Items where Year is 2010

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 82.

Conference or Workshop Item (A Paper)

Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010) RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010) Speaker Recognition in Encrypted Voice-over-IP Traffic.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymity and Trust in Distributed Systems.
In: Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymous Webs of Trust.
In: Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS).

Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010) Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
In: Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010) Computationally Sound Verification of Source Code.
In: ACM CCS 2010.
Conference: CCS ACM Conference on Computer and Communications Security

Bohli, Jens-Matthias and Sorge, Christoph and Ugus, Osman
(2010) A Privacy Model for Smart Metering.
In: Proceedings of the First IEEE International Workshop on Smart Grid Communications (in conjunction with IEEE ICC 2010).

Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique
(2010) Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings.

Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel
(2010) TruWalletM: Secure Web Authentication on Mobile Platforms.
In: 2nd Conference on Trusted Systems (INTRUST'10).

Bugiel, Sven and Ekberg, Jan-Erik
(2010) Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
In: 5th Annual Workshop on Scalable Trusted Computing (STC'10).

Davies, Nigel and Krüger, Antonio and Langheinrich, Marc and Schmidt, Albrecht and Strohbach, Martin
(2010) 10011 Report - Pervasive Public Displays.
In: Pervasive Public Displays, 03.01. - 08.01.2010.

DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010) Experiences in the logical specification of the HIPAA and GLBA privacy laws.
In: Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010.

Dreyer, Derek and Neis, Georg and Rossberg, Andreas and Birkedal, Lars
(2010) A relational modal logic for higher-order stateful ADTs.
In: Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2010, Madrid, Spain, January 17-23, 2010.
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010) Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
In: WISA.

Garg, Deepak and Pfenning, Frank
(2010) A Proof-Carrying File System.
In: 31st IEEE Symposium on Security and Privacy, S&P 2010, 16-19 May 2010, Berleley/Oakland, California, USA.

Garg, Deepak and Pfenning, Frank
(2010) Stateful Authorization Logic: - Proof Theory and a Case Study.
In: Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers.

Gehring, Sven and Löchtefeld, Markus and Schöning, Johannes and Gorecky, Dominic and Stephan, Peter and Krüger, Antonio and Rohs, Michael
(2010) Mobile product customization.
In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010.

Gomez-Rodriguez, Manuel and Peters, Jan and Hill, Jeremy N. and Schölkopf, Bernhard
(2010) Closing the sensorimotor loop: Haptic feedback facilitates decoding of arm movement imagery.
In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Istanbul, Turkey, 10-13 October 2010.

Guha, Saikat and Cheng, Bin and Francis, Paul
(2010) Challenges in measuring online advertising systems.
In: Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC 2010, Melbourne, Australia - November 1-3, 2010.

Haeberlen, Andreas and Aditya, Paarijaat and Rodrigues, Rodrigo and Druschel, Peter
(2010) Accountable Virtual Machines.
In: 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, October 4-6, 2010, Vancouver, BC, Canada, Proceedings.
Conference: USENIX-Security Usenix Security Symposium

Hammer, Christian
(2010) Experiences with PDG-based IFC.
In: International Symposium on Engineering Secure Software and Systems (ESSoS'10).

Hein, Matthias and Bühler, Thomas
(2010) An Inverse Power Method for Nonlinear Eigenproblems with Applications in 1-Spectral Clustering and Sparse PCA.
In: Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, Vancouver, British Columbia, Canada..

Hoffmann, Jörg and Fatès, Nazim and Palacios, Héctor
(2010) Brothers in Arms? On AI Planning and Cellular Automata.
In: ECAI 2010 - 19th European Conference on Artificial Intelligence, Lisbon, Portugal, August 16-20, 2010, Proceedings.

Hoffmann, Jörg and Weber, Ingo and Kraft, Frank Michael
(2010) SAP Speaks PDDL.
In: Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, AAAI 2010, Atlanta, Georgia, USA, July 11-15, 2010.

Kate, Aniket and Goldberg, Ian
(2010) Distributed Private-Key Generators for Identity-Based Cryptography.
In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings.

Kate, Aniket and Goldberg, Ian
(2010) Using Sphinx to Improve Onion Routing Circuit Construction.
In: Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers.

Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010) Constant-Size Commitments to Polynomials and Their Applications.
In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings.
Conference: ASIACRYPT International Conference on the Theory and Application of Cryptology and Information Security

Koller, Alexander and Hoffmann, Jörg
(2010) Waking Up a Sleeping Rabbit: On Natural-Language Sentence Generation with FF.
In: Proceedings of the 20th International Conference on Automated Planning and Scheduling, ICAPS 2010, Toronto, Ontario, Canada, May 12-16, 2010.

Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole
(2010) UWB Impulse Radio Based Distance Bounding.
In: Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC).

Löchtefeld, Markus and Gehring, Sven and Schöning, Johannes and Krüger, Antonio
(2010) PINwI: pedestrian indoor navigation without infrastructure.
In: Proceedings of the 6th Nordic Conference on Human-Computer Interaction 2010, Reykjavik, Iceland, October 16-20, 2010.

Mampaey, Michael and Vreeken, Jilles
(2010) Summarising Data by Clustering Items.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Data (ECMLPKDD).

Mislove, Alan and Viswanath, Bimal and Gummadi, Krishna P. and Druschel, Peter
(2010) You are who you know: inferring user profiles in online social networks.
In: Proceedings of the Third International Conference on Web Search and Web Data Mining, WSDM 2010, New York, NY, USA, February 4-6, 2010.
Conference: WSDM ACM International Conference on Web Search and Data Mining

Nakhost, Hootan and Hoffmann, Jörg and Müller, Martin
(2010) Improving Local Search for Resource-Constrained Planning.
In: Proceedings of the Third Annual Symposium on Combinatorial Search, SOCS 2010, Stone Mountain, Atlanta, Georgia, USA, July 8-10, 2010.

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).

Petrlic, Ronald
(2010) A privacy-preserving Concept for Smart Grids.
In: Sicherheit in vernetzten Systemen: 18. DFN Workshop.

Pfeiffer, Max and Kern, Dagmar and Schöning, Johannes and Döring, Tanja and Krüger, Antonio and Schmidt, Albrecht
(2010) A multi-touch enabled steering wheel: exploring the design space.
In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010.

Rückert, Markus and Schneider, Michael and Schröder, Dominique
(2010) Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
In: Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings.

Unruh, Dominique
(2010) Universally Composable Quantum Multi-Party Computation.
In: EUROCRYPT 2010.
Conference: EuroCrypt International Conference on the Theory and Application of Cryptographic Techniques

Unruh, Dominique and Müller-Quade, Jörn
(2010) Universally Composable Incoercibility.
In: Crypto 2010.

Valkov, Dimitar and Steinicke, Frank and Bruder, Gerd and Hinrichs, Klaus H. and Schöning, Johannes and Daiber, Florian and Krüger, Antonio
(2010) Touching Floating Objects in Projection-based Virtual Reality Environments.
In: Proceedings of the Joint Virtual Reality Conference of EGVE - EuroVR - VEC, Stuttgart, Germany, 2010..

Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010) A Type System for Data-Centric Synchronization.
In: ECOOP '10: Proceedings of the 24th European Conference on Object-Oriented Programming.

and Dejan E. Lazich and J\"rn M\"ller-Quade, Nico D\"ttling and de Almeida, Antonio Sobreira
(2010) Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
In: WISA.

von Luxburg, Ulrike and Radl, Agnes and Hein, Matthias
(2010) Getting lost in space: Large sample analysis of the resistance distance.
In: Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, Vancouver, British Columbia, Canada..

von Zadow, Ulrich and Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2010) GlobalData: multi-user interaction with geographic information systems on interactive surfaces.
In: ACM International Conference on Interactive Tabletops and Surfaces, ITS 2010, Saarbrücken, Germany, November 7-10, 2010.

Article

Backes, Michael and Unruh, Dominique
(2010) Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6). pp. 1077-1155.

Dittrich, Jens
(2010) Paper bricks: an alternative to complete-story peer reviewing.
SIGMOD Record, 39 (4). pp. 31-36.

Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010) Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265. 49–71.

Krüger, Antonio and Spassova, Lübomira and Jung, Ralf
(2010) Innovative Retail Laboratory - Investigating Future Shopping Technologies (Innovative Retail Laboratory - Erforschung von Technologien für das Einkaufen von morgen).
it - Information Technology, 52 (2). 114–119.

Lee, Wonwoo and Krüger, Antonio and Thomas, Bruce H. and Wagner, Daniel and Pulli, Kari and Woo, Woontack
(2010) International Symposium on Ubiquitous Virtual Reality 2009.
IEEE Pervasive Computing, 9 (2). 78–80.

Müller-Quade, Jörn and Unruh, Dominique
(2010) Long-term Security and Universal Composability.
Journal of Cryptology, 23 (4). pp. 594-671.

Rodrigues, Rodrigo and Druschel, Peter
(2010) Peer-to-peer systems.
Commun. ACM, 53 (10). 72–82.

Schöning, Johannes and Löchtefeld, Markus and Rohs, Michael and Krüger, Antonio
(2010) Projector Phones: A New Class of Interfaces for Augmented Reality.
IJMHCI, 2 (3). 1–14.

Sorge, Christoph and Niccolini, Saverio and Seedorf, Jan
(2010) The Legal Ramifications of Call-Filtering Solutions.
IEEE Security & Privacy, 8 (2). pp. 45-50.

Steinke, Florian and Hein, Matthias and Schölkopf, Bernhard
(2010) Nonparametric Regression between General Riemannian Manifolds.
SIAM J. Imaging Sciences, 3 (3). 527–563.

Vreeken, Jilles
(2010) Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1). pp. 75-76.

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2). pp. 56-58.

Weber, Ingo and Hoffmann, Jörg and Mendling, Jan
(2010) Beyond soundness: on the verification of semantic business process models.
Distributed and Parallel Databases, 27 (3). 271–343.

Zhang, Bo and Ng, Tze Sing Eugene and Nandi, Animesh and Riedi, Rudolf H. and Druschel, Peter and Wang, Guohui
(2010) Measurement-based analysis, modeling, and synthesis of the internet delay space.
IEEE/ACM Trans. Netw., 18 (1). 229–242.

Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010) What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5). pp. 618-643.

\vCapkun Srdjan and, Mario and Karame, Ghassan and Tippenhauer, Nils Ole
(2010) Integrity Regions: Authentication Through Presence in Wireless Networks.
IEEE Transactions on Mobile Computing.

Thesis

Doychev, Goran
(2010) Speaker Recognition in Encrypted Voice Streams.
Bachelors thesis, Saarland University.

Driedger, Jonathan
(2010) Formalization of Game-Transformations.
Bachelors thesis, Saarland University.

Dürmuth, Markus
(2010) Novel Classes of Side Channels and Covert Channels.
Doctoral thesis, UNSPECIFIED.

Eigner, Fabienne
(2010) Type-Based Verification of Electronic Voting Systems.
Masters thesis, Saarland University.

Feld, Dominik
(2010) Anonymity in Online Polls.
Bachelors thesis, Saarland University.

Grochulla, Martin
(2010) Moment Preserving Diffusion in Image Processing.
Masters thesis, Saarland University.

Lund, Rajiv
(2010) Formale Analyse von Mastermind.
Bachelors thesis, UNSPECIFIED.

Petrlic, Ronald
(2010) Integrity Protection for Automated Teller Machines.
Masters thesis, UNSPECIFIED.

Rickert, Nicolas
(2010) Digital Watermarking: Methods and Applications for Digital Images.
Bachelors thesis, Saarland University.

Schröder, Dominique
(2010) On the complexity of blind signatures.
Doctoral thesis, Darmstadt University of Technology.

Skoruppa, Malte
(2010) Formal Verification of ElGamal Encryption using a Probabilistic Lambda-Calculus.
Bachelors thesis, Saarland University.

Tarrach, Thorsten
(2010) Automatically Verifying 'M' Modelling Language Constraints.
Masters thesis, Saarland University.

Book

UNSPECIFIED, ed.
(2010) Pervasive Computing, 8th International Conference, Pervasive 2010, Helsinki, Finland, May 17-20, 2010. Proceedings.
Lecture Notes in Computer Science, 6030 . Springer.

UNSPECIFIED, ed.
(2010) Pervasive Public Displays, 03.01. - 08.01.2010.
Dagstuhl Seminar Proceedings, 10011 . Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany.

UNSPECIFIED, ed.
(2010) Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, ON, Canada, 10 June, 2010.
ACM.

UNSPECIFIED, ed.
(2010) Proceedings of the 20th International Conference on Automated Planning and Scheduling, ICAPS 2010, Toronto, Ontario, Canada, May 12-16, 2010.
AAAI.

UNSPECIFIED, ed.
(2010) Smart Graphics, 10th International Symposium on Smart Graphics, Banff, Canada, June 24-26, 2010, Proceedings.
Lecture Notes in Computer Science, 6133 . Springer.

Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010) UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.

Other

Petrlic, Ronald and Krummel, Volker
(2010) Method for testing system integrity of self-service machine e.g. automated teller machine, involves analyzing digital data by comparing digital data with identity data of self-service machine to make statement about system integrity.
UNSPECIFIED
.

Sorge, Christoph and Seedorf, Jan
(2010) Method for Supporting Attack Detection in a Distributed System.
UNSPECIFIED
.

Unruh, Dominique
(2010) The impossibility of computationally sound XOR.
UNSPECIFIED
.

This list was generated on Sun Dec 22 03:48:49 2024 CET.