Hier eine Liste aller Publikationen von NERD Promovierenden/PostDocs aus 2019 sortiert nach dem:r Erst-Author:in.

  • M. Degeling, “Was bedeutet Process Mining für Datenschutz und Mitbestimmung im Unternehmen?,” Informatik Spektrum, Aug. 2019, doi: 10.1007/s00287-019-01197-8.
  • M. Degeling, C. Utz, C. Lentzsch, H. Hosseini, F. Schaub, and T. Holz, “We Value Your Privacy … Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy,” in Proc. NDSS 2019, 2019, doi: 10.14722/ndss.2019.23378.
  • B. Dowling, P. Rösler, and J. Schwenk, “Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework,” IACR Cryptology ePrint Archive, 2019.
  • T. Herrmann, C. Lentzsch, and M. Degeling, “Intervention and EUD,” in End-User Development, 2019, pp. 67–82.
  • S. Judel, R. Röpke, N. Zaric, and U. Schroeder, “ILSA – ein integriertes Lernstil-Analysesystem für Moodle,” presented at the v, 2019, doi: 10.18420/delfi2019_301.
  • K. Köhler, R. Röpke, and M. R. Wolf, “Through a Mirror Darkly – On the Obscurity of Teaching Goals in Game-Based Learning in IT Security,” in Simulation & Gaming x, Warsaw, 2019, p. 15.
  • T. Leonhardt, M. Ehlenz, R. Röpke, N. Bergner, and U. Schroeder, “MTLG – Helping students and teachers creating and analysing simulations and games from a didactical and technical perspective,” presented at the DELFI 2019, 2019, doi: 10.18420/delfi2019_331.
  • L. Luo, E. Bodden, and J. Späth, “A Qualitative Analysis of Android Taint-Analysis Results,” in 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), Nov. 2019, pp. 102–114, doi: 10.1109/ASE.2019.00020.
  • L. Luo, J. Dolby, and E. Bodden, “MagpieBridge: A General Approach to Integrating Static Analyses into IDEs and Editors (Tool Insights Paper),” in 33rd European Conference on Object-Oriented Programming (ECOOP 2019), Dagstuhl, Germany, 2019, vol. 134, pp. 21:1–21:25, doi: 10.4230/LIPIcs.ECOOP.2019.21.
  • L. Luo, C. Scheideler, and T. Strothmann, “MULTISKIPGRAPH: A Self-Stabilizing Overlay Network that Maintains Monotonic Searchability,” in 2019 IEEE International Parallel and Distributed Processing Symposium (IPDPS), May 2019, pp. 845–854, doi: 10.1109/IPDPS.2019.00093.
  • P. Markert, F. Farke, and M. Dürmuth, “View The Email to Get Hacked: Attacking SMS-Based Two-Factor Authentication,” in Proc. Who Are You?! Adventures in Authentication (WAY 2019) at NDSS 2019, Santa Clara, CA, Nov. 2019, p. 6.
  • P. Markert, M. Golla, E. Stobert, and M. Dürmuth, “Work in Progress: A Comparative Long-Term Study of Fallback Authentication,” in Proceedings 2019 Workshop on Usable Security, San Diego, CA, 2019, doi: 10.14722/usec.2019.23030.
  • J. Müller et al., “‘Johnny, you are fired!’ – Spoofing OpenPGP and S/MIME Signatures in Emails,” presented at the 28th USENIX Security Symposium (USENIX Security 19), 2019, pp. 1011–1028.
  • J. Müller, M. Brinkmann, D. Poddebniak, S. Schinzel, and J. Schwenk, “Re: What’s Up Johnny?: Covert Content Attacks on Email End-to-End Encryption,” in Applied Cryptography and Network Security, vol. 11464, R. H. Deng, V. Gauthier-Umaña, M. Ochoa, and M.Yung, Eds. Cham: Springer International Publishing, 2019, pp. 24–42.
  • J. Müller, F. Ising, V. Mladenov, C. Mainka, S. Schinzel, and J. Schwenk, “Practical Decryption exFiltration: Breaking PDF Encryption,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London United Kingdom, Nov. 2019, pp. 15–29, doi: 10.1145/3319535.3354214.
  • R. Röpke and U. Schroeder, “The Problem with Teaching Defence against the Dark Arts: A Review of Game-based Learning Applications and Serious Games for Cyber Security Education:,” in Proceedings of the 11th International Conference on Computer Supported Education, Heraklion, Crete, Greece, 2019, pp. 58–66, doi: 10.5220/0007706100580066.
  • R. Röpke, “Spielerisch sichere Teilhabe: Ein Review spiel-basierter Lernanwendungen über IT-Sicherheit und Sicherheitspraktiken,” MedienPädagogik, vol. 36, no. Teilhabe, pp. 170–185, Nov. 2019, doi: 10.21240/mpaed/36/2019.11.21.X.
  • R. Röpke, M. Ehlenz, T. Leonhardt, and U. Schroeder, “Dungeons & DFAs,” in Proceedings of DELFI 2019, 2019, doi: 10.18420/delfi2019_320.
  • R. Röpke, K. Larisch, S. Schöbel, and U. Schroeder, “Mit der Lupe unterwegs – eine spiel-basierte Lernanwendung zu Sicherheit im Internet,” in Proceedings of DELFI 2019, 2019, doi: 10.18420/delfi2019_217.
  • J. Rüth, K. Wolsing, M. Serror, K. Wehrle, and O. Hohlfeld, “Blitz-starting QUIC Connections,” May 2019.
  • D. Szameitat, S. Hoffmann, and G. Bumiller, “Security of ITU-T G.9903 and G.9904 – a New Approach for a Systematic Analysis,” in 2019 IEEE International Symposium on Power Line Communications and its Applications (ISPLC), Apr. 2019, pp. 1–6, doi: 10.1109/ISPLC.2019.8693260.
  • T. Urban, D. Tatang, M. Degeling, Thorsten Holz, and Norbert Pohlmann, “A Study on Subject Data Access in Online Advertising after the GDPR,” in Proc. DPM@ESORICS, Luxembourg, 2019.
  • D. Tsovaltzi et al., “Group Formation in the Digital Age: Relevant Characteristics, Their Diagnosis, and Combination for Productive Collaboration,” p. 8, 2019.
  • T. Urban, M. Degeling, T. Holz, and N. Pohlmann, “‘Your Hashed IP Address: Ubuntu.’ – Perspectives on Transparency Tools for Online Advertising,” in Proc. ACSAC, San Juan, Dec. 2019, p. 14, doi: 10.1145/3359789.3359798.
  • C. Utz, M. Degeling, S. Fahl, F. Schaub, and T. Holz, “(Un)informed Consent: Studying GDPR Consent Notices in the Field,” in Proc. CCS, New York, NY, USA, 2019, pp. 973–990, doi: 10.1145/3319535.3354212.
  • S. Wiefling, N. Gruschka, and L. Lo Iacono, “Even Turing Should Sometimes Not Be Able to Tell: Mimicking Humanoid Usage Behavior for Exploratory Studies of Online Services,” in Proc. NordSec, 2019, doi: 10.1007/978-3-030-35055-0_12.
  • S. Wiefling, L. Lo Iacono, and M. Dürmuth, “Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild,” in 4th IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC 2019), Cham, 2019, pp. 134–148, doi: 10.1007/978-3-030-22312-0_10.

Leave a Reply

Your email address will not be published.