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.15259},
  doi          = {10.48550/ARXIV.2308.15259},
  eprinttype    = {arXiv},
  eprint       = {2308.15259},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-15259.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/GruberVBF22,
  author       = {Jan Gruber and
                  Lena L. Voigt and
                  Zinaida Benenson and
                  Felix C. Freiling},
  title        = {Foundations of cybercriminalistics: From general process models to
                  case-specific concretizations in cybercrime investigations},
  journal      = {Digit. Investig.},
  volume       = {43},
  number       = {Supplement},
  pages        = {301438},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301438},
  doi          = {10.1016/J.FSIDI.2022.301438},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/GruberVBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KorberKMB22,
  author       = {Michael K{\"{o}}rber and
                  Anatoli Kalysch and
                  Werner Massonne and
                  Zinaida Benenson},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {Usability of Antivirus Tools in a Threat Detection Scenario},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {648},
  pages        = {306--322},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_18},
  doi          = {10.1007/978-3-031-06975-8\_18},
  timestamp    = {Tue, 21 Jun 2022 15:17:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KorberKMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/RenaudBO20,
  author       = {Karen Renaud and
                  Zinaida Benenson and
                  Daniela Oliveira},
  title        = {Balancing resistance and resilience},
  journal      = {Netw. Secur.},
  volume       = {2020},
  number       = {7},
  pages        = {20},
  year         = {2020},
  url          = {https://doi.org/10.1016/S1353-4858(20)30083-0},
  doi          = {10.1016/S1353-4858(20)30083-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/RenaudBO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/PuglieseRGB20,
  author       = {Gaston Pugliese and
                  Christian Riess and
                  Freya Gassmann and
                  Zinaida Benenson},
  title        = {Long-Term Observation on Browser Fingerprinting: Users' Trackability
                  and Perspective},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {2},
  pages        = {558--577},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0041},
  doi          = {10.2478/POPETS-2020-0041},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/PuglieseRGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MorgnerMKFB20,
  author       = {Philipp Morgner and
                  Christoph Mai and
                  Nicole Koschate{-}Fischer and
                  Felix C. Freiling and
                  Zinaida Benenson},
  title        = {Security Update Labels: Establishing Economic Incentives for Security
                  Patching of IoT Consumer Products},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {429--446},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00021},
  doi          = {10.1109/SP40000.2020.00021},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MorgnerMKFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-01644,
  author       = {Juan Quintero and
                  Zinaida Benenson},
  title        = {Understanding Usability and User Acceptance of Usage-Based Insurance
                  from Users' View},
  journal      = {CoRR},
  volume       = {abs/2011.01644},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.01644},
  eprinttype    = {arXiv},
  eprint       = {2011.01644},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-01644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/SchillerFBM19,
  author       = {Jan Schiller and
                  Felix C. Freiling and
                  Zinaida Benenson and
                  Werner Massonne},
  title        = {Berufsbegleitendes Studieren an Universit{\"{a}}ten - Ein Zukunftsfeld
                  f{\"{u}}r die IT-Sicherheit},
  journal      = {Inform. Spektrum},
  volume       = {42},
  number       = {1},
  pages        = {38--47},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00287-019-01145-6},
  doi          = {10.1007/S00287-019-01145-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/SchillerFBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmknechtBMMR19,
  author       = {Frederik Armknecht and
                  Zinaida Benenson and
                  Philipp Morgner and
                  Christian M{\"{u}}ller and
                  Christian Riess},
  title        = {Privacy implications of room climate data},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {113--136},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181133},
  doi          = {10.3233/JCS-181133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmknechtBMMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ReinfelderLB19,
  author       = {Lena Reinfelder and
                  Robert Landwirth and
                  Zinaida Benenson},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Security Managers Are Not The Enemy Either},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {433},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300663},
  doi          = {10.1145/3290605.3300663},
  timestamp    = {Sun, 02 Jun 2019 21:13:35 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/ReinfelderLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlmi2/QuinteroB19,
  author       = {Juan Quintero and
                  Zinaida Benenson},
  title        = {Understanding Usability and User Acceptance of Usage-Based Insurance
                  from Users' View},
  booktitle    = {Proceedings of the 2nd International Conference on Machine Learning
                  and Machine Intelligence, {MLMI} 2019, Jakarta, Indonesia, September
                  18-20, 2019},
  pages        = {52--57},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3366750.3366759},
  doi          = {10.1145/3366750.3366759},
  timestamp    = {Thu, 09 Mar 2023 12:23:53 +0100},
  biburl       = {https://dblp.org/rec/conf/mlmi2/QuinteroB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07841,
  author       = {Lamya Abdullah and
                  Felix C. Freiling and
                  Juan Quintero and
                  Zinaida Benenson},
  title        = {Sealed Computation: Abstract Requirements for Mechanisms to Support
                  Trustworthy Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1906.07841},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07841},
  eprinttype    = {arXiv},
  eprint       = {1906.07841},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07841.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-11094,
  author       = {Philipp Morgner and
                  Christoph Mai and
                  Nicole Koschate{-}Fischer and
                  Felix C. Freiling and
                  Zinaida Benenson},
  title        = {Security Update Labels: Establishing Economic Incentives for Security
                  Patching of IoT Consumer Products},
  journal      = {CoRR},
  volume       = {abs/1906.11094},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.11094},
  eprinttype    = {arXiv},
  eprint       = {1906.11094},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-11094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BenensonJOS19,
  author       = {Zinaida Benenson and
                  Marianne Junger and
                  Daniela Oliveira and
                  Gianluca Stringhini},
  title        = {Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar
                  19302)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {7},
  pages        = {117--154},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.7.117},
  doi          = {10.4230/DAGREP.9.7.117},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BenensonJOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbdullahFQB18,
  author       = {Lamya Abdullah and
                  Felix C. Freiling and
                  Juan Quintero and
                  Zinaida Benenson},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Sealed Computation: Abstract Requirements for Mechanisms to Support
                  Trustworthy Cloud Computing},
  booktitle    = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12786-2\_9},
  doi          = {10.1007/978-3-030-12786-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AbdullahFQB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorgnerPSB18,
  author       = {Philipp Morgner and
                  Stefan Pfennig and
                  Dennis Salzner and
                  Zinaida Benenson},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Malicious IoT Implants: Tampering with Serial Communication over the
                  Internet},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {535--555},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_25},
  doi          = {10.1007/978-3-030-00470-5\_25},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MorgnerPSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HanschSPFB18,
  author       = {Norman H{\"{a}}nsch and
                  Andrea Schankin and
                  Mykolai Protsenko and
                  Felix C. Freiling and
                  Zinaida Benenson},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {Programming Experience Might Not Help in Comprehending Obfuscated
                  Source Code Efficiently},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {341--356},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/hansch},
  timestamp    = {Mon, 01 Feb 2021 08:41:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HanschSPFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ReinfelderSRB18,
  author       = {Lena Reinfelder and
                  Andrea Schankin and
                  Sophie Russ and
                  Zinaida Benenson},
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {An Inquiry into Perception and Usage of Smartphone Permission Models},
  booktitle    = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  pages        = {9--22},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1\_2},
  doi          = {10.1007/978-3-319-98385-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/ReinfelderSRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerFB18,
  author       = {Philipp Morgner and
                  Felix C. Freiling and
                  Zinaida Benenson},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {Opinion: Security Lifetime Labels - Overcoming Information Asymmetry
                  in Security of IoT Consumer Products},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {208--211},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212486},
  doi          = {10.1145/3212480.3212486},
  timestamp    = {Mon, 16 Sep 2019 13:25:53 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerFB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12035,
  author       = {Philipp Morgner and
                  Zinaida Benenson},
  title        = {Exploring Security Economics in IoT Standardization Efforts},
  journal      = {CoRR},
  volume       = {abs/1810.12035},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12035},
  eprinttype    = {arXiv},
  eprint       = {1810.12035},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MorgnerMRERAB17,
  author       = {Philipp Morgner and
                  Christian M{\"{u}}ller and
                  Matthias Ring and
                  Bj{\"{o}}rn M. Eskofier and
                  Christian Riess and
                  Frederik Armknecht and
                  Zinaida Benenson},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Privacy Implications of Room Climate Data},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_18},
  doi          = {10.1007/978-3-319-66399-9\_18},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MorgnerMRERAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BenensonGL17,
  author       = {Zinaida Benenson and
                  Freya Gassmann and
                  Robert Landwirth},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Unpacking Spear Phishing Susceptibility},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {610--627},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_39},
  doi          = {10.1007/978-3-319-70278-0\_39},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BenensonGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mc/ReinfelderB17,
  author       = {Lena Reinfelder and
                  Zinaida Benenson},
  editor       = {Manuel Burghardt and
                  Raphael Wimmer and
                  Christian Wolff and
                  Christa Womser{-}Hacker},
  title        = {Exploring Security Processes in Organizations: the Case of Smartphones},
  booktitle    = {Mensch und Computer 2017 - Workshopband, Regensburg, Germany, September
                  10-13, 2017},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2017},
  url          = {https://doi.org/10.18420/muc2017-ws05-0403},
  doi          = {10.18420/MUC2017-WS05-0403},
  timestamp    = {Thu, 07 Dec 2023 20:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/mc/ReinfelderB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17,
  author       = {Philipp Morgner and
                  Stephan Mattejat and
                  Zinaida Benenson and
                  Christian M{\"{u}}ller and
                  Frederik Armknecht},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {230--240},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098254},
  doi          = {10.1145/3098243.3098254},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SangerHGBLS16,
  author       = {Johannes S{\"{a}}nger and
                  Norman H{\"{a}}nsch and
                  Brian Glass and
                  Zinaida Benenson and
                  Robert Landwirth and
                  M. Angela Sasse},
  editor       = {Jofish Kaye and
                  Allison Druin and
                  Cliff Lampe and
                  Dan Morris and
                  Juan Pablo Hourcade},
  title        = {Look Before You Leap: Improving the Users' Ability to Detect Fraud
                  in Electronic Marketplaces},
  booktitle    = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
                  Systems, San Jose, CA, USA, May 7-12, 2016},
  pages        = {3870--3882},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2858036.2858555},
  doi          = {10.1145/2858036.2858555},
  timestamp    = {Wed, 01 Jun 2022 08:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/SangerHGBLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerABM16,
  author       = {Christian M{\"{u}}ller and
                  Frederik Armknecht and
                  Zinaida Benenson and
                  Philipp Morgner},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {On the security of the ZigBee Light Link touchlink commissioning procedure},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {229--240},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/874},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stast/2016,
  editor       = {Gabriele Lenzini and
                  Giampaolo Bella and
                  Zinaida Benenson and
                  Carrie E. Gates},
  title        = {Proceedings of the 6th Workshop on Socio-Technical Aspects in Security
                  and Trust, {STAST} 2016, Los Angeles, CA, USA, December 5, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3046055},
  doi          = {10.1145/3046055},
  isbn         = {978-1-4503-4826-3},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stast/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MorgnerMB16,
  author       = {Philipp Morgner and
                  Stephan Mattejat and
                  Zinaida Benenson},
  title        = {All Your Bulbs Are Belong to Us: Investigating the Current State of
                  Security in Connected Lighting Systems},
  journal      = {CoRR},
  volume       = {abs/1608.03732},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.03732},
  eprinttype    = {arXiv},
  eprint       = {1608.03732},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MorgnerMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/KrontirisBGSRS15,
  author       = {Ioannis Krontiris and
                  Zinaida Benenson and
                  Anna Girard and
                  Ahmad Sabouri and
                  Kai Rannenberg and
                  Peter Schoo},
  editor       = {Bettina Berendt and
                  Thomas Engel and
                  Demosthenes Ikonomou and
                  Daniel Le M{\'{e}}tayer and
                  Stefan Schiffner},
  title        = {Privacy-ABCs as a Case for Studying the Adoption of PETs by Users
                  and Service Providers},
  booktitle    = {Privacy Technologies and Policy - Third Annual Privacy Forum, {APF}
                  2015, Luxembourg, October 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9484},
  pages        = {104--123},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31456-3\_6},
  doi          = {10.1007/978-3-319-31456-3\_6},
  timestamp    = {Sat, 09 Apr 2022 12:38:57 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/KrontirisBGSRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BenensonLOPU15,
  author       = {Zinaida Benenson and
                  Gabriele Lenzini and
                  Daniela Oliveira and
                  Simon Parkin and
                  Sven Uebelacker},
  editor       = {Anil Somayaji and
                  Paul C. van Oorschot and
                  Mohammad Mannan and
                  Rainer B{\"{o}}hme},
  title        = {Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity
                  Theory for Usable Security},
  booktitle    = {Proceedings of the 2015 New Security Paradigms Workshop, {NSPW} 2015,
                  Twente, The Netherlands, September 8-11, 2015},
  pages        = {85--99},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2841113.2841120},
  doi          = {10.1145/2841113.2841120},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/BenensonLOPU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/BenensonGK15,
  author       = {Zinaida Benenson and
                  Anna Girard and
                  Ioannis Krontiris},
  title        = {User Acceptance Factors for Anonymous Credentials: An Empirical Investigation},
  booktitle    = {14th Annual Workshop on the Economics of Information Security, {WEIS}
                  2015, Delft, The Netherlands, 22-23 June, 2015},
  year         = {2015},
  url          = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_benenson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/weis/BenensonGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/StamatiouBGKLPT15,
  author       = {Yannis C. Stamatiou and
                  Zinaida Benenson and
                  Anna Girard and
                  Ioannis Krontiris and
                  Vasiliki Liagkou and
                  Apostolos Pyrgelis and
                  Welderufael Tesfay},
  editor       = {Kai Rannenberg and
                  Jan Camenisch and
                  Ahmad Sabouri},
  title        = {Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust},
  booktitle    = {Attribute-based Credentials for Trust: Identity in the Information
                  Society},
  pages        = {197--239},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14439-9\_7},
  doi          = {10.1007/978-3-319-14439-9\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/p/StamatiouBGKLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/HanschB14,
  author       = {Norman H{\"{a}}nsch and
                  Zinaida Benenson},
  title        = {Specifying {IT} Security Awareness},
  booktitle    = {25th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2014, Munich, Germany, September 1-5, 2014},
  pages        = {326--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DEXA.2014.71},
  doi          = {10.1109/DEXA.2014.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/HanschB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/BenensonGKLRS14,
  author       = {Zinaida Benenson and
                  Anna Girard and
                  Ioannis Krontiris and
                  Vassia Liagkou and
                  Kai Rannenberg and
                  Yannis C. Stamatiou},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {User Acceptance of Privacy-ABCs: An Exploratory Study},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Second
                  International Conference, {HAS} 2014, Held as Part of {HCI} International
                  2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8533},
  pages        = {375--386},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07620-1\_33},
  doi          = {10.1007/978-3-319-07620-1\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/BenensonGKLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BenensonGHL14,
  author       = {Zinaida Benenson and
                  Anna Girard and
                  Nadina Hintz and
                  Andreas Luder},
  title        = {Susceptibility to URL-based Internet attacks: Facebook vs. email},
  booktitle    = {2014 {IEEE} International Conference on Pervasive Computing and Communication
                  Workshops, PerCom 2014 Workshops, Budapest, Hungary, March 24-28,
                  2014},
  pages        = {604--609},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PerComW.2014.6815275},
  doi          = {10.1109/PERCOMW.2014.6815275},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BenensonGHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HintzEBF14,
  author       = {Nadina Hintz and
                  Markus Engelberth and
                  Zinaida Benenson and
                  Felix C. Freiling},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung
                  von Phishing-Experimenten},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {37--51},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20067},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ReinfelderBG14,
  author       = {Lena Reinfelder and
                  Zinaida Benenson and
                  Freya Gassmann},
  editor       = {Claudia Eckert and
                  Sokratis K. Katsikas and
                  G{\"{u}}nther Pernul},
  title        = {Differences between Android and iPhone Users in Their Security and
                  Privacy Awareness},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 11th International
                  Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8647},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09770-1\_14},
  doi          = {10.1007/978-3-319-09770-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/ReinfelderBG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BenensonGR13,
  author       = {Zinaida Benenson and
                  Freya Gassmann and
                  Lena Reinfelder},
  editor       = {Wendy E. Mackay and
                  Stephen A. Brewster and
                  Susanne B{\o}dker},
  title        = {Android and iOS users' differences concerning security and privacy},
  booktitle    = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems,
                  {CHI} '13, Paris, France, April 27 - May 2, 2013, Extended Abstracts},
  pages        = {817--822},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2468356.2468502},
  doi          = {10.1145/2468356.2468502},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/BenensonGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/BenensonKK12,
  author       = {Zinaida Benenson and
                  Olaf Kroll{-}Peters and
                  Matthias Krupp},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {Security feeling of mobile phone users},
  booktitle    = {Federated Conference on Computer Science and Information Systems -
                  FedCSIS 2012, Wroclaw, Poland, 9-12 September 2012, Proceedings},
  pages        = {1179--1183},
  year         = {2012},
  url          = {https://fedcsis.org/proceedings/2012/pliks/207.pdf},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fedcsis/BenensonKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BenensonKK12,
  author       = {Zinaida Benenson and
                  Olaf Kroll{-}Peters and
                  Matthias Krupp},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endger{\"{a}}te},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {7--24},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18284},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BenensonKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/BenensonDEFMMVS11,
  author       = {Zinaida Benenson and
                  Andreas Dewald and
                  Hans{-}Georg E{\ss}er and
                  Felix C. Freiling and
                  Tilo M{\"{u}}ller and
                  Christian Moch and
                  Stefan V{\"{o}}mel and
                  Sebastian Schinzel and
                  Michael Spreitzenbarth and
                  Ben Stock and
                  Johannes St{\"{u}}ttgen},
  title        = {Exploring the Landscape of Cybercrime},
  booktitle    = {First SysSec Workshop 2011, SysSec@DIMVA 2011, Amsterdam, The Netherlands,
                  July 6, 2011},
  pages        = {71--74},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SysSec.2011.23},
  doi          = {10.1109/SYSSEC.2011.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/BenensonDEFMMVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/BestehornBBJBF10,
  author       = {Markus Bestehorn and
                  Zinaida Benenson and
                  Erik Buchmann and
                  Marek Jawurek and
                  Klemens B{\"{o}}hm and
                  Felix C. Freiling},
  title        = {Query Dissemination in Sensor Networks - Predicting Reachability and
                  Energy Consumption},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {9},
  number       = {1-2},
  pages        = {85--107},
  year         = {2010},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-85-107/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/BestehornBBJBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/it/BenensonBF10,
  author       = {Zinaida Benenson and
                  Erik{-}Oliver Bla{\ss} and
                  Felix C. Freiling},
  title        = {Attacker Models for Wireless Sensor Networks (Angreifermodelle f{\"{u}}r
                  drahtlose Sensornetze)},
  journal      = {it Inf. Technol.},
  volume       = {52},
  number       = {6},
  pages        = {320--324},
  year         = {2010},
  url          = {https://doi.org/10.1524/itit.2010.0609},
  doi          = {10.1524/ITIT.2010.0609},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/it/BenensonBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/KrontirisBGFD09,
  author       = {Ioannis Krontiris and
                  Zinaida Benenson and
                  Thanassis Giannetsos and
                  Felix C. Freiling and
                  Tassos Dimitriou},
  editor       = {Utz Roedig and
                  Cormac J. Sreenan},
  title        = {Cooperative Intrusion Detection in Wireless Sensor Networks},
  booktitle    = {Wireless Sensor Networks, 6th European Conference, {EWSN} 2009, Cork,
                  Ireland, February 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5432},
  pages        = {263--278},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00224-3\_17},
  doi          = {10.1007/978-3-642-00224-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/KrontirisBGFD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Benenson2008,
  author       = {Zinaida Benenson},
  title        = {Access control in wireless sensor networks},
  school       = {University of Mannheim, Germany},
  year         = {2008},
  url          = {http://madoc.bib.uni-mannheim.de/madoc/volltexte/2009/2393/},
  urn          = {urn:nbn:de:bsz:180-madoc-23938},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Benenson2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/BenensonBBFJ08,
  author       = {Zinaida Benenson and
                  Markus Bestehorn and
                  Erik Buchmann and
                  Felix C. Freiling and
                  Marek Jawurek},
  editor       = {David Coudert and
                  David Simplot{-}Ryl and
                  Ivan Stojmenovic},
  title        = {Query Dissemination with Predictable Reachability and Energy Usage
                  in Sensor Networks},
  booktitle    = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference,
                  {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5198},
  pages        = {279--292},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85209-4\_22},
  doi          = {10.1007/978-3-540-85209-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/BenensonBBFJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsware/BrustARB07,
  author       = {Matthias R. Brust and
                  Adrian Andronache and
                  Steffen Rothkugel and
                  Zinaida Benenson},
  editor       = {Sanjoy Paul and
                  Henning Schulzrinne and
                  G. Venkatesh},
  title        = {Topology-based Clusterhead Candidate Selection in Wireless Ad-hoc
                  and Sensor Networks},
  booktitle    = {Proceedings of the Second International Conference on COMmunication
                  System softWAre and MiddlewaRE {(COMSWARE} 2007), January 7-12, 2007,
                  Bangalore, India},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMSWA.2007.382475},
  doi          = {10.1109/COMSWA.2007.382475},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsware/BrustARB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Benenson07,
  author       = {Zinaida Benenson},
  editor       = {Dorothea Wagner and
                  Roger Wattenhofer},
  title        = {Lower Bounds},
  booktitle    = {Algorithms for Sensor and Ad Hoc Networks, Advanced Lectures [result
                  from a Dagstuhl seminar]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4621},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74991-2\_7},
  doi          = {10.1007/978-3-540-74991-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Benenson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/BenensonFC07,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Peter M. Cholewinski},
  editor       = {Christian Becker and
                  Christian S. Jensen and
                  Jianwen Su and
                  Daniela Nicklas},
  title        = {Advanced Evasive Data Storage in Sensor Networks},
  booktitle    = {8th International Conference on Mobile Data Management {(MDM} 2007),
                  Mannheim, Germany, May 7-11, 2007},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDM.2007.29},
  doi          = {10.1109/MDM.2007.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/BenensonFC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arcs/BenesonFHKP06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Thorsten Holz and
                  Dogan Kesdogan and
                  Lucia Draque Penso},
  editor       = {Wolfgang Karl and
                  J{\"{u}}rgen Becker and
                  Karl{-}Erwin Gro{\ss}pietsch and
                  Christian Hochberger and
                  Erik Maehle},
  title        = {Safety, Liveness, and Information Flow: Dependability Revisited},
  booktitle    = {{ARCS} 2006 - 19th International Conference on Architecture of Computing
                  Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main,
                  Germany},
  series       = {{LNI}},
  volume       = {{P-81}},
  pages        = {56--65},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/29437},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arcs/BenesonFHKP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BenensonFPRW06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Birgit Pfitzmann and
                  Christian Rohner and
                  Michael Waidner},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer
                  Ad Hoc Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_15},
  doi          = {10.1007/11964254\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BenensonFPRW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FortFPBK06,
  author       = {Milan Fort and
                  Felix C. Freiling and
                  Lucia Draque Penso and
                  Zinaida Benenson and
                  Dogan Kesdogan},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {TrustedPals: Secure Multiparty Computation Implemented with Smart
                  Cards},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_3},
  doi          = {10.1007/11863908\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/FortFPBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/AchtzehnBR06,
  author       = {Andreas Achtzehn and
                  Zinaida Benenson and
                  Christian Rohner},
  title        = {Implementing Agreement Protocols in Sensor Networks},
  booktitle    = {{IEEE} 3rd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2006, 9-12 October 2006, Vancouver, BC, Canada},
  pages        = {858--863},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MOBHOC.2006.278665},
  doi          = {10.1109/MOBHOC.2006.278665},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/AchtzehnBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BenensonPFL06,
  author       = {Zinaida Benenson and
                  Lexi Pimenidis and
                  Felix C. Freiling and
                  Stefan Lucks},
  title        = {Authenticated Query Flooding in Sensor Networks},
  booktitle    = {4th {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy},
  pages        = {644--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PERCOMW.2006.23},
  doi          = {10.1109/PERCOMW.2006.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BenensonPFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BenensonFHLP06,
  author       = {Zinaida Benenson and
                  Felix C. Freiling and
                  Ernest Hammerschmidt and
                  Stefan Lucks and
                  Lexi Pimenidis},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Authenticated Query Flooding in Sensor Networks},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_4},
  doi          = {10.1007/0-387-33406-8\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BenensonFHLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {Jana Dittmann},
  title        = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {26--29},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24799},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Tampering with Motes: Real-World Physical Attacks on Wireless Sensor
                  Networks},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_9},
  doi          = {10.1007/11734666\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BenensonKL05,
  author       = {Zinaida Benenson and
                  Ulrich K{\"{u}}hn and
                  Stefan Lucks},
  editor       = {Irene Eusgeld and
                  Felix C. Freiling and
                  Ralf H. Reussner},
  title        = {Cryptographic Attack Metrics},
  booktitle    = {Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar,
                  October 30 - November 1, 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4909},
  pages        = {133--156},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-68947-8\_12},
  doi          = {10.1007/978-3-540-68947-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BenensonKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/BenensonGK05,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  title        = {An algorithmic framework for robust access control in wireless sensor
                  networks},
  booktitle    = {Wireless Sensor Networks, Second European Workshop, {EWSN} 2005, Istanbul,
                  Turkey, January 31 - February 2, 2005, Proceedings},
  pages        = {158--165},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/EWSN.2005.1462007},
  doi          = {10.1109/EWSN.2005.1462007},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewsn/BenensonGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/BenensonCF05,
  author       = {Zinaida Benenson and
                  Peter M. Cholewinski and
                  Felix C. Freiling},
  editor       = {S. Q. Zheng},
  title        = {Simple Evasive Data Storage in Sensor Networks},
  booktitle    = {International Conference on Parallel and Distributed Computing Systems,
                  {PDCS} 2005, November 14-16, 2005, Phoenix, AZ, {USA}},
  pages        = {779--784},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Wed, 09 Nov 2022 13:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcs/BenensonCF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BenensonGK05,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  editor       = {Hannes Federrath},
  title        = {Secure Multi-Party Computation with Security Modules},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {41--52},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28394},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/BenensonGK04,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  editor       = {Peter Dadam and
                  Manfred Reichert},
  title        = {User Authentication in Sensor Networks},
  booktitle    = {34. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, Informatik
                  verbindet, {INFORMATIK} 2004, Ulm, Germany, September 20-24, 2004,
                  Band 2},
  series       = {{LNI}},
  volume       = {{P-51}},
  pages        = {385--389},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/28800},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/BenensonGK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}