For my academic CV, see the CV page.
2016
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection Proceedings Article
In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 37–46, ACM, Vienna, Austria, 2016, ISBN: 978-1-4503-4569-9.
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet Proceedings Article
In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 43–48, ACM, Darmstadt, Germany, 2016, ISBN: 978-1-4503-4270-4.
On the Privacy and Performance of Mobile Anonymous Microblogging Journal Article
In: IEEE Trans. Information Forensics and Security, vol. 11, no. 7, pp. 1578–1591, 2016.
2014
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM Proceedings Article
In: Ahn, Gail-Joon; Datta, Anupam (Ed.): Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, pp. 1–10, ACM, 2014.
Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Proceedings Article
In: Fu, Kevin; Jung, Jaeyeon (Ed.): Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pp. 733–748, USENIX Association, 2014.
Quantitative Ansätze zur IT-Risikoanalyse Proceedings Article
In: Katzenbeisser, Stefan; Lotz, Volkmar; Weippl, Edgar R. (Ed.): Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich, pp. 293–303, GI, 2014.
IT-Security in Railway Signalling Systems Proceedings Article
In: Reimer, Helmut; Pohlmann, Norbert; Schneider, Wolfgang (Ed.): ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014, pp. 56–64, Springer, 2014.
MoP-2-MoP - Mobile Private Microblogging Proceedings Article
In: Christin, Nicolas; Safavi-Naini, Reihaneh (Ed.): Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pp. 384–396, Springer, 2014.
A privacy protection system for HbbTV in Smart TVs Proceedings Article
In: 11th IEEE Consumer Communications and Networking Conference, CCNC 2014, Las Vegas, NV, USA, January 10-13, 2014, pp. 357–362, IEEE, 2014.
2013
Efficiently Outsourcing Multiparty Computation Under Multiple Keys Journal Article
In: IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 2046–2058, 2013, ISSN: 1556-6013.
Security analysis of a widely deployed locking system Proceedings Article
In: Sadeghi, Ahmad-Reza; Gligor, Virgil D.; Yung, Moti (Ed.): 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pp. 929–940, ACM, 2013.
2012
DECT security analysis PhD Thesis
Darmstadt University of Technology, 2012.
2011
Interactive decryption of DECT phone calls Proceedings Article
In: Gollmann, Dieter; Westhoff, Dirk; Tsudik, Gene; Asokan, N. (Ed.): Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, pp. 71–78, ACM, 2011.
Breaking DVB-CSA Proceedings Article
In: Armknecht, Frederik; Lucks, Stefan (Ed.): Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 45–61, Springer, 2011.
2010
FPGA Implementation of an Improved Attack against the DECT Standard Cipher Proceedings Article
In: Rhee, Kyung Hyune; Nyang, DaeHun (Ed.): Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers, pp. 177–188, Springer, 2010.
Cryptanalysis of the DECT Standard Cipher Proceedings Article
In: Hong, Seokhie; Iwata, Tetsu (Ed.): Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers, pp. 1–18, Springer, 2010.
Kann man mit DECT noch vertraulich telefonieren? Journal Article
In: Datenschutz und Datensicherheit, vol. 34, no. 11, pp. 758–760, 2010.
2009
Practical attacks against WEP and WPA Proceedings Article
In: Basin, David A.; Capkun, Srdjan; Lee, Wenke (Ed.): Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 79–86, ACM, 2009.
Attacks on the DECT Authentication Mechanisms Proceedings Article
In: Fischlin, Marc (Ed.): Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 48–65, Springer, 2009.
2008
Describing Data Format Exploits Using Bitstream Segment Graphs Proceedings Article
In: The Third International Multi-Conference on Computing in the Global Information Technology, 2008. ICCGI '08. , pp. 119-124, 2008.
Side Channels in the McEliece PKC Proceedings Article
In: Buchmann, Johannes A.; Ding, Jintai (Ed.): Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 216–229, Springer, 2008.
2007
Attacks on the WEP protocol Masters Thesis
2007.
Breaking 104 Bit WEP in Less Than 60 Seconds Proceedings Article
In: Kim, Sehun; Yung, Moti; Lee, Hyung-Woo (Ed.): Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 188–202, Springer, 2007.
Security of Invertible Media Authentication Schemes Revisited Proceedings Article
In: Furon, Teddy; Cayre, François; Doërr, Gwenaël J.; Bas, Patrick (Ed.): Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 189–203, Springer, 2007.
2006
Bluetooth Interaction Support in Lectures Proceedings Article
In: Proceedings of Mobile Learning 2006, pp. 360–364, IADIS Press, 2006.
2005
Improving Feedback and Classroom Interaction Using Mobile Phones Journal Article
In: 2005.
Interaction during lectures using mobile phones Proceedings Article
In: Proceedings of the World Conference on Educational Multimedia, Hypermedia & Telecommunication (ED-MEDIA), Montr`eal, Canada, pp. 3767–3772, 2005.
0 Comments.