default search action
Search dblp for Publications
export results for "stream:conf/sicherheit:"
@inproceedings{DBLP:conf/sicherheit/BelzSM24, author = {Ann{-}Marie Belz and Julian Suleder and Andreas Mayer}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Sicherheit von Lernmanagement-Systemen an terti{\"{a}}ren Bildungseinrichtungen in der DACH-Region}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {173--187}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_011}, doi = {10.18420/SICHERHEIT2024\_011}, timestamp = {Mon, 14 Oct 2024 17:07:53 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BelzSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Dessani24, author = {Leo Dessani}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {A Privacy-Preserving Architecture for Collaborative Botnet Detection}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {289--294}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_022}, doi = {10.18420/SICHERHEIT2024\_022}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Dessani24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DittmannKKAVWWN24, author = {Jana Dittmann and Christian Kr{\"{a}}tzer and Stefan Kiltz and Robert Altschaffel and Claus Vielhauer and Steffen Wendzel and Sandro Wefel and Holger Nitsch}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Attribution von verdeckten (Informations-)Kan{\"{a}}len im Bereich kritischer Infrastrukturen und Potentiale f{\"{u}}r Pr{\"{a}}vention und Reaktion {(ATTRIBUT)}}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {265--269}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_018}, doi = {10.18420/SICHERHEIT2024\_018}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DittmannKKAVWWN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DrexelHV24, author = {Joshua Drexel and Esther H{\"{a}}nggi and Iy{\'{a}}n M{\'{e}}ndez Veiga}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Reproducible Builds and Insights from an Independent Verifier for Arch Linux}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {243--257}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_016}, doi = {10.18420/SICHERHEIT2024\_016}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DrexelHV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EckhardtFH0P24, author = {Dennis Eckhardt and Felix C. Freiling and Dominik Herrmann and Stefan Katzenbeisser and Henrich C. P{\"{o}}hls}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes f{\"{u}}r die L{\"{o}}sung allt{\"{a}}glicher Sicherheitsprobleme}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {107--118}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_007}, doi = {10.18420/SICHERHEIT2024\_007}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EckhardtFH0P24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FlorisASR24, author = {Alice Floris and Stefanie Astfalk and Rachelle Sellung and Heiko Ro{\ss}nagel}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Tracking or being tracked: How much do self-trackers care about their data's privacy?}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {121--136}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_008}, doi = {10.18420/SICHERHEIT2024\_008}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FlorisASR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GordejevaMP24, author = {Jelizaveta Gordejeva and Andreas Mayer and Monika Pobiruchin}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Self-Tracking {\&} Running a Marathon: Is your Privacy in Danger?}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {137--152}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_009}, doi = {10.18420/SICHERHEIT2024\_009}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GordejevaMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HeinemannM24, author = {Markus Heinemann and Christian Mayerl}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Chancen zur Effizienzsteigerung bei der Umsetzung einer Regulatorik-konformen Zugriffskontrolle}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {269--272}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_019}, doi = {10.18420/SICHERHEIT2024\_019}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HeinemannM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HengSA24, author = {Youzhe Heng and Rainer Schnell and Frederik Armknecht}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Cryptanalysis of the Record Linkage Protocol used by German Cancer Registries}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {65--74}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_004}, doi = {10.18420/SICHERHEIT2024\_004}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HengSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Henrich24, author = {Johanna Henrich}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Ways for confidential and authenticated hop-by-hop key establishment in {QKDN}}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {301--306}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_024}, doi = {10.18420/SICHERHEIT2024\_024}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Henrich24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HornemannPUG24, author = {Jan H{\"{o}}rnemann and Norbert Pohlmann and Tobias Urban and Matteo Gro{\ss}e{-}Kampmann}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Sharing is Caring: Towards Analyzing Attack Surfaces on Shared Hosting Providers}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {217--229}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_014}, doi = {10.18420/SICHERHEIT2024\_014}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HornemannPUG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KirschH24, author = {Andreas Kirsch and Dominik Herrmann}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Reliable and secure on-premise e-assessment with psi-exam}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {189--202}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_012}, doi = {10.18420/SICHERHEIT2024\_012}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KirschH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Lenz24, author = {Julia Lenz}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Warum Nutzer ihre alternden smarten Ger{\"{a}}te ersetzen: Eine Push-Pull-Mooring Perspektive}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {295--300}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_023}, doi = {10.18420/SICHERHEIT2024\_023}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Lenz24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Ottenhues24, author = {Johannes Ottenhues}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {An overview of symmetric fuzzy {PAKE} protocols}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {75--89}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_005}, doi = {10.18420/SICHERHEIT2024\_005}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Ottenhues24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PohlOB024, author = {Timo Pohl and Marc Ohm and Felix Boes and Michael Meier}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {231--241}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_015}, doi = {10.18420/SICHERHEIT2024\_015}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PohlOB024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RehbohmS24, author = {Thomas Rehbohm and Kurt Sandkuhl}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Cybersicherheitsevaluation einer Referenzarchitektur f{\"{u}}r Land, Kommune und systemrelevante Infrastruktur}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {19--32}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_001}, doi = {10.18420/SICHERHEIT2024\_001}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RehbohmS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SaatjohannIS24, author = {Christoph Saatjohann and Fabian Ising and Sebastian Schinzel}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {{KIM:} Kaos In der Medizin}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {93--104}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_006}, doi = {10.18420/SICHERHEIT2024\_006}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SaatjohannIS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schafer0A24, author = {Jochen Sch{\"{a}}fer and Christian M{\"{u}}ller and Frederik Armknecht}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {0 Sterne f{\"{u}}r die Sicherheit: Wie Kundenbewertungen die Bitcoin-Adressen von Darknet-H{\"{a}}ndlern verraten}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {153--170}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_010}, doi = {10.18420/SICHERHEIT2024\_010}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schafer0A24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchmittHHAW24, author = {Nicolai Schmitt and Johanna Henrich and Dominik Heinz and Nouri Alnahawi and Alexander Wiesmaier}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {On Criteria and Tooling for Cryptographic Inventories}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {49--63}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_003}, doi = {10.18420/SICHERHEIT2024\_003}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchmittHHAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchwarzBDFPWW24, author = {Linda Schwarz and Nikolas Becker and Marius Dechand and Hannes Federrath and Tom Petersen and Jasmin Wagner and Friederike Wenderoth}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Sieben Handlungsfelder f{\"{u}}r mehr Cybersicherheit in der Stromwirtschaft}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {261--264}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_017}, doi = {10.18420/SICHERHEIT2024\_017}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchwarzBDFPWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SwierzyHBBHSS024, author = {Ben Swierzy and Melina Hoffmann and Felix Boes and Felix Betke and Lennart Hein and Maxim Shevchishin and Jan{-}Niklas Sohn and Michael Meier}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {{TEEM:} {A} {CPU} Emulator for Teaching Transient Execution Attacks}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {203--214}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_013}, doi = {10.18420/SICHERHEIT2024\_013}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SwierzyHBBHSS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Tippe24, author = {Pascal Tippe}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {A Study of Deanonymization Attacks of Onion Services}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {281--287}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_021}, doi = {10.18420/SICHERHEIT2024\_021}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Tippe24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Walter024, author = {Markus Walter and J{\"{o}}rg Keller}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {5G UnCovert: Hiding Information in 5G New Radio}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {33--46}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_002}, doi = {10.18420/SICHERHEIT2024\_002}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Walter024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Wohnert24, author = {Kai Hendrik W{\"{o}}hnert}, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Distributed Machine Learning Based Intrusion Detection System for Smart Grid}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, pages = {275--279}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://doi.org/10.18420/sicherheit2024\_020}, doi = {10.18420/SICHERHEIT2024\_020}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Wohnert24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2024, editor = {Steffen Wendzel and Christian Wressnegger and Laura Hartmann and Felix C. Freiling and Frederik Armknecht and Lena Reinfelder}, title = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11, 2024}, series = {{LNI}}, volume = {{P-345}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2024}, url = {https://dl.gi.de/handle/20.500.12116/43948}, isbn = {978-3-88579-739-5}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BeckertBGKKKMMN22, author = {Bernhard Beckert and Jurlind Budurushi and Armin Grunwald and Robert Krimmer and Oksana Kulyk and Ralf K{\"{u}}sters and Andreas Mayer and J{\"{o}}rn M{\"{u}}ller{-}Quade and Stephan Neumann and Melanie Volkamer}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Recent Developments in the Context of Online Elections and Digital Polls in Germany}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {213--217}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_16}, doi = {10.18420/SICHERHEIT2022\_16}, timestamp = {Mon, 14 Oct 2024 17:07:53 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BeckertBGKKKMMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BreigW22, author = {Jan Breig and Dirk Westhoff}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Short Paper: Debating Ethics with Cybersecurity Students}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {183--192}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_12}, doi = {10.18420/SICHERHEIT2022\_12}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BreigW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BurkertBF22, author = {Christian Burkert and Jonathan Balack and Hannes Federrath}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {PrivacyDates: {A} Framework for More Privacy-Preserving Timestamp Data Types}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {101--112}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_06}, doi = {10.18420/SICHERHEIT2022\_06}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BurkertBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DemirTUP22, author = {Nurullah Demir and Daniel Theis and Tobias Urban and Norbert Pohlmann}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Towards Understanding First-Party Cookie Tracking in the Field}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {19--34}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_01}, doi = {10.18420/SICHERHEIT2022\_01}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DemirTUP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DoernerMM22, author = {Dominik Doerner and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Hardening the Security of Server-Aided {MPC} Using Remotely Unhackable Hardware Modules}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {83--99}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_05}, doi = {10.18420/SICHERHEIT2022\_05}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DoernerMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Fraune22, author = {Bastian Fraune}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Automated Monitoring of Operational Technology Security and Compliance for Power Grids}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {231--236}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_19}, doi = {10.18420/SICHERHEIT2022\_19}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Fraune22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GarskeN22, author = {Viktor Garske and Andreas Noack}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Recovering information from pixelized credentials}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {129--141}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_08}, doi = {10.18420/SICHERHEIT2022\_08}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GarskeN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GruberF22, author = {Jan Gruber and Felix C. Freiling}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {49--64}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_03}, doi = {10.18420/SICHERHEIT2022\_03}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GruberF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GruberHGUP22, author = {Moritz Gruber and Christian H{\"{o}}fig and Matteo Gro{\ss}e{-}Kampmann and Tobias Urban and Norbert Pohlmann}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Short Paper: Business Chat ist verwirrt. Es hat sich vor Verwirrung selbst verletzt!}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {193--202}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_13}, doi = {10.18420/SICHERHEIT2022\_13}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GruberHGUP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Gudemann22, author = {Matthias G{\"{u}}demann}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {SMT-Based Verification of Concurrent Critical System}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {67--82}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_04}, doi = {10.18420/SICHERHEIT2022\_04}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Gudemann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hennig22, author = {Anne Hennig}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Your website has been hijacked: Raising awareness for an invisible problem}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {225--230}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_18}, doi = {10.18420/SICHERHEIT2022\_18}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Hennig22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Heseding22, author = {Hauke Heseding}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {237--242}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_20}, doi = {10.18420/SICHERHEIT2022\_20}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Heseding22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hinrichs22, author = {Torge Hinrichs}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Ongoing Automated Data Set Generation for Vulnerability Prediction from Github Data}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {219--222}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_17}, doi = {10.18420/SICHERHEIT2022\_17}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Hinrichs22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JacobBH22, author = {Florian Jacob and Saskia Bayreuther and Hannes Hartenstein}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {On CRDTs in Byzantine Environments}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {113--126}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_07}, doi = {10.18420/SICHERHEIT2022\_07}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JacobBH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LochmannS22, author = {Fabian Lochmann and Sebastian Schmerl}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein Praxisbericht}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {205--208}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_14}, doi = {10.18420/SICHERHEIT2022\_14}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LochmannS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MayerW022, author = {Nico Mayer and Steffen Wendzel and J{\"{o}}rg Keller}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {173--182}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_11}, doi = {10.18420/SICHERHEIT2022\_11}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MayerW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Moller22, author = {Jonas M{\"{o}}ller}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Differential Testing: How to find differences between programs that mostly behave identically?}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {243--248}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_21}, doi = {10.18420/SICHERHEIT2022\_21}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Moller22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerRWWH22, author = {Robin M{\"{u}}ller and Julius Ruppert and Katharina Will and Lukas W{\"{u}}steney and Tobias Heer}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Analyzing the Software Patch Discipline Across Different Industries and Countries}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {159--170}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_10}, doi = {10.18420/SICHERHEIT2022\_10}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerRWWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SaatjohannIGNSK22, author = {Christoph Saatjohann and Fabian Ising and Matthias Gierlings and Dominik Noss and Sascha Schimmler and Alexander Klemm and Leif Grundmann and Tilman Frosch and Sebastian Schinzel}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Sicherheit medizintechnischer Protokolle im Krankenhaus}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {143--158}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_09}, doi = {10.18420/SICHERHEIT2022\_09}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SaatjohannIGNSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StrotmannKRBK22, author = {Carsten Strotmann and Patrick Ben Koetter and Roland van Rijswijk{-}Deij and Markus de Br{\"{u}}n and Anders K{\"{o}}lligan}, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Studie {\"{u}}ber das Gefahrenpotential und Gegenma{\ss}nahmen zu Angriffen auf das {DNS} Protokoll durch IP-Fragmentierung}, booktitle = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, pages = {209--212}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://doi.org/10.18420/sicherheit2022\_15}, doi = {10.18420/SICHERHEIT2022\_15}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StrotmannKRBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2022, editor = {Christian Wressnegger and Delphine Reinhardt and Thomas Barber and Bernhard C. Witt and Daniel Arp and Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann}, title = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8, 2022}, series = {{LNI}}, volume = {{P-323}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://dl.gi.de/handle/20.500.12116/40129}, isbn = {978-3-88579-717-3}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Greven20, author = {Frauke Greven}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Informationssicherheit f{\"{u}}r KRITIS-Betreiber: Kritische Dienstleistungen systematisch sch{\"{u}}tzen}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {117--120}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_09}, doi = {10.18420/SICHERHEIT2020\_09}, timestamp = {Mon, 14 Oct 2024 17:07:53 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Greven20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HofmeierL20, author = {Manfred Hofmeier and Ulrike Lechner}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Schwachstellen und Angriffsketten in der Wertsch{\"{o}}pfungskette der Fleischproduktion}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {67--77}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_05}, doi = {10.18420/SICHERHEIT2020\_05}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/HofmeierL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kneib20, author = {Marcel Kneib}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {A Survey on Sender Identification Methodologies for the Controller Area Network}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {91--103}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_07}, doi = {10.18420/SICHERHEIT2020\_07}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Kneib20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LukasederHK20, author = {Thomas Lukaseder and Maya Halter and Frank Kargl}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Context-based Access Control and Trust Scores in Zero Trust Campus Networks}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {53--66}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_04}, doi = {10.18420/SICHERHEIT2020\_04}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/LukasederHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Marx20, author = {Matthias Marx}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Abusers don't get Privacy. Sensitively Logging and Blocking Tor Abuse}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {153--158}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_16}, doi = {10.18420/SICHERHEIT2020\_16}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Marx20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Mitseva0020, author = {Asya Mitseva and Thomas Engel and Andriy Panchenko}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Analyzing PeerFlow - {A} Bandwidth Estimation System for Untrustworthy Environments}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {29--40}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_02}, doi = {10.18420/SICHERHEIT2020\_02}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Mitseva0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MomenF20, author = {Nurul Momen and Lothar Fritsch}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {App-generated digital identities extracted through Android permission-based data access - a survey of app privacy}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {15--28}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_01}, doi = {10.18420/SICHERHEIT2020\_01}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MomenF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerMF20, author = {Nico M{\"{u}}ller and Tilo M{\"{u}}ller and Felix C. Freiling}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Urheberrecht ./. Sicherheitsanalyse}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {105--115}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_08}, doi = {10.18420/SICHERHEIT2020\_08}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Petersen20, author = {Tom Petersen}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Datenschutzgerechte und mehrseitig sichere IT-Plattformen f{\"{u}}r die medizinische Forschung}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {135--140}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_13}, doi = {10.18420/SICHERHEIT2020\_13}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Petersen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Richter20, author = {Alexander Richter}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Do Privacy Concerns Prevent Employees' Acceptance of Smart Wearables and Collaborative Robots?}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {141--146}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_14}, doi = {10.18420/SICHERHEIT2020\_14}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Richter20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schaad20, author = {Andreas Schaad}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Project {OVVL} - Threat Modeling Support for the entire secure development lifecycle}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {121--124}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_10}, doi = {10.18420/SICHERHEIT2020\_10}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Schaad20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Stubs20, author = {Marius St{\"{u}}bs}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Hierarchical Distributed Consensus for Smart Grids}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {147--152}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_15}, doi = {10.18420/SICHERHEIT2020\_15}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Stubs20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WaltherKS20, author = {Paul Walther and Robert Knauer and Thorsten Strufe}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Passive Angriffe auf kanalbasierten Schl{\"{u}}sselaustausch}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {41--51}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_03}, doi = {10.18420/SICHERHEIT2020\_03}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/WaltherKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Wiefling20, author = {Stephan Wiefling}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Usability, Sicherheit und Privatsph{\"{a}}re von risikobasierter Authentifizierung}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {129--134}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_12}, doi = {10.18420/SICHERHEIT2020\_12}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Wiefling20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/X20, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Sicherheit 2020 - Komplettband}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://dl.gi.de/handle/20.500.12116/31786}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZibuschkaZ20, author = {Jan Zibuschka and Christian Zimmermann}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Lean Privacy by Design}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {125--128}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_11}, doi = {10.18420/SICHERHEIT2020\_11}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZibuschkaZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZimmermannBA20, author = {Till Zimmermann and Jan Bauer and Nils Aschenbruck}, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {CryptoCAN - Ensuring Confidentiality in Controller Area Networks for Agriculture}, booktitle = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, pages = {79--90}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://doi.org/10.18420/sicherheit2020\_06}, doi = {10.18420/SICHERHEIT2020\_06}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/ZimmermannBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2020, editor = {Delphine Reinhardt and Hanno Langweg and Bernhard C. Witt and Mathias Fischer}, title = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz 2020, G{\"{o}}ttingen}, series = {{LNI}}, volume = {{P-301}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2020}, url = {https://dl.gi.de/handle/20.500.12116/31777}, isbn = {978-3-88579-695-4}, timestamp = {Mon, 14 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/0001TBGLR18, author = {Sebastian Pape and Daniel Tasche and Iulia Bastys and Akos Grosz and J{\"{o}}rg L{\"{a}}ssig and Kai Rannenberg}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {17--28}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_01}, doi = {10.18420/SICHERHEIT2018\_01}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/0001TBGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Bock18, author = {Sven Bock}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {My Data is Mine - Users' Handling of Personal Data in Everyday Life}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {261--266}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_22}, doi = {10.18420/SICHERHEIT2018\_22}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Bock18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BuchmannHB18, author = {Erik Buchmann and Andreas Hartmann and Stephanie Bauer}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Informationssicherheitskonzept nach IT-Grundschutz f{\"{u}}r Containervirtualisierung in der Cloud}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {235--248}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_18}, doi = {10.18420/SICHERHEIT2018\_18}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/BuchmannHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ChilleMM18, author = {Vanessa Chille and Sybille Mund and Andreas M{\"{o}}ller}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Harmonizing physical and {IT} security levels for critical infrastructures}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {133--143}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_10}, doi = {10.18420/SICHERHEIT2018\_10}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/ChilleMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GeigerKM18, author = {Robert Geiger and Sabrina Krausz and Holger Mettler}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Ein integriertes Vorgehensmodell zur Planung und Umsetzung eines {ISMS} am Beispiel der Pharmaproduktion}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {249--252}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_19}, doi = {10.18420/SICHERHEIT2018\_19}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/GeigerKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Gorski18, author = {Peter Leo Gorski}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Usability von Security-APIs f{\"{u}}r massiv-skalierbare vernetzte Service-orientierte Systeme}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {285--290}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_26}, doi = {10.18420/SICHERHEIT2018\_26}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Gorski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HarborthBG0R18, author = {David Harborth and Maren Braun and Akos Grosz and Sebastian Pape and Kai Rannenberg}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Anreize und Hemmnisse f{\"{u}}r die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {29--41}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_02}, doi = {10.18420/SICHERHEIT2018\_02}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/HarborthBG0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hartmann18, author = {Lukas Hartmann}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality of Service}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {267--272}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_23}, doi = {10.18420/SICHERHEIT2018\_23}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Hartmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HaupertP18, author = {Vincent Haupert and Gaston Pugliese}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Ich sehe was, das du nicht siehst - Die Realit{\"{a}}t von Mobilebanking zwischen allgemeinen und rechtlichen Anforderungen}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {171--182}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_13}, doi = {10.18420/SICHERHEIT2018\_13}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HaupertP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KohlerPB18, author = {Olaf Markus K{\"{o}}hler and Cecilia Pasquini and Rainer B{\"{o}}hme}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Verbesserung der Syndrome-Trellis-Kodierung zur Erh{\"{o}}hung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {83--94}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_06}, doi = {10.18420/SICHERHEIT2018\_06}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/KohlerPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KurowskiFR18, author = {Sebastian Kurowski and Nicolas F{\"{a}}hnrich and Heiko Ro{\ss}nagel}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {On the possible impact of security technology design on policy adherent user behavior - Results from a controlled empirical experiment}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {145--158}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_11}, doi = {10.18420/SICHERHEIT2018\_11}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/KurowskiFR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MalderleWK018, author = {Timo Malderle and Matthias W{\"{u}}bbeling and Sven Knauer and Michael Meier}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Ein Werkzeug zur automatisierten Analyse von Identit{\"{a}}tsdaten-Leaks}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {43--54}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_03}, doi = {10.18420/SICHERHEIT2018\_03}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MalderleWK018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MarkyKV18, author = {Karola Marky and Oksana Kulyk and Melanie Volkamer}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Comparative Usability Evaluation of Cast-as-Intended Verification Approaches in Internet Voting}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {197--208}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_15}, doi = {10.18420/SICHERHEIT2018\_15}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/MarkyKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MarxZMBF18, author = {Matthias Marx and Ephraim Zimmer and Tobias Mueller and Maximilian Blochberger and Hannes Federrath}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Hashing of personally identifiable information is not sufficient}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {55--68}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_04}, doi = {10.18420/SICHERHEIT2018\_04}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/MarxZMBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MengesBVPTRL18, author = {Florian Menges and Fabian B{\"{o}}hm and Manfred Vielberth and Alexander Puchta and Benjamin Taubmann and No{\"{e}}lle Rakotondravony and Tobias Latzo}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Introducing DINGfest: An architecture for next generation {SIEM} systems}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {257--260}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_21}, doi = {10.18420/SICHERHEIT2018\_21}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/MengesBVPTRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Momen18, author = {Nurul Momen}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Turning the Table Around: Monitoring App Behavior}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {279--284}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_25}, doi = {10.18420/SICHERHEIT2018\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Momen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Reuben18, author = {Jenni Reuben}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Towards a Differential Privacy Theory for Edge-Labeled Directed Graphs}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {273--278}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_24}, doi = {10.18420/SICHERHEIT2018\_24}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Reuben18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Ropke18, author = {Christian R{\"{o}}pke}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {{SDN} Ro2tkits: {A} Case Study of Subverting {A} Closed Source {SDN} Controller}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {95--106}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_07}, doi = {10.18420/SICHERHEIT2018\_07}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Ropke18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchuckertHKL18, author = {Felix Schuckert and Max Hildner and Basel Katt and Hanno Langweg}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {107--118}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_08}, doi = {10.18420/SICHERHEIT2018\_08}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/SchuckertHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SeuffertSR18, author = {Julian Seuffert and Marc Stamminger and Christian Riess}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Towards Forensic Exploitation of 3-D Lighting Environments in Practice}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {159--169}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_12}, doi = {10.18420/SICHERHEIT2018\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SeuffertSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Spath18, author = {Christopher Sp{\"{a}}th}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Is MathML dangerous?}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {119--132}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_09}, doi = {10.18420/SICHERHEIT2018\_09}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Spath18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ThaeterR18, author = {Florian Thaeter and R{\"{u}}diger Reischuk}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Improving Anonymization Clustering}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {69--82}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_05}, doi = {10.18420/SICHERHEIT2018\_05}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ThaeterR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TraderZH18, author = {Daniel Tr{\"{a}}der and Alexander Zeier and Andreas Heinemann}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Auf dem Weg zu sicheren abgeleiteten Identit{\"{a}}ten mit Payment Service Directive 2}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {183--196}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_14}, doi = {10.18420/SICHERHEIT2018\_14}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/TraderZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/UblerGM18, author = {David {\"{U}}bler and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Secure Remote Computation using Intel {SGX}}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {209--219}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_16}, doi = {10.18420/SICHERHEIT2018\_16}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/UblerGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Ullrich18, author = {Steffen Ullrich}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Fallstricke bei der Inhaltsanalyse von Mails: Beispiele, Ursachen und L{\"{o}}sungsm{\"{o}}glichkeiten}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {253--256}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_20}, doi = {10.18420/SICHERHEIT2018\_20}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/Ullrich18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WieseHWB18, author = {Lena Wiese and Daniel Homann and Tim Waage and Michael Brenner}, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Homomorphe Verschl{\"{u}}sselung f{\"{u}}r Cloud-Datenbanken: {\"{U}}bersicht und Anforderungsanalyse}, booktitle = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, pages = {221--234}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://doi.org/10.18420/sicherheit2018\_17}, doi = {10.18420/SICHERHEIT2018\_17}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/WieseHWB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2018, editor = {Hanno Langweg and Michael Meier and Bernhard C. Witt and Delphine Reinhardt}, title = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018, Konstanz}, series = {{LNI}}, volume = {{P-281}}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2018}, url = {https://dl.gi.de/handle/20.500.12116/20074}, isbn = {978-3-88579-675-6}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AstrakhantcevaK16, author = {Mariia Astrakhantceva and G{\"{u}}nter Karjoth and Bettina H{\"{u}}bscher}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Die Bordkarte als Authentifikationsmittel bei Flugreisen}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {113--124}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/860}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AstrakhantcevaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Beterke16, author = {Fabian Beterke}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Distributed evolutionary fuzzing with Evofuzz}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {23--32}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/878}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Beterke16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Braband16, author = {Jens Braband}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Why 2 times 2 ain't neccessarily 4 - at least not in {IT} security risk assessment}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {1--10}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/858}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Braband16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ButtMKB16, author = {Moazzam Butt and Johannes Merkle and Ulrike Korte and Christoph Busch}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Correlation-resistant fuzzy vault for fingerprints}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {125--136}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/861}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ButtMKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/CorbettSKP16, author = {Christopher Corbett and Elmar Schoch and Frank Kargl and Felix Preussner}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Automotive Ethernet: security opportunity or challenge?}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {45--54}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/880}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/CorbettSKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GlanzerKK16, author = {Harald Glanzer and Lukas Krammer and Wolfgang Kastner}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Increasing security and availability in {KNX} networks}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {241--252}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/875}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GlanzerKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrafHMS16, author = {Juergen Graf and Martin Hecker and Martin Mohr and Gregor Snelting}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Sicherheitsanalyse mit {JOANA}}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {11--22}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/869}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrafHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HahnPM16, author = {Sebastian Hahn and Mykola Protsenko and Tilo M{\"{u}}ller}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Comparative evaluation of machine learning-based malware detection on Android}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {79--88}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/883}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HahnPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HaupertM16, author = {Vincent Haupert and Tilo M{\"{u}}ller}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Auf dem Weg verTAN: {\"{U}}ber die Sicherheit App-basierter TAN-Verfahren}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {101--112}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/859}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HaupertM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HerrmannL16, author = {Dominik Herrmann and Jens Lindemann}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Obtaining personal data and asking for erasure: do app vendors and website owners honour your privacy rights?}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {149--160}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/863}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HerrmannL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hertle16, author = {Florian Hertle}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Lessons learned bei KMUs aus dem Befall durch Ransomware}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {171--176}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/865}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Hertle16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Jasser16, author = {Stefanie Jasser}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Sicherheit im Softwareentwurf - Integrierte Modellierung von Security und Softwarearchitektur}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {185--190}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/867}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Jasser16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kasem-Madani16, author = {Saffija Kasem{-}Madani}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {A framework for encrypted computation on shared data}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {191--196}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/868}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Kasem-Madani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KrombholzJGW16, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {F{\"{u}}r bare M{\"{u}}nze? NutzerInnenerfahrungen mit Sicherheit und Datenschutz bei Bitcoin}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {137--148}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/862}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KrombholzJGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MerkelKHKKD16, author = {Ronny Merkel and Christian Kraetzer and Mario Hildebrandt and Stefan Kiltz and Sven Kuhlmann and Jana Dittmann}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {A semantic framework for a better understanding, investigation and prevention of organized financial crime}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {55--66}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/881}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MerkelKHKKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerABM16, author = {Christian M{\"{u}}ller and Frederik Armknecht and Zinaida Benenson and Philipp Morgner}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {On the security of the ZigBee Light Link touchlink commissioning procedure}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {229--240}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/874}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PrausKP16, author = {Friedrich Praus and Wolfgang Kastner and Peter Palensky}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Software security requirements in building automation}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {217--228}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/873}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PrausKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RastBK16, author = {Severin Rast and Timo Brecher and Sabine Kammerhofer}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {IT-Grundschutz in gro{\ss}en Institutionen - Herausforderungen und L{\"{o}}sungsstrategien}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {161--170}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/864}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RastBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Renners16, author = {Leonard Renners}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Towards adaptive event prioritization for network security - ideas and challenges}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {197--202}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/870}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Renners16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Rieck16, author = {Jakob Rieck}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Attacks on fitness trackers revisited: a case-study of unfit firmware security}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {33--44}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/879}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Rieck16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Ropke16, author = {Christian R{\"{o}}pke}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {{SDN} malware: problems of current protection systems and potential countermeasures}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {89--100}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/884}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Ropke16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schuckert16, author = {Felix Schuckert}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Generating security vulnerabilities in source code}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {177--184}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/866}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schuckert16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchurmannW16, author = {Dominik Sch{\"{u}}rmann and Lars C. Wolf}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Surreptitious sharing on Android}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {67--78}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/882}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchurmannW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TonejcKK16, author = {Jernej Tonejc and Jaspreet Kaur and Alexandra Kobekova}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Detecting anomalies in BACnet network data}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {253--264}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/876}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TonejcKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Valipour16, author = {Siavash Valipour}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Designing resilient and secure smart micro grids}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {203--208}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/871}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Valipour16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Waage16, author = {Tim Waage}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Order preserving encryption for wide column stores}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {209--216}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/872}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Waage16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2016, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/20073}, isbn = {978-3-88579-650-3}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AccorsiHSZ14, author = {Rafael Accorsi and Julius Holderer and Thomas Stocker and Richard M. Zahoransky}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Security Workflow Analysis Toolkit}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {433--442}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20062}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AccorsiHSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AltiokUH14, author = {Irfan Altiok and Sebastian Uellenbeck and Thorsten Holz}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {25--35}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20057}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AltiokUH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ArmknechtH014, author = {Frederik Armknecht and Matthias Hamann and Matthias Krause}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Hardware Efficient Authentication based on Random Selection}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {169--185}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20041}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ArmknechtH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BartschBBBHKMSV14, author = {Steffen Bartsch and Bernhard J. Berger and Eric Bodden and Achim D. Brucker and Jens Heider and Mehmet Kus and S{\"{o}}nke Maseberg and Karsten Sohr and Melanie Volkamer}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Zertifizierte Datensicherheit f{\"{u}}r Android-Anwendungen auf Basis statischer Programmanalysen}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {283--291}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20050}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BartschBBBHKMSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Boehmer14, author = {Wolfgang Boehmer}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Bestimmung des technical-Value at Risk mittels der bedingten Wahrscheinlichkeit, Angriffsb{\"{a}}umen und einer Risikofunktion}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {305--317}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20052}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Boehmer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrinnerR14, author = {Andreas Brinner and Ren{\'{e}} Rietz}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Verbesserung der Netzsicherheit in virtualisierten Umgebungen mit Hilfe von OpenFlow}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {79--89}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20070}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrinnerR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrodowskiDFKR14, author = {Dominik Brodowski and Andreas Dewald and Felix C. Freiling and Steve Kov{\'{a}}cs and Martin Rieger}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {391--405}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20059}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrodowskiDFKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BroxM14, author = {Kirsten Brox and Anastasia Meletiadou}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Security-Awareness-Programm unter Ber{\"{u}}cksichtigung viraler Marketingmethoden}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {157--168}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20040}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BroxM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BruckerS14, author = {Achim D. Brucker and Uwe Sodan}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Deploying Static Application Security Testing on a Large Scale}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {91--101}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20071}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BruckerS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EkelhartGKSS14, author = {Andreas Ekelhart and Bernhard Grill and Elmar Kiesling and Christine Strau{\ss} and Christian Stummer}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Komplexe Systeme, heterogene Angreifer und vielf{\"{a}}ltige Abwehrmechanismen: Simulationsbasierte Entscheidungsunterst{\"{u}}tzung im IT-Sicherheitsmanagement}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {345--361}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20055}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EkelhartGKSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Formann14, author = {Johannes Formann}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {An efficient approach to tolerate attackers in fault-tolerant systems}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {419--432}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20061}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Formann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FreckmannG14, author = {Christian Freckmann and Ulrich Greveler}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {IT-Sicherheitsaspekte industrieller Steuerungssysteme}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {149--156}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20039}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FreckmannG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FruhwirtKHSW14, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Christoph Hochreiner and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen {\"{u}}ber Datenbank-interne Logfiles}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {363--374}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20056}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FruhwirtKHSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FussGKK14, author = {J{\"{u}}rgen Fu{\ss} and Bernhard Greslehner{-}Nimmervoll and Wolfgang Kastl and Robert Kolmhofer}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Effizienteres Bruteforcing auf einem heterogenen Cluster mit GPUs und FPGAs}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {127--136}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20037}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FussGKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GasconUWR14, author = {Hugo Gascon and Sebastian Uellenbeck and Christopher Wolf and Konrad Rieck}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {1--12}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20035}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GasconUWR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GenzelSHD14, author = {Carl{-}Heinz Genzel and Richard Sethmann and Olav Hoffmann and Kai{-}Oliver Detken}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Sicherheitskonzept zum Schutz der Gateway-Integrit{\"{a}}t in Smart Grids}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {137--148}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20038}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GenzelSHD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14, author = {Patrick Grofig and Martin H{\"{a}}rterich and Isabelle Hang and Florian Kerschbaum and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {115--125}, publisher = {{GI}}, year = {2014}, url = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html}, timestamp = {Tue, 20 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HalvaniSN14, author = {Oren Halvani and Martin Steinebach and Svenja Neitzel}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {L{\"{a}}sst sich der Schreibstil verf{\"{a}}lschen um die eigene Anonymit{\"{a}}t in Textdokumenten zu sch{\"{u}}tzen?}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {229--241}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20045}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HalvaniSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HanspachG14, author = {Michael Hanspach and Michael Goetz}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Recent Developments in Covert Acoustical Communications}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {243--254}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20047}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HanspachG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HerrmannFF14, author = {Dominik Herrmann and Karl{-}Peter Fuchs and Hannes Federrath}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Fingerprinting Techniques for Target-oriented Investigations in Network Forensics}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {375--390}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20058}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HerrmannFF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HintzEBF14, author = {Nadina Hintz and Markus Engelberth and Zinaida Benenson and Felix C. Freiling}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung von Phishing-Experimenten}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {37--51}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20067}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KalberDI14, author = {Sven K{\"{a}}lber and Andreas Dewald and Steffen Idler}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {331--343}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20054}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KalberDI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KurtzTF14, author = {Andreas Kurtz and Markus Tro{\ss}bach and Felix C. Freiling}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {13--23}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20046}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KurtzTF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LuhnBB14, author = {Sebastian Luhn and Ina Bruns and Rainer B{\"{o}}hme}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Consumer Participation in Online Contracts - Exploring Cross-Out Clauses}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {255--270}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20048}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LuhnBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MayerMS14, author = {Andreas Mayer and Vladislav Mladenov and J{\"{o}}rg Schwenk}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {On the Security of Holder-of-Key Single Sign-On}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {65--77}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20069}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MayerMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MeierP14, author = {Stefan Meier and G{\"{u}}nther Pernul}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Einsatz von digitaler Forensik in Unternehmen und Organisationen}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {103--114}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20072}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MeierP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RassS14, author = {Stefan Rass and Peter Schartner}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Chameleon-Hashing f{\"{u}}r Interaktive Beweise der Verf{\"{u}}gbarkeit dynamischer Daten in der Cloud}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {187--199}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20042}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RassS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RiekeZRGG14, author = {Roland Rieke and Maria Zhdanova and J{\"{u}}rgen Repp and Romain Giot and Chrystel Gaber}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {271--282}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20049}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RiekeZRGG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SibingerM14, author = {Christoph Sibinger and Tilo M{\"{u}}ller}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Verwendung von Festplattenvollverschl{\"{u}}sselung im gesch{\"{a}}ftlichen und privaten Umfeld}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {201--216}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20043}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SibingerM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StockLJ14, author = {Ben Stock and Sebastian Lekies and Martin Johns}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes Land}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {53--64}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20068}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StockLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SzlosarczykWKMS14, author = {Sebastian Szl{\'{o}}sarczyk and Steffen Wendzel and Jaspreet Kaur and Michael Meier and Frank Schubert}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Towards Suppressing Attacks on and Improving Resilience of Building Automation Systems - an Approach Exemplified Using BACnet}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {407--418}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20060}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SzlosarczykWKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TewsS14, author = {Erik Tews and Christian Schlehuber}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Quantitative Ans{\"{a}}tze zur IT-Risikoanalyse}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {293--303}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20051}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TewsS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WendzelZMS14, author = {Steffen Wendzel and Viviane Zwanger and Michael Meier and Sebastian Szl{\'{o}}sarczyk}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Envisioning Smart Building Botnets}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {319--329}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20053}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WendzelZMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld14, author = {Andreas Westfeld}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Angriffe auf eine Spreizspektrummethode f{\"{u}}r Audio-Steganographie}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {217--227}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20044}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2014, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20034}, isbn = {978-3-88579-622-0}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MakriEHPAHJ13, author = {Eleftheria Makri and Maarten H. Everts and Sebastiaan de Hoogh and Andreas Peter and Harm op den Akker and Pieter H. Hartel and Willem Jonker}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Privacy-Preserving Verification of Clinical Research}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {481--500}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20065}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MakriEHPAHJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Mitrengova13, author = {Marika Mitrengov{\'{a}}}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Multi-LHL protocol}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {461--480}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20064}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Mitrengova13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/NilgesMH13, author = {Tobias Nilges and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Huber}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Structural Composition Attacks on Anonymized Data}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {443--460}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/20063}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/NilgesMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonKK12, author = {Zinaida Benenson and Olaf Kroll{-}Peters and Matthias Krupp}, editor = {Neeraj Suri and Michael Waidner}, title = {Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endger{\"{a}}te}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {7--24}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18284}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Braband12, author = {Jens Braband}, editor = {Neeraj Suri and Michael Waidner}, title = {Security und Safety - das Yin und Yang der Systemsicherheit?}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {3}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18281}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Braband12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrzuskaDF12, author = {Christina Brzuska and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, editor = {Neeraj Suri and Michael Waidner}, title = {TLS, PACE, and {EAC:} ACryptographic View at Modern Key Exchange Protocols}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {71--82}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18264}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrzuskaDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Cachin12, author = {Christian Cachin}, editor = {Neeraj Suri and Michael Waidner}, title = {Sicherheits-Forschung f{\"{u}}r die Cloud - Heisse Luft oder Wolke Sieben?}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {1}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18262}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Cachin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/CheikhrouhouSDFU12, author = {Lassaad Cheikhrouhou and Werner Stephan and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Markus Ullmann}, editor = {Neeraj Suri and Michael Waidner}, title = {Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of {PACE}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {83--94}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18265}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/CheikhrouhouSDFU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12, author = {Andreas Dewald and Felix C. Freiling and Thomas Schreck and Michael Spreitzenbarth and Johannes St{\"{u}}ttgen and Stefan V{\"{o}}mel and Carsten Willems}, editor = {Neeraj Suri and Michael Waidner}, title = {Analyse und Vergleich von BckR2D2-I und {II}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {47--58}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18287}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EngelberthGSF12, author = {Markus Engelberth and Jan G{\"{o}}bel and Christian Sch{\"{o}}nbein and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {PyBox - {A} Python Sandbox}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {137--148}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18269}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EngelberthGSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FuchsHF12, author = {Karl{-}Peter Fuchs and Dominik Herrmann and Hannes Federrath}, editor = {Neeraj Suri and Michael Waidner}, title = {gMix: Eine generische Architektur f{\"{u}}r Mix-Implementierungen und ihre Umsetzung als Open-Source-Framework}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {123--135}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18268}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FuchsHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrevelerJL12, author = {Ulrich Greveler and Benjamin Justus and Dennis L{\"{o}}hr}, editor = {Neeraj Suri and Michael Waidner}, title = {Identifikation von Videoinhalten {\"{u}}ber granulare Stromverbrauchsdaten}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {35--45}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18286}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrevelerJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HartungPB12, author = {Daniel Hartung and Anika Pflug and Christoph Busch}, editor = {Neeraj Suri and Michael Waidner}, title = {Vein Pattern Recognition Using Chain Codes Spatial Information and Skeleton Fusing}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {245--256}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18279}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HartungPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12, author = {Detlef H{\"{u}}hnlein and Dirk Petrautzki and Johannes Schm{\"{o}}lz and Tobias Wich and Moritz Horsch and Thomas Wieland and Jan Eichholz and Alexander Wiesmaier and Johannes Braun and Florian Feldmann and Simon Potzernheim and J{\"{o}}rg Schwenk and Christian Kahlo and Andreas K{\"{u}}hne and Heiko Veit}, editor = {Neeraj Suri and Michael Waidner}, title = {On the design and implementation of the Open eCard App}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {95--110}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18266}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KauerPVTB12, author = {Michaela Kauer and Thomas Pfeiffer and Melanie Volkamer and Heike Theuerling and Ralph Bruder}, editor = {Neeraj Suri and Michael Waidner}, title = {It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {187--198}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18274}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KauerPVTB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KuhnenLM12, author = {Marcus Quintino Kuhnen and Mario Lischka and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol}, editor = {Neeraj Suri and Michael Waidner}, title = {Triggering {IDM} Authentication Methods based on Device Capabilities Information}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {235--244}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18278}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KuhnenLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LekiesTJ12, author = {Sebastian Lekies and Walter Tighzert and Martin Johns}, editor = {Neeraj Suri and Michael Waidner}, title = {Towards stateless, client-side driven Cross-Site Request Forgery protection for Web applications}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {111--121}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18267}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LekiesTJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Lotz12, author = {Volkmar Lotz}, editor = {Neeraj Suri and Michael Waidner}, title = {Towards a Secure and Trusted Business Web}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {4--5}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18282}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Lotz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MenzelTFKD12, author = {Wiebke Menzel and Sven Tuchscheerer and Jana Fruth and Christian Kr{\"{a}}tzer and Jana Dittmann}, editor = {Neeraj Suri and Michael Waidner}, title = {Designansatz und Evaluation von Kindgerechten Securitywarnungen f{\"{u}}r Smartphones}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {211--221}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18276}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MenzelTFKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PenningerMF12, author = {Stefan Penninger and Stefan Meier and Hannes Federrath}, editor = {Neeraj Suri and Michael Waidner}, title = {Usability von CAPTCHA-Systemen}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {199--210}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18275}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PenningerMF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TriniusF12, author = {Philipp Trinius and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {Filtern von Spam-Nachrichten mit kontextfreien Grammatiken}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {163--174}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18271}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TriniusF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/UllmannBG12, author = {Markus Ullmann and Ralph Breithaupt and Frank Gehring}, editor = {Neeraj Suri and Michael Waidner}, title = {"On-Card" User Authentication for Contactless Smart Cards based on Gesture Recognition}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {223--234}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18277}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/UllmannBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Voelcker12, author = {Hinrich Voelcker}, editor = {Neeraj Suri and Michael Waidner}, title = {{IT} Security - Effiziente Organisation {\"{u}}ber Governance hinaus}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {2}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18273}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Voelcker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Wendzel12, author = {Steffen Wendzel}, editor = {Neeraj Suri and Michael Waidner}, title = {The Problem of Traffic Normalization Within a Covert Channel's Network Environment Learning Phase}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {149--161}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18270}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Wendzel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfS12, author = {Patrick Wolf and Martin Steinebach}, editor = {Neeraj Suri and Michael Waidner}, title = {FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertsch{\"{o}}pfungskette}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {175--185}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18272}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Zhou12, author = {Xuebing Zhou}, editor = {Neeraj Suri and Michael Waidner}, title = {A Practical View of Privacy Preserving Biometric Authentication}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {6}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18283}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Zhou12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZibuschkaR12, author = {Jan Zibuschka and Heiko Ro{\ss}nagel}, editor = {Neeraj Suri and Michael Waidner}, title = {On Some Conjectures in {IT} Security: The Case for Viable Security Solutions}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {25--33}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18285}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZibuschkaR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZimmermannSSF12, author = {Christian Zimmermann and Michael Spreitzenbarth and Sven Schmitt and Felix C. Freiling}, editor = {Neeraj Suri and Michael Waidner}, title = {Forensic Analysis of {YAFFS2}}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {59--69}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18263}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZimmermannSSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2012, editor = {Neeraj Suri and Michael Waidner}, title = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/19975}, isbn = {978-3-88579-289-5}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BaecherFGLLS10, author = {Paul Baecher and Marc Fischlin and Lior Gordon and Robert Langenberg and Michael L{\"{u}}tzow and Dominique Schr{\"{o}}der}, editor = {Felix C. Freiling}, title = {CAPTCHAs: The Good, the Bad, and the Ugly}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {353--365}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19796}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BaecherFGLLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BohmeP10, author = {Rainer B{\"{o}}hme and Stefanie P{\"{o}}tzsch}, editor = {Felix C. Freiling}, title = {Social Lending aus der Perspektive des Datenschutzes}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {317--328}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19792}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BohmeP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BuschANKZ10, author = {Christoph Busch and Sebastian Abt and Claudia Nickel and Ulrike Korte and Xuebing Zhou}, editor = {Felix C. Freiling}, title = {Biometrische Template-Protection-Verfahren und Interoperabilit{\"{a}}tsstrategien}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {1--12}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19773}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BuschANKZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BuschH10, author = {Christoph Busch and Daniel Hartung}, editor = {Felix C. Freiling}, title = {Biometrische Nachrichten-Authentisierung}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {13--24}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19784}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BuschH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ChristleinRA10, author = {Vincent Christlein and Christian Riess and Elli Angelopoulou}, editor = {Felix C. Freiling}, title = {A Study on Features for the Detection of Copy-Move Forgeries}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {105--116}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19774}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ChristleinRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DistlerKR10, author = {Tobias Distler and R{\"{u}}diger Kapitza and Hans P. Reiser}, editor = {Felix C. Freiling}, title = {State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {61--72}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19800}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DistlerKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Gobel10, author = {Jan G{\"{o}}bel}, editor = {Felix C. Freiling}, title = {Amun: Automatic Capturing of Malicious Software}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {177--190}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19780}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Gobel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GobelT10, author = {Jan G{\"{o}}bel and Philipp Trinius}, editor = {Felix C. Freiling}, title = {Towards Optimal Sensor Placement Strategies for Early Warning Systems}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {191--204}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19781}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GobelT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GudemannO10, author = {Matthias G{\"{u}}demann and Frank Ortmeier}, editor = {Felix C. Freiling}, title = {Quantitative Model-Based Safety Analysis: {A} Case Study}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {37--48}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19798}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GudemannO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HeumannTK10, author = {Thomas Heumann and Sven T{\"{u}}rpe and J{\"{o}}rg Keller}, editor = {Felix C. Freiling}, title = {Quantifying the Attack Surface of a Web Application}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {305--316}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19791}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HeumannTK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HoppeHTKD10, author = {Tobias Hoppe and S{\"{o}}nke Holthusen and Sven Tuchscheerer and Stefan Kiltz and Jana Dittmann}, editor = {Felix C. Freiling}, title = {Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {153--164}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19778}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HoppeHTKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HuhnleinRZ10, author = {Detlef H{\"{u}}hnlein and Heiko Ro{\ss}nagel and Jan Zibuschka}, editor = {Felix C. Freiling}, title = {Diffusion of Federated Identity Management}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {25--36}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19795}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HuhnleinRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KastlL10, author = {Wolfgang Kastl and Thomas Loimayr}, editor = {Felix C. Freiling}, title = {A Parallel Computing System with Specialized Coprocessors for Cryptanalytic Algorithms}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {73--84}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19801}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KastlL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KiltzHAD10, author = {Stefan Kiltz and Mario Hildebrandt and Robert Altschaffel and Jana Dittmann}, editor = {Felix C. Freiling}, title = {A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {93--104}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19803}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KiltzHAD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kirchner10, author = {Matthias Kirchner}, editor = {Felix C. Freiling}, title = {Lineare Zeilen- und Spaltenpr{\"{a}}diktoren zur Erkennung von Bildskalierungen}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {117--128}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19775}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Kirchner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kuhn10, author = {Ulrich K{\"{u}}hn}, editor = {Felix C. Freiling}, title = {On Security Protocols for Desktop Sharing}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {229--240}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19785}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Kuhn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MessmerK10, author = {Roman Messmer and J{\"{o}}rg Keller}, editor = {Felix C. Freiling}, title = {Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware Video Networks}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {49--60}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19799}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MessmerK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Pohls10, author = {Henrich Christopher P{\"{o}}hls}, editor = {Felix C. Freiling}, title = {Why Showing One {TLS} Certificate is not Enough - Towards a Browser Feedback for Multiple {TLS} Certificate Verifications}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {265--276}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19788}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Pohls10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RietzSVK10, author = {Ren{\'{e}} Rietz and Sebastian Schmerl and Michael Vogel and Hartmut K{\"{o}}nig}, editor = {Felix C. Freiling}, title = {Iterative pr{\"{a}}zisionsbewertende Signaturgenerierung}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {141--152}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19777}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RietzSVK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RistigFS10, author = {Christian Ristig and Ren{\'{e}} Fritzsche and Christian Siemers}, editor = {Felix C. Freiling}, title = {WatchCop - Safer Software Execution through Hardware/Software Co-Design}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {277--288}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19789}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RistigFS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchaferBSZHK10, author = {Marcel Sch{\"{a}}fer and Waldemar Berchtold and Martin Steinebach and Sascha Zmudzinski and Margareta Heilmann and Stefan Katzenbeisser}, editor = {Felix C. Freiling}, title = {Collusion-Secure Fingerprint Watermarking for Real World Applications}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {129--140}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19776}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchaferBSZHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchneiderB10, author = {Michael Schneider and Johannes Buchmann}, editor = {Felix C. Freiling}, title = {Extended Lattice Reduction Experiments Using the {BKZ} Algorithm}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {241--252}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19786}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchneiderB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchrankBJP10, author = {Michael Schrank and Bastian Braun and Martin Johns and Joachim Posegga}, editor = {Felix C. Freiling}, title = {Session Fixation - The Forgotten Vulnerability?}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {341--352}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19794}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchrankBJP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schryen10, author = {Guido Schryen}, editor = {Felix C. Freiling}, title = {A Fuzzy Model for {IT} Security Investments}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {289--304}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19790}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schryen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchwabFSP10, author = {Fabian Schwab and Alexander Findeisen and Peter Sakal and Hartmut Pohl}, editor = {Felix C. Freiling}, title = {Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {253--264}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19787}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchwabFSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SovisKS10, author = {Pavol Sovis and Florian Kohlar and J{\"{o}}rg Schwenk}, editor = {Felix C. Freiling}, title = {Security Analysis of OpenID}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {329--340}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19793}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SovisKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SpreitzenbarthH10, author = {Michael Spreitzenbarth and Thorsten Holz}, editor = {Felix C. Freiling}, title = {Towards Secure Deletion on Smartphones}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {165--176}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19779}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SpreitzenbarthH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StelteS10, author = {Bj{\"{o}}rn Stelte and Bj{\"{o}}rn Saxe}, editor = {Felix C. Freiling}, title = {State-of-the-Art Kryptoverfahren f{\"{u}}r drahtlose Sensornetze - Eine Krypto-Bibliothek f{\"{u}}r MantisOS}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {217--228}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19783}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StelteS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10, author = {Philipp Trinius and Carsten Willems and Thorsten Holz and Konrad Rieck}, editor = {Felix C. Freiling}, title = {A Malware Instruction Set for Behavior-Based Analysis}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {205--216}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19782}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WeisSF10, author = {R{\"{u}}diger Weis and Brian Sch{\"{u}}ler and Stefan A. Flemming}, editor = {Felix C. Freiling}, title = {Towards Secure and Reliable Firewall Systems based on {MINIX3}}, booktitle = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, pages = {85--92}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19802}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WeisSF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2010, editor = {Felix C. Freiling}, title = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober 2010 in Berlin}, series = {{LNI}}, volume = {{P-170}}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19974}, isbn = {978-3-88579-264-2}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AdelsbachG08, author = {Andr{\'{e}} Adelsbach and Ulrich Greveler}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {{ANOCAST:} Rethinking Broadcast Anonymity in the Case of Wireless Communication}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {71--84}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21518}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AdelsbachG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AlkassarGQ08, author = {Ammar Alkassar and Utz Gnaida and Thomas Quirin}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {MoTrust-TCG: Manipulationsschutz f{\"{u}}r mobile Signaturanwendungen mittels "Trusted Computing"}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {575--580}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21512}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AlkassarGQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BacksP08, author = {Peter Backs and Norbert Pohlmann}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Einfluss von Sicherungsma{\ss}nahmen auf die {\"{U}}bertragungsqualit{\"{a}}t von VoIP}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {563--568}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21510}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BacksP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BecherF08, author = {Michael Becher and Felix C. Freiling}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards Dynamic Malware Analysis to Increase Mobile Device Security423}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {423--433}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21495}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BecherF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BeekM08, author = {Frank van der Beek and Martin Mink}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Wie lernt man IT-Sicherheit am besten? Eine empirische Studie}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {499--511}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21501}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BeekM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BuchmannDL08, author = {Johannes Buchmann and Martin D{\"{o}}ring and Richard Lindner}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Efficiency Improvement for {NTRU}}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {163--178}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21474}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BuchmannDL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BushN08, author = {Christoph Busch and Alexander Nouak}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {3-D-Gesichtserkennung f{\"{u}}r die unbeaufsichtigte Grenzkontrolle}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {249--261}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21480}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BushN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DietrichR08, author = {Christian J. Dietrich and Christian Rossow}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Empirische Untersuchung von IP-Blacklists}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {545--549}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21507}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DietrichR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EbingerS08, author = {Peter Ebinger and Martin Sommer}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Using Localization Information for Attack Detection in Mobile Ad hoc Networks}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {395--406}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21493}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EbingerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EichholzH08, author = {Jan Eichholz and Detlef H{\"{u}}hnlein}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Using {ISO/IEC} 24727 for Mobile Devices}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {581--587}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21513}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EichholzH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FederrathP08, author = {Hannes Federrath and Wolfgang P{\"{o}}ppel}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem hashwertbasierten Datenscanner}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {59--70}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21514}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FederrathP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FreilingL08, author = {Felix C. Freiling and Jens Liebchen}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage f{\"{u}}r Netzwerkpenetrationstests}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {435--447}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21496}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FreilingL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FritschA08, author = {Lothar Fritsch and Habtamu Abie}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards a Research Road Map for the Management of Privacy Risks in Information Systems}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {1--15}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21470}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FritschA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GanstererI08, author = {Wilfried N. Gansterer and Michael Ilger}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards Self-Learning and Fully Transparent {UCE} Prevention}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {277--290}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21483}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GanstererI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GebhardtIS08, author = {Max Gebhardt and Georg Illies and Werner Schindler}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {111--125}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21521}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GebhardtIS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Heinlein08, author = {Peer Heinlein}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Rechtliche Aspekte der Spamfilterung f{\"{u}}r Unternehmen und Administratoren}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {539--544}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21506}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Heinlein08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HickI08, author = {Sibylle Hick and Luigi Lo Iacono}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Elliptic Curve Cryptography in x.509-based {PKI}}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {137--147}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21472}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HickI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HildmannKR08, author = {Thomas Hildmann and Odej Kao and Christopher Ritter}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {eXtreme Role Engineering: Ein neuer Ansatz zur Rechtedefinition und -vergabe}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {569--573}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21511}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HildmannKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HoppeD08, author = {Tobias Hoppe and Jana Dittmann}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Vort{\"{a}}uschen von Komponentenfunktionalit{\"{a}}t im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {341--353}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21488}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HoppeD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/IkinciHF08, author = {Ali Ikinci and Thorsten Holz and Felix C. Freiling}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {407--421}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21494}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JagerJS08, author = {Tibor Jager and Heiko J{\"{a}}kel and J{\"{o}}rg Schwenk}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei {SSL/TLS}}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {127--136}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21471}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JagerJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JahnkeTM08, author = {Marko Jahnke and Christian Thul and Peter Martini}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Comparison and Improvement of Metrics for Selecting Intrusion Response Measures against DoS Attacks}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {381--393}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21491}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JahnkeTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KesdoganPP08, author = {Dogan Kesdogan and Dang Vinh Pham and Lexi Pimenidis}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Analyse der Verkettbarkeit in nutzergesteuerten Identit{\"{a}}tsmanagementsystemen}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {17--30}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21481}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KesdoganPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KorteKMPNTVM08, author = {Ulrike Korte and Michael Krawczak and Johannes Merkle and Rainer Plaga and Matthias Niesing and Carsten Tiemann and A. J. Han Vinck and Ulrich Martini}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {A Cryptographic Biometric Authentication System based on Genetic Fingerprints}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {263--276}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21482}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KorteKMPNTVM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KuhnPTW08, author = {Ulrich K{\"{u}}hn and Andrei Pyshkin and Erik Tews and Ralf{-}Philipp Weinmann}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Variants of Bleichenbacher's Low-Exponent Attack on PKCS{\#}1 {RSA} Signatures}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {97--109}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21520}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KuhnPTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LowisHG08, author = {Lutz Lowis and Sebastian H{\"{o}}hn and Maike Gilliot}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Vulnerability Effect Propagation in Service-Oriented Archtectures}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {473--484}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21499}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LowisHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MakrushinDKH08, author = {Andrey Makrushin and Jana Dittmann and Stefan Kiltz and Tobias Hoppe}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {315--327}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21486}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MakrushinDKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MattesSPMH08, author = {Tina Mattes and Frank Schiller and J{\"{o}}rg Pfahler and Annemarie M{\"{o}}rwald and Thomas Honold}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Nachweis der G{\"{u}}te von Kombinationen des {CRC}}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {355--366}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21489}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MattesSPMH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MeintsH08, author = {Martin Meints and Marit Hansen}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Der ePass - eine Sicherheits-und Datenschutzanalyse}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {31--43}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21492}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MeintsH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MiedlM08, author = {Horst Miedl and Josef M{\"{a}}rtz}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Qualifizierung integrierter Werkzeugumgebungen f{\"{u}}r die Erstellung sicherheitsrelevanter Software in Kernkraftwerken}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {589--593}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21515}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MiedlM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/OppligerSH08, author = {Rolf Oppliger and J{\"{o}}rg Schwenk and J{\"{o}}rg Helbach}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Protecting Code Voting Against Vote Selling}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {193--204}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21476}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/OppligerSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Pohls08, author = {Henrich Christopher P{\"{o}}hls}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {ConCert: Content Revocation Using Certificates}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {149--162}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21473}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Pohls08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PoschmannK08, author = {Christoph P{\"{o}}rschmann and Heiko Knospe}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Analyse spektraler Parameter des Audiosignals zur Identifikation und Abwehr von Telefon-SPAM}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {551--555}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21508}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PoschmannK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RossnagelZ08, author = {Heiko Rossnagel and Jan Zibuschka}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {533--537}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21505}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RossnagelZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Royer08, author = {Denis Royer}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Ganzheitliche Bewertung von Enterprise Identity Management Systemen - Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterst{\"{u}}tzungsinstrument}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {449--460}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21497}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Royer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchmerlRK08, author = {Sebastian Schmerl and Ren{\'{e}} Rietz and Hartmut K{\"{o}}nig}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel von Snort}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {367--379}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21490}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchmerlRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SeedorfdNE08, author = {Jan Seedorf and Nico d'Heureuse and Saverio Niccolini and Thilo Ewald}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {VoIP {SEAL:} {A} Research Prototype for Protecting Voice-over-IP Networks and Users}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {557--561}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21509}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SeedorfdNE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Seewald08, author = {Alexander K. Seewald}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards Autmating Malware Classification and Characterization}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {291--302}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21484}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Seewald08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ShoufanH08, author = {Abdulhadi Shoufan and Sorin A. Huss}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Schl{\"{u}}sselverwaltung im Sicheren Multicast}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {179--191}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21475}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ShoufanH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SohnleinS08, author = {Sven S{\"{o}}hnlein and Francesca Saglietti}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Nachweis hoher Softwarezuverl{\"{a}}ssigkeit auf der Basis von Test- und Betriebserfahrung mit wiederverwendbaren Komponenten}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {303--314}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21485}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SohnleinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StampfelGI08, author = {Gerald Stampfel and Wilfried N. Gansterer and Martin Ilger}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Implications of the {EU} Data Retention Directive 2006/24/EC}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {45--58}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21503}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StampfelGI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SteinebachML08, author = {Martin Steinebach and Christoph Moebius and Huajian Liu}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Bildforensische Verfahren zur Unterst{\"{u}}tzung von Wasserzeichendetektion}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {205--217}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21477}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SteinebachML08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/TrukenmullerH08, author = {Jan Trukenm{\"{u}}ller and Olaf Henniger}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {OpenPGP-Karten mit biometrischer Benutzerauthentisierung}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {527--531}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21504}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/TrukenmullerH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/UrbasLSH08, author = {Leon Urbas and Sandro Leuchter and Torsten Schaft and Marcus Heinath}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Modellgest{\"{u}}tzte Bewertung der Ablenkungswirkung von neuen interaktiven Diensten im Fahrzeug}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {329--340}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21487}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/UrbasLSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Weiss08, author = {Stefan Weiss}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Using the Concept of Topic Maps for Enhancing Information Privacy in Social Networking Applications}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {85--96}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21519}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Weiss08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WeissM08, author = {Steffen Weiss and Klaus Meyer{-}Wegener}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Towards Solving the Data Problem in Measurement of Organisations' Security}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {461--472}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21498}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WeissM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld08, author = {Andreas Westfeld}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Steganalyse von JPEG-Dateien}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {219--232}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21478}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld08a, author = {Andreas Westfeld}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Von Bogensch{\"{u}}tzen und digitalen Wasserzeichen}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {595--599}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21516}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WillemsM08, author = {Christian Willems and Christoph Meinel}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Awareness Creation mit Tele-Lab IT-Security: Praktisches Sicherheitstraining im virtuellen Labor am Beispiel Trojanischer Pferde}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {513--532}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21502}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WillemsM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfP08, author = {Marko Wolf and Christof Paar}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Security Requirements Engineering in the Automotive Domain: On Specification Procedures and Implementation Aspects}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {485--498}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21500}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZmudzinskiS08, author = {Sascha Zmudzinski and Martin Steinebach}, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Content-based Message Authentication Coding for Audio Data}, booktitle = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, pages = {233--247}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21479}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZmudzinskiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2008, editor = {Ammar Alkassar and J{\"{o}}rg H. Siekmann}, title = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008 im Saarbr{\"{u}}cker Schloss}, series = {{LNI}}, volume = {{P-128}}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21469}, isbn = {978-3-88579-222-2}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AlkassarAL06, author = {Ammar Alkassar and Elena Andreeva and Helger Lipmaa}, editor = {Jana Dittmann}, title = {{SLC:} Efficient Authenticated Encryption for Short Packages}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {270--278}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24782}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AlkassarAL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ArmknechtBI06, author = {Frederik Armknecht and J{\"{o}}rg Brandeis and Egor Ilinykh}, editor = {Jana Dittmann}, title = {Experimental results on algebraic attacks on stream ciphers}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {279--282}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24783}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ArmknechtBI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BecherBD06, author = {Alexander Becher and Zinaida Benenson and Maximillian Dornseif}, editor = {Jana Dittmann}, title = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {26--29}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24799}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BelliBH06, author = {Fevzi Belli and Christof J. Budnik and Axel Hollmann}, editor = {Jana Dittmann}, title = {Holistic Testing of Interactive Systems Using Statecharts}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {345--356}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24793}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BelliBH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BoursasH06, author = {Latifa Boursas and Wolfgang Hommel}, editor = {Jana Dittmann}, title = {Policy-gesteuerte Datenfreigaben und Trust Management im organisations{\"{u}}bergreifenden Identit{\"{a}}ts-Management}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {91--102}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24759}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BoursasH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ClaussS06, author = {Sebastian Clau{\ss} and Stefan Schiffner}, editor = {Jana Dittmann}, title = {Anonymit{\"{a}}t auf Andwendungsebene}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {171--182}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24770}, timestamp = {Thu, 10 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ClaussS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ClaussSSKKP06, author = {Sebastian Clau{\ss} and Stefan Schiffner and Sandra Steinbrecher and Dogan Kesdogan and Tobias K{\"{o}}lsch and Lexi Pimenidis}, editor = {Jana Dittmann}, title = {Identit{\"{a}}tsmanagement und das Risiko der Re-Identifikation}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {188--191}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24772}, timestamp = {Thu, 10 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ClaussSSKKP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/CockWP06, author = {Danny De Cock and Christopher Wolf and Bart Preneel}, editor = {Jana Dittmann}, title = {The Belgian Electronic Identity Card (Overview)}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {298--301}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24786}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/CockWP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DiedrichKF06, author = {Christian Diedrich and Jan Krause and Andreas Franke}, editor = {Jana Dittmann}, title = {{UML} based software development under safety constraints}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {361--368}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24795}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DiedrichKF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DimlerFNP06, author = {Simone Dimler and Hannes Federrath and Thomas Nowey and Klaus Pl{\"{o}}{\ss}l}, editor = {Jana Dittmann}, title = {Awareness f{\"{u}}r IT-Sicherheit und Datenschutz in der Hochschulausbildung - Eine empirirsche Untersuchung}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {18--21}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24779}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DimlerFNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Ehrenberger06, author = {Wolfgang D. Ehrenberger}, editor = {Jana Dittmann}, title = {Schichtenbetrachtung bei der Genehmigung von Software aufgrund von Betriebserfahrung}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {369--372}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24796}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Ehrenberger06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/EsserF06, author = {Hans{-}Georg E{\ss}er and Felix C. Freiling}, editor = {Jana Dittmann}, title = {Kapazit{\"{a}}tsmessung eines verdeckten Zeitkanals {\"{u}}ber {HTTP}}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {115--118}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24763}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/EsserF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FayST06, author = {Bj{\"{o}}rn Fay and J{\"{o}}rn Schweisgut and Christian Tobias}, editor = {Jana Dittmann}, title = {Identit{\"{a}}tsbasierte Kryptografie - Hindernisse auf dem Weg von der Theorie in die Praxis}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {317--328}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24789}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FayST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GajekSW06, author = {Sebastian Gajek and J{\"{o}}rg Schwenk and Christoph Wegener}, editor = {Jana Dittmann}, title = {SSL-VA-Authentifizierung als Schutz von Phishing und Pharming}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {6--17}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24768}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GajekSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GaupmannSZE06, author = {Andreas Gaupmann and Christian Schausberger and Ulrich Zehl and J{\"{u}}rgen Ecker}, editor = {Jana Dittmann}, title = {Implementing Zero-Knowledge Authentication in OpenSSH}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {302--305}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24787}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GaupmannSZE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GebhardtIS06, author = {Max Gebhardt and Georg Illies and Werner Schindler}, editor = {Jana Dittmann}, title = {A Note on the Practical Value of Single Hash Collisions for Special File Formats}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {333--344}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24792}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GebhardtIS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Greveler06, author = {Ulrich Greveler}, editor = {Jana Dittmann}, title = {Patentierung kryptographischer Verfahren, die an Hochschulen entwickelt wurden}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {329--332}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24791}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Greveler06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Gross06, author = {Stephan Gro{\ss}}, editor = {Jana Dittmann}, title = {Selbstsch{\"{u}}tzende mobile Systeme}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {103--106}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24760}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Gross06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GursesS06, author = {Seda F. G{\"{u}}rses and Thomas Santen}, editor = {Jana Dittmann}, title = {Contextualizing Security Goals: {A} Method for Multilateral Security Requirements Elicitation}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {42--53}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24801}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GursesS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Holz06, author = {Thorsten Holz}, editor = {Jana Dittmann}, title = {Learning More About Attack Patterns With Honeypots}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {30--41}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24800}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Holz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HuhnleinK06, author = {Detlef H{\"{u}}hnlein and Ulrike Korte}, editor = {Jana Dittmann}, title = {Rechtliche Rahmenbedingungen der elektronischen Rechnung}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {256--269}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24781}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HuhnleinK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kopsell06, author = {Stefan K{\"{o}}psell}, editor = {Jana Dittmann}, title = {Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der Anonymisierungsdienste {AN.ON} und Tor}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {183--187}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24771}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Kopsell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KossakowskiS06, author = {Klaus{-}Peter Kossakowski and J{\"{u}}rgen Sander}, editor = {Jana Dittmann}, title = {CarmentiS Auf dem Weg zu einem deutschen IT-Fr{\"{u}}hwarnsystem}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {22--25}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24790}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KossakowskiS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Krabichler06, author = {Thomas Krabichler}, editor = {Jana Dittmann}, title = {Das Problem der geringen Verbreitung qualifizierter elektronischer Signaturen - Ursachen und L{\"{o}}sungsans{\"{a}}tze aus Sicht der Wirtschaftswissenschaften}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {222--232}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24777}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Krabichler06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Kugler06, author = {R{\"{u}}diger K{\"{u}}gler}, editor = {Jana Dittmann}, title = {Softwareschutz durch einen Hardware-Dongle}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {111--114}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24762}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Kugler06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Langweg06, author = {Hanno Langweg}, editor = {Jana Dittmann}, title = {Malware Attacks on Electronic Signatures Revisited}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {244--255}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24780}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Langweg06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LassmannS06, author = {Gunter La{\ss}mann and Matthias Schwan}, editor = {Jana Dittmann}, title = {Vertrauensw{\"{u}}rdige Chipkartenbasierte Biometrische Authentifikation}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {66--77}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24803}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LassmannS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LuH06, author = {Shourong Lu and Wolfgang A. Halang}, editor = {Jana Dittmann}, title = {A {UML} Framework for Safety Mechanisms Based on {IEC} 61508}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {357--360}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24794}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LuH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Munch06, author = {Isabel M{\"{u}}nch}, editor = {Jana Dittmann}, title = {Internationalisierung der IT-Grundschutz-Zertifizierung}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {1--5}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24757}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Munch06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Pimenidis06, author = {Lexi Pimenidis}, editor = {Jana Dittmann}, title = {A Method for Degradation of Anonymity on Mix Systems for E-Mail and Surfing the {WWW}}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {155--158}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24767}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Pimenidis06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Saglietti06, author = {Francesca Saglietti}, editor = {Jana Dittmann}, title = {Interaktion zwischen funktionaler Sicherheit und Datensicherheit}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {373--383}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24797}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Saglietti06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ScheidatWV06, author = {Tobias Scheidat and Franziska Wolf and Claus Vielhauer}, editor = {Jana Dittmann}, title = {Analyse biometrischer Handschriftverifikation im Kontext von Metadaten}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {54--65}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24802}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ScheidatWV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SchmerlFM06, author = {Sebastian Schmerl and Ulrich Flegel and Michael Meier}, editor = {Jana Dittmann}, title = {Vereinfachung der Signaturentwicklung durch Wiederverwendung}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {201--212}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24774}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SchmerlFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schweisgut06, author = {J{\"{o}}rn Schweisgut}, editor = {Jana Dittmann}, title = {Effiziente elektronische Wahlen mit Observer}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {306--316}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24788}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schweisgut06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Stamer06, author = {Heiko Stamer}, editor = {Jana Dittmann}, title = {Verifikation von Ping-Pong Protokollen in Zeit \emph{O}(\emph{n}\({}^{\mbox{2}}\))}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {283--293}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24784}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Stamer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/SteinebachZ06, author = {Martin Steinebach and Sascha Zmudzinski}, editor = {Jana Dittmann}, title = {Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {143--154}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24766}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/SteinebachZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StrackK06, author = {Hermann Strack and Christoph Karich}, editor = {Jana Dittmann}, title = {BeGovSAH - Begleitforschung zur Umsetzung des eGovernment-Aktionsplans in Sachsen-Anhalt}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {213--217}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24775}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StrackK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Strang06, author = {Thomas Strang}, editor = {Jana Dittmann}, title = {Geographische Authentifikation und Signatur}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {192--200}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24773}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Strang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/StraubHR06, author = {Tobias Straub and Manuel Hartl and Markus Ruppert}, editor = {Jana Dittmann}, title = {Digitale Reisep{\"{a}}sse in Deutschland - Prozesse und Sicherheitsinfrastruktur}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {233--243}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24778}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/StraubHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/UzunovaB06, author = {Violeta Uzunova and Arslan Br{\"{o}}mme}, editor = {Jana Dittmann}, title = {On Experiences with (In)direct Marking Techniques for Eye Features within Evaluation of Irides Recognizing Biometric Authentication Systems}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {78--90}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24758}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/UzunovaB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/VogelDHK06, author = {Thomas Vogel and Jana Dittmann and Reyk Hillert and Christian Kr{\"{a}}tzer}, editor = {Jana Dittmann}, title = {Design und Evaluierung von Steganographie f{\"{u}}r Voice-over-IP}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {131--142}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24765}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/VogelDHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/VolkamerRV06, author = {Melanie Volkamer and Walter Reinhard and Roland Vogt}, editor = {Jana Dittmann}, title = {{FUSE} - ein Internetwahlsystem f{\"{u}}r zeitlich unbegrenzt geheime Betriebswahlen}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {159--170}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24769}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/VolkamerRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/VolkmerW06, author = {Markus Volkmer and Sebastian Wallner}, editor = {Jana Dittmann}, title = {Ein IP-Core Design f{\"{u}}r Schl{\"{u}}sselaustausch, Stromchiffre und Identifikation auf ressourcenbeschr{\"{a}}nkten Ger{\"{a}}ten}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {294--297}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24785}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/VolkmerW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld06, author = {Andreas Westfeld}, editor = {Jana Dittmann}, title = {Steganographie f{\"{u}}r den Amateurfunk}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {119--130}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24764}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WiesmaierRLHRB06, author = {Alexander Wiesmaier and Ulrich Rauchschwalbe and Christoph Ludwig and Birgit Henhapl and Markus Ruppert and Johannes Buchmann}, editor = {Jana Dittmann}, title = {Intrinsically Legal-For-Trade Objects by Digital Signatures}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {218--221}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24776}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WiesmaierRLHRB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZhouSB06, author = {Xuebing Zhou and Martin Schmucker and Christopher L. Brown}, editor = {Jana Dittmann}, title = {Video Perceptual Hashing Using Interframe Similarity}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {107--110}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24761}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZhouSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2006, editor = {Jana Dittmann}, title = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24756}, isbn = {3-88579-171-4}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AdelsbachG05, author = {Andr{\'{e}} Adelsbach and Ulrich Greveler}, editor = {Hannes Federrath}, title = {Satellite Communication without Privacy - Attacker's Paradise}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {257--268}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28380}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AdelsbachG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BelliB05, author = {Fevzi Belli and Christof J. Budnik}, editor = {Hannes Federrath}, title = {Test Cost Reduction for Interactive Systems}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {149--160}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28366}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BelliB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BenensonGK05, author = {Zinaida Benenson and Felix C. G{\"{a}}rtner and Dogan Kesdogan}, editor = {Hannes Federrath}, title = {Secure Multi-Party Computation with Security Modules}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {41--52}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28394}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Berthold05, author = {Oliver Berthold}, editor = {Hannes Federrath}, title = {Datenschutzgerechte RFID-Technologie}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {253--256}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28379}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Berthold05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Bohme05, author = {Rainer B{\"{o}}hme}, editor = {Hannes Federrath}, title = {IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {27--40}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28383}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Bohme05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/BrucknerV05, author = {Lars Br{\"{u}}ckner and Marco Voss}, editor = {Hannes Federrath}, title = {SIdentity - Sichere und private Attribut{\"{u}}bermittlung an Internet - Dienste per Mobiltelefon}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {269--272}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28381}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/BrucknerV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DaimerT05, author = {Gottfried Daimer and Till Teichmann}, editor = {Hannes Federrath}, title = {Elektronische Signatur - Eignung des biometrischen Merkmals "Fingerabdruck" als m{\"{o}}glicher PIN-Ersatz}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {385--396}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28395}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DaimerT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DietzeHIR05, author = {Lars Dietze and Bernd Holznagel and Luigi Lo Iacono and Christoph Ruland}, editor = {Hannes Federrath}, title = {Qualifizierte Signatur im eletronischeen Messdatenaustausch}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {335--348}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28390}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DietzeHIR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/DittmannLSK05, author = {Jana Dittmann and Andreas Lang and Martin Steinebach and Stefan Katzenbeisser}, editor = {Hannes Federrath}, title = {{ECRYPT} - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {189--192}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28370}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/DittmannLSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Fischer-DieskauKSV05, author = {Stefanie Fischer{-}Dieskau and Thomas Kunz and Andreas U. Schmidt and Ursula Viebeg}, editor = {Hannes Federrath}, title = {Grundkonzepte rechtssicherer Transformation signierter Dokumente}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {401--412}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28397}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Fischer-DieskauKSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Flegel05, author = {Ulrich Flegel}, editor = {Hannes Federrath}, title = {Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building Blocks for Anonymity}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {221--232}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28375}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Flegel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FrankeP05, author = {Markus Franke and Oliver Pfaff}, editor = {Hannes Federrath}, title = {SAMLized Kerberos}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {297--308}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28385}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FrankeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/FritschR05, author = {Lothar Fritsch and Heiko Rossnagel}, editor = {Hannes Federrath}, title = {Die Krise des Signaturmarktes: L{\"{o}}sungsans{\"{a}}tze aus betriebswirtschaftlicher Sicht}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {315--326}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28387}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/FritschR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GolzeMW05, author = {Sebastian Golze and Gero M{\"{u}}hl and Torben Weis}, editor = {Hannes Federrath}, title = {How to Configure Proof-of-Work Functions to Stop Spam}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {165--174}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28368}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GolzeMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrossLS05, author = {Stephan Gro{\ss} and Sabine Lein and Sandra Steinbrecher}, editor = {Hannes Federrath}, title = {Ein mehrseitig sicheres Abrechnungsystem f{\"{u}}r Wireless {LAN} Hotspots}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {249--252}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28378}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrossLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrunertR05, author = {Ronald Grunert and Frank Rustemeyer}, editor = {Hannes Federrath}, title = {Aufbau von qualifizierten Zertifizierungsdiensten f{\"{u}}r die Deutsche Rentenverischerung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {331--334}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28389}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/GrunertR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/HeckmannF05, author = {Reinhold Heckmann and Christian Ferdinand}, editor = {Hannes Federrath}, title = {Verifying Safety-Critical Properties of Embedded Software by Abstract Interpretation}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {125--128}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28363}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/HeckmannF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Hillen05, author = {Detlef Hillen}, editor = {Hannes Federrath}, title = {SigB{\"{u}}-API: Einheitliche kartenunabh{\"{a}}ngige {API} f{\"{u}}r die Zugriffe auf die Siganturkarten des Signaturb{\"{u}}ndnisses}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {375--383}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28393}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Hillen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Huhnlein05, author = {Detlef H{\"{u}}hnlein}, editor = {Hannes Federrath}, title = {Die CCES-Signature-API - Eine offene Programmierschnittstelle f{\"{u}}r langfristig beweiskr{\"{a}}ftige elektronische Signaturen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {361--374}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28392}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Huhnlein05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/JungSS05, author = {Martin Jung and Francesca Saglietti and Verena Sauerborn}, editor = {Hannes Federrath}, title = {Beherrschung von Schnittstelleninkonsistenzen in komponentenbasierten Softwaresystemen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {101--112}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28404}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/JungSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KaratsiolisLW05, author = {Evangelos G. Karatsiolis and Marcus Lippert and Alexander Wiesmaier}, editor = {Hannes Federrath}, title = {Planning for Directory Services in Public Key Infrastructures}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {349--360}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28391}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KaratsiolisLW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KatzenbeisserSV05, author = {Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, editor = {Hannes Federrath}, title = {Malware Engineering}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {139--148}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28365}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KatzenbeisserSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KesdoganR05, author = {Dogan Kesdogan and Oliver Rattay}, editor = {Hannes Federrath}, title = {Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {233--244}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28376}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KesdoganR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/KochP05, author = {Manuel Koch and Karl Pauls}, editor = {Hannes Federrath}, title = {Model-driven development of access control aspects}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {273--284}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28382}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/KochP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LaskovRSM05, author = {Pavel Laskov and Konrad Rieck and Christin Sch{\"{a}}fer and Klaus{-}Robert M{\"{u}}ller}, editor = {Hannes Federrath}, title = {Visualization of anomaly detection using prediction sensitivity}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {197--208}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28373}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LaskovRSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MeierS05, author = {Michael Meier and Sebastian Schmerl}, editor = {Hannes Federrath}, title = {Effiziente Analyseverfahren f{\"{u}}r Intrusion-Detection-Systeme}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {209--220}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28374}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MeierS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MrugallaM05, author = {Christian Mrugalla and S{\"{o}}nke Maseberg}, editor = {Hannes Federrath}, title = {IT-Grundschutz-basierendes Sicherheitskonzept f{\"{u}}r die Virtuelle Poststelle des Bundes}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {11--14}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28361}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MrugallaM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MurmannR05, author = {Tobias Murmann and Heiko Rossnagel}, editor = {Hannes Federrath}, title = {Sicherheitsanalyse von Betriebssystemen f{\"{u}}r Mobile Endger{\"{a}}te}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {129--138}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28364}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MurmannR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/NoweyFKP05, author = {Thomas Nowey and Hannes Federrath and Christian Klein and Klaus Pl{\"{o}}{\ss}l}, editor = {Hannes Federrath}, title = {Ans{\"{a}}tze zur Evaluierung von Sicherheitsinvestitionen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {15--26}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28372}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/NoweyFKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Pimenidis05, author = {Lexi Pimenidis}, editor = {Hannes Federrath}, title = {A Practical Approach to Tranparent und Usable Anonymity Networks}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {245--248}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28377}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Pimenidis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PlosslFN05, author = {Klaus Pl{\"{o}}{\ss}l and Hannes Federrath and Thomas Nowey}, editor = {Hannes Federrath}, title = {Schutzm{\"{o}}glichkeiten gegen Phishing}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {161--164}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28367}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PlosslFN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/PriebeDMP05, author = {Torsten Priebe and Wolfgang Dobmeier and Bj{\"{o}}rn Muschall and G{\"{u}}nther Pernul}, editor = {Hannes Federrath}, title = {{ABAC} - Ein Referenzmodell f{\"{u}}r attributbasierte Zugriffskontrolle}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {285--296}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28384}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/PriebeDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ReicheltR05, author = {Dirk Reichelt and Franz Rothlauf}, editor = {Hannes Federrath}, title = {Verfahren zur Bestimmung der Zuverl{\"{a}}ssigkeit von Kommunikationsnetzwerken: Eine Studie zu exakten und approximativen Verfahren}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {89--100}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28403}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ReicheltR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/RothmaierK05, author = {Gerrit Rothmaier and Heiko Krumm}, editor = {Hannes Federrath}, title = {Formale Modellierung und Analyse protokollbasierter Angriffe in {TCP/IP} Netzwerken am Beispiel von {ARP} und {RIP}}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {77--88}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28402}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/RothmaierK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Santen05, author = {Thomas Santen}, editor = {Hannes Federrath}, title = {Probabilistic Confidentiality Properties based on Indistinguishability}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {113--124}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28362}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Santen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Schreiber05, author = {Susanne Schreiber}, editor = {Hannes Federrath}, title = {{\"{A}}nderungen im Hinblick auf die Beantragung qualifizierter elektronischer Signaturen gem{\"{a}}{\ss} dem 1. Sig{\"{A}}ndG - Eine kritische W{\"{u}}rdigung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {327--330}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28388}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Schreiber05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/VielhauerDHW05, author = {Claus Vielhauer and Jana Dittmann and Christian Helmholz and Marten Wenzel}, editor = {Hannes Federrath}, title = {Multifaktorielle Benutzerauthentifizierung durch {PAM} und Fingerabdruck f{\"{u}}r Linux Infrastrukturen}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {309--312}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28386}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/VielhauerDHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Westfeld05, author = {Andreas Westfeld}, editor = {Hannes Federrath}, title = {Nutzung der Nachbarkorrelation f{\"{u}}r Steganalyse mit erh{\"{o}}hter Zuverl{\"{a}}ssigkeit}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {53--64}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28400}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Westfeld05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/Wohner05, author = {Thomas W{\"{o}}hner}, editor = {Hannes Federrath}, title = {Analyse und Bewertung von Kopierschutzverfahren f{\"{u}}r Audio-CDs}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {175--188}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28369}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/Wohner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Hannes Federrath}, title = {Applications of Multivariate Quadratic Public Key Systems}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {413--424}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28398}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfWP05, author = {Marko Wolf and Andr{\'{e}} Weimerskirch and Christof Paar}, editor = {Hannes Federrath}, title = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology im Automobil}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {193--196}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28371}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WunderlichS05, author = {Torsten Wunderlich and Siegfried Staude}, editor = {Hannes Federrath}, title = {Online - Patenanmeldung}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {397--400}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28396}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WunderlichS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ZmudzinskiS05, author = {Sascha Zmudzinski and Martin Steinebach}, editor = {Hannes Federrath}, title = {Vertrauensw{\"{u}}rdigkeit von Audiodaten - Digitale Wasserzeichen und Verifikation der semantischen Integrit{\"{a}}t}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {65--76}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28401}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ZmudzinskiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sicherheit/2005, editor = {Hannes Federrath}, title = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28360}, isbn = {3-88579-391-1}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.