


Остановите войну!
for scientists:


default search action
Rainer Böhme
Person information

- affiliation: University of Münster, Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j33]Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag:
Mapping the Privacy Landscape for Central Bank Digital Currencies. Commun. ACM 66(3): 46-53 (2023) - [c111]Nora Hofer
, Rainer Böhme
:
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics. IH&MMSec 2023: 47-58 - [c110]Svetlana Abramova, Rainer Böhme, Helmut Elsinger, Helmut Stix, Martin Summer:
What can central bank digital currency designers learn from asking potential users? SOUPS 2023: 151-170 - [c109]Svetlana Abramova, Rainer Böhme:
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. USENIX Security Symposium 2023: 715-732 - [c108]Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz:
Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys. USENIX Security Symposium 2023: 2259-2273 - [i20]Svetlana Abramova, Rainer Böhme:
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. CoRR abs/2308.00375 (2023) - 2022
- [j32]Daniel W. Woods, Rainer Böhme:
The commodification of consent. Comput. Secur. 115: 102605 (2022) - [j31]Daniel W. Woods, Rainer Böhme:
Incident Response as a Lawyers' Service. IEEE Secur. Priv. 20(2): 68-74 (2022) - [j30]Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag:
Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you. ACM Queue 20(4): 16-38 (2022) - [j29]Federica Lago
, Cecilia Pasquini, Rainer Böhme, Hélène Dumont, Valérie Goffaux
, Giulia Boato:
More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner]. IEEE Signal Process. Mag. 39(1): 109-116 (2022) - [c107]Patrik Keller, Rainer Böhme:
Parallel Proof-of-Work with Concrete Bounds. AFT 2022: 1-15 - [c106]Martin Benes, Nora Hofer, Rainer Böhme:
The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis. EUSIPCO 2022: 1057-1061 - [c105]Michael Fröwis, Rainer Böhme:
Not All Code are Create2 Equal. Financial Cryptography Workshops 2022: 516-538 - [c104]Martin Benes
, Nora Hofer, Rainer Böhme:
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. IH&MMSec 2022: 19-25 - [c103]Friedhelm Victor, Bernhard Haslhofer, Sourav Sen Gupta, Malte Möser, Rainer Böhme:
CAAW'22: 2022 International Workshop on Cryptoasset Analytics. WWW (Companion Volume) 2022: 464-466 - [i19]Patrik Keller, Rainer Böhme:
Parallel Proof-of-Work with Concrete Bounds. CoRR abs/2204.00034 (2022) - 2021
- [j28]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Privacy Preference Signals: Past, Present and Future. Proc. Priv. Enhancing Technol. 2021(4): 249-269 (2021) - [c102]Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, Rainer Böhme
:
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. CHI 2021: 692:1-692:19 - [c101]Artemij Voskobojnikov, Svetlana Abramova, Konstantin Beznosov, Rainer Böhme:
Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk. ECIS 2021 - [c100]Svetlana Abramova, Rainer Böhme:
Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices. eCrime 2021: 1-11 - [c99]Patrik Keller, Martin Florian, Rainer Böhme:
Collaborative Deanonymization. Financial Cryptography Workshops 2021: 39-46 - [c98]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
Forensicability of Deep Neural Network Inference Pipelines. ICASSP 2021: 2515-2519 - [c97]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
iNNformant: Boundary Samples as Telltale Watermarks. IH&MMSec 2021: 81-86 - [c96]Daniel W. Woods, Rainer Böhme:
SoK: Quantifying Cyber Risk. SP 2021: 211-228 - [i18]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
Forensicability of Deep Neural Network Inference Pipelines. CoRR abs/2102.00921 (2021) - [i17]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Privacy Preference Signals: Past, Present and Future. CoRR abs/2106.02283 (2021) - [i16]Federica Lago, Cecilia Pasquini, Rainer Böhme, Hélène Dumont, Valérie Goffaux, Giulia Boato:
More Real than Real: A Study on Human Visual Perception of Synthetic Faces. CoRR abs/2106.07226 (2021) - [i15]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
iNNformant: Boundary Samples as Telltale Watermarks. CoRR abs/2106.07303 (2021) - [i14]Pietro Saggese, Alessandro Belmonte, Nicola Dimitri, Angelo Facchini, Rainer Böhme:
Who are the arbitrageurs? Empirical evidence from Bitcoin traders in the Mt. Gox exchange platform. CoRR abs/2109.10958 (2021) - [i13]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Conflicting Privacy Preference Signals in the Wild. CoRR abs/2109.14286 (2021) - 2020
- [j27]Rainer Böhme
, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, Aviv Zohar:
Responsible vulnerability disclosure in cryptocurrencies. Commun. ACM 63(10): 62-71 (2020) - [j26]Cecilia Pasquini, Rainer Böhme
:
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition. EURASIP J. Inf. Secur. 2020: 12 (2020) - [j25]Dominique Machuletz, Rainer Böhme
:
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proc. Priv. Enhancing Technol. 2020(2): 481-498 (2020) - [c95]Maximilian Hils
, Rainer Böhme
:
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. ACNS (2) 2020: 233-253 - [c94]Alexander Schlögl, Rainer Böhme
:
eNNclave: Offline Inference with Model Confidentiality. AISec@CCS 2020: 93-104 - [c93]Tobias Kupek, Cecilia Pasquini, Rainer Böhme
:
On the Difficulty of Hiding Keys in Neural Networks. IH&MMSec 2020: 73-78 - [c92]Maximilian Hils, Daniel W. Woods
, Rainer Böhme:
Measuring the Emergence of Consent Management on the Web. Internet Measurement Conference 2020: 317-332 - [i12]Maximilian Hils, Rainer Böhme:
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. CoRR abs/2001.02564 (2020) - [i11]Patrik Keller, Martin Florian, Rainer Böhme:
Collaborative Deanonymization. CoRR abs/2005.03535 (2020) - [i10]George Bissias, Rainer Böhme, David Thibodeau, Brian Neil Levine:
Pricing Security in Proof-of-Work Systems. CoRR abs/2012.03706 (2020)
2010 – 2019
- 2019
- [j24]Cecilia Pasquini
, Giulia Boato
, Rainer Böhme
:
Teaching Digital Signal Processing With a Challenge on Image Forensics [SP Education]. IEEE Signal Process. Mag. 36(2): 101-109 (2019) - [j23]Cecilia Pasquini
, Rainer Böhme
:
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals. IEEE Trans. Inf. Forensics Secur. 14(7): 1928-1943 (2019) - [c91]Michael Fröwis, Rainer Böhme:
The Operational Cost of Ethereum Airdrops. DPM/CBT@ESORICS 2019: 255-270 - [c90]Michael Fröwis, Andreas Fuchs, Rainer Böhme
:
Detecting Token Systems on Ethereum. Financial Cryptography 2019: 93-112 - [i9]Michael Fröwis, Rainer Böhme:
The Operational Cost of Ethereum Airdrops. CoRR abs/1907.12383 (2019) - [i8]Patrik Keller, Rainer Böhme:
HotPoW: Finality from Proof-of-Work Quorums. CoRR abs/1907.13531 (2019) - [i7]Dominique Machuletz, Rainer Böhme:
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. CoRR abs/1908.10048 (2019) - [i6]Bryan Ford, Rainer Böhme:
Rationality is Self-Defeating in Permissionless Systems. CoRR abs/1910.08820 (2019) - 2018
- [j22]Markus Riek
, Rainer Böhme:
The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†. J. Cybersecur. 4(1): tyy004 (2018) - [j21]Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett
, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. ACM Trans. Internet Techn. 18(4): 47:1-47:3 (2018) - [j20]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten
:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c89]Dominique Machuletz, Stefan Laube, Rainer Böhme
:
Webcam Covering as Planned Behavior. CHI 2018: 180 - [c88]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme
:
Detecting Adversarial Examples - a Lesson from Multimedia Security. EUSIPCO 2018: 947-951 - [c87]Daniel G. Arce, Rainer Böhme:
Pricing Anonymity. Financial Cryptography 2018: 349-368 - [c86]Cecilia Pasquini, Rainer Böhme:
Towards A Theory of Jpeg Block Convergence. ICIP 2018: 550-554 - [c85]Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme:
Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen. Sicherheit 2018: 83-94 - [e7]Rainer Böhme, Cecilia Pasquini, Giulia Boato, Pascal Schöttle:
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018. ACM 2018 [contents] - [i5]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme:
Detecting Adversarial Examples - A Lesson from Multimedia Forensics. CoRR abs/1803.03613 (2018) - [i4]Michael Fröwis, Andreas Fuchs, Rainer Böhme:
Detecting Token Systems on Ethereum. CoRR abs/1811.11645 (2018) - [i3]Rainer Böhme, Joseph Bonneau, Ittay Eyal:
Blockchain Security at Scale (Dagstuhl Seminar 18461). Dagstuhl Reports 8(11): 21-34 (2018) - 2017
- [j19]Stefan Laube
, Rainer Böhme:
Strategic Aspects of Cyber Risk Information Sharing. ACM Comput. Surv. 50(5): 77:1-77:36 (2017) - [j18]Malte Möser, Rainer Böhme:
The price of anonymity: empirical evidence from a market for Bitcoin anonymization. J. Cybersecur. 3(2): 127-135 (2017) - [j17]Paulina Pesch, Rainer Böhme:
Datenschutz trotz öffentlicher Blockchain? Datenschutz und Datensicherheit 41(2): 93-98 (2017) - [j16]Rainer Böhme, Paulina Pesch:
Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie. Datenschutz und Datensicherheit 41(8): 473-481 (2017) - [c84]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c83]Michael Fröwis, Rainer Böhme:
In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum. DPM/CBT@ESORICS 2017: 357-372 - [c82]Malte Möser, Rainer Böhme
:
Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques. EuroS&P Workshops 2017: 32-41 - [c81]Svetlana Abramova
, Pascal Schöttle, Rainer Böhme:
Mixing Coins of Different Quality: A Game-Theoretic Approach. Financial Cryptography Workshops 2017: 280-297 - [c80]Markus Riek, Svetlana Abramova, Rainer Böhme:
Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior. ICIS 2017 - [c79]Cecilia Pasquini, Rainer Böhme:
Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity. IH&MMSec 2017: 3-14 - [c78]Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme:
On the Statistical Properties of Syndrome Trellis Coding. IWDW 2017: 331-346 - [c77]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme
:
Decoy Password Vaults: At Least as Hard as Steganography? SEC 2017: 356-370 - [i2]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - [i1]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j15]Stefan Laube, Rainer Böhme:
The economics of mandatory security breach reporting to authorities. J. Cybersecur. 2(1): 29-41 (2016) - [j14]Markus Riek, Rainer Böhme
, Tyler Moore:
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Trans. Dependable Secur. Comput. 13(2): 261-273 (2016) - [j13]Pascal Schöttle
, Rainer Böhme:
Game Theory and Adaptive Steganography. IEEE Trans. Inf. Forensics Secur. 11(4): 760-773 (2016) - [c76]Rainer Böhme:
Back to the Roots: Information Sharing Economics and What We Can Learn for Security. WISCS@CCS 2016: 1-2 - [c75]Svetlana Abramova, Rainer Böhme:
Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study. ICIS 2016 - [c74]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, Fernando Pérez-González
:
Forensics of High Quality and Nearly Identical JPEG Image Recompression. IH&MMSec 2016: 11-21 - [c73]Svetlana Abramova
, Rainer Böhme:
Detecting Copy-Move Forgeries in Scanned Text Documents. Media Watermarking, Security, and Forensics 2016: 1-9 - [c72]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Telltale Watermarks for Counting JPEG Compressions. Media Watermarking, Security, and Forensics 2016: 1-10 - [e6]Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman:
Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016. ACM 2016, ISBN 978-1-4503-4813-3 [contents] - 2015
- [j12]Sarah Spiekermann, Rainer Böhme, Alessandro Acquisti
, Kai Lung Hui
:
Personal data markets. Electron. Mark. 25(2): 91-93 (2015) - [j11]Sarah Spiekermann, Alessandro Acquisti
, Rainer Böhme, Kai Lung Hui
:
The challenges of personal data markets and privacy. Electron. Mark. 25(2): 161-167 (2015) - [j10]Benjamin Johnson, Pascal Schöttle, Aron Laszka
, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - [c71]Stefan Laube, Rainer Böhme:
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. WISCS@CCS 2015: 31-42 - [c70]Malte Möser, Rainer Böhme:
Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. Financial Cryptography Workshops 2015: 19-33 - [c69]Rainer Böhme, Ulrich Waldmann:
Die Automatisierung von Compliance in Cloud-Umgebungen (ACCU). GI-Jahrestagung 2015: 497 - [c68]Stefan Laube, Rainer Böhme:
The Economics of Mandatory Security Breach Reporting to Authorities. WEIS 2015 - [c67]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Forensics of high-quality JPEG images with color subsampling. WIFS 2015: 1-6 - [c66]Stefan Laube, Rainer Böhme:
Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. Wirtschaftsinformatik 2015: 1146-1162 - [e5]Rainer Böhme, Tatsuaki Okamoto:
Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8975, Springer 2015, ISBN 978-3-662-47853-0 [contents] - [e4]Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme:
Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015. ACM 2015, ISBN 978-1-4503-3754-0 [contents] - 2014
- [j9]Aron Laszka
, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014) - [c65]Malte Möser, Rainer Böhme, Dominic Breuker:
Towards Risk Scoring of Bitcoin Transactions. Financial Cryptography Workshops 2014: 16-32 - [c64]Matthias Kirchner, Rainer Böhme:
"Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers. ICASSP 2014: 3982-3986 - [c63]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Predictable rain?: steganalysis of public-key steganography using wet paper codes. IH&MMSec 2014: 97-108 - [c62]Sebastian Luhn, Ina Bruns, Rainer Böhme:
Consumer Participation in Online Contracts - Exploring Cross-Out Clauses. Sicherheit 2014: 255-270 - [c61]Stefan Korff, Rainer Böhme:
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. SOUPS 2014: 69-87 - [e3]Rainer Böhme, Michael Brenner, Tyler Moore, Matthew Smith:
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer 2014, ISBN 978-3-662-44773-4 [contents] - 2013
- [c60]Malte Möser, Rainer Böhme, Dominic Breuker:
An inquiry into money laundering tools in the Bitcoin ecosystem. eCrime 2013: 1-14 - [c59]Aron Laszka
, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c58]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c57]Shiyue Lai, Rainer Böhme:
Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. ICASSP 2013: 3028-3032 - [c56]Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne
, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný
:
Moving steganography and steganalysis from the laboratory into the real world. IH&MMSec 2013: 45-58 - [c55]Benjamin Johnson, Pascal Schöttle, Aron Laszka
, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - [c54]Rainer Böhme, Jens Grossklags:
Trading Agent Kills Market Information - Evidence from Online Social Lending. WINE 2013: 68-81 - [p4]Jörg Becker
, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. The Economics of Information Security and Privacy 2013: 135-156 - [p3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten
, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - [e2]Rainer Böhme:
The Economics of Information Security and Privacy. Springer 2013, ISBN 978-3-642-39497-3 [contents] - 2012
- [c53]Rainer Böhme, Tyler Moore:
How do consumers react to cybercrime? eCrime Researchers Summit 2012: 1-12 - [c52]Rainer Böhme:
Security Audits Revisited. Financial Cryptography 2012: 129-147 - [c51]Benjamin Johnson, Pascal Schöttle, Rainer Böhme:
Where to Hide the Bits ? GameSec 2012: 1-17 - [c50]Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Geld stinkt, Bitcoin auch - Eine Ökobilanz der BitcoinBlock Chain. GI-Jahrestagung 2012: 39-50 - [c49]Pascal Schöttle, Rainer Böhme:
A Game-Theoretic Approach to Content-Adaptive Steganography. Information Hiding 2012: 125-141 - [c48]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [c47]Jörg Becker, Dominic Breuker,