Number of items: 82.
Conference or Workshop Item (A Paper)
Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010)
RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010)
Speaker Recognition in Encrypted Voice-over-IP Traffic.
Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010)
Acoustic Side-Channel Attacks of Printers.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymity and Trust in Distributed Systems.
Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010)
Anonymous Webs of Trust.
Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010)
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010)
Computationally Sound Verification of Source Code.
Bohli, Jens-Matthias and Sorge, Christoph and Ugus, Osman
(2010)
A Privacy Model for Smart Metering.
Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique
(2010)
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Bugiel, Sven and Dmitrienko, Alexandra and Kostiainen, Kari and Sadeghi, Ahmad-Reza and Winandy, Marcel
(2010)
TruWalletM: Secure Web Authentication on Mobile Platforms.
Bugiel, Sven and Ekberg, Jan-Erik
(2010)
Implementing an Application-Specific Credential Platform Using Late-Launched Mobile Trusted Module.
Davies, Nigel and Krüger, Antonio and Langheinrich, Marc and Schmidt, Albrecht and Strohbach, Martin
(2010)
10011 Report - Pervasive Public Displays.
DeYoung, Henry and Garg, Deepak and Jia, Limin and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Dreyer, Derek and Neis, Georg and Rossberg, Andreas and Birkedal, Lars
(2010)
A relational modal logic for higher-order stateful ADTs.
Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Garg, Deepak and Pfenning, Frank
(2010)
A Proof-Carrying File System.
Garg, Deepak and Pfenning, Frank
(2010)
Stateful Authorization Logic: - Proof Theory and a Case Study.
Gehring, Sven and Löchtefeld, Markus and Schöning, Johannes and Gorecky, Dominic and Stephan, Peter and Krüger, Antonio and Rohs, Michael
(2010)
Mobile product customization.
Gomez-Rodriguez, Manuel and Peters, Jan and Hill, Jeremy N. and Schölkopf, Bernhard
(2010)
Closing the sensorimotor loop: Haptic feedback facilitates decoding of arm movement imagery.
Guha, Saikat and Cheng, Bin and Francis, Paul
(2010)
Challenges in measuring online advertising systems.
Haeberlen, Andreas and Aditya, Paarijaat and Rodrigues, Rodrigo and Druschel, Peter
(2010)
Accountable Virtual Machines.
Hammer, Christian
(2010)
Experiences with PDG-based IFC.
Hein, Matthias and Bühler, Thomas
(2010)
An Inverse Power Method for Nonlinear Eigenproblems with Applications in 1-Spectral Clustering and Sparse PCA.
Hoffmann, Jörg and Fatès, Nazim and Palacios, Héctor
(2010)
Brothers in Arms? On AI Planning and Cellular Automata.
Hoffmann, Jörg and Weber, Ingo and Kraft, Frank Michael
(2010)
SAP Speaks PDDL.
Kate, Aniket and Goldberg, Ian
(2010)
Distributed Private-Key Generators for Identity-Based Cryptography.
Kate, Aniket and Goldberg, Ian
(2010)
Using Sphinx to Improve Onion Routing Circuit Construction.
Kate, Aniket and Zaverucha, Gregory M. and Goldberg, Ian
(2010)
Constant-Size Commitments to Polynomials and Their Applications.
Koller, Alexander and Hoffmann, Jörg
(2010)
Waking Up a Sleeping Rabbit: On Natural-Language Sentence Generation with FF.
Kuhn, Marc and Luecken, Heinrich and Tippenhauer, Nils Ole
(2010)
UWB Impulse Radio Based Distance Bounding.
Löchtefeld, Markus and Gehring, Sven and Schöning, Johannes and Krüger, Antonio
(2010)
PINwI: pedestrian indoor navigation without infrastructure.
Mampaey, Michael and Vreeken, Jilles
(2010)
Summarising Data by Clustering Items.
Mislove, Alan and Viswanath, Bimal and Gummadi, Krishna P. and Druschel, Peter
(2010)
You are who you know: inferring user profiles in online social networks.
Nakhost, Hootan and Hoffmann, Jörg and Müller, Martin
(2010)
Improving Local Search for Resource-Constrained Planning.
Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010)
Ray - A Secure Microkernel Architecture.
Petrlic, Ronald
(2010)
A privacy-preserving Concept for Smart Grids.
Pfeiffer, Max and Kern, Dagmar and Schöning, Johannes and Döring, Tanja and Krüger, Antonio and Schmidt, Albrecht
(2010)
A multi-touch enabled steering wheel: exploring the design space.
Rückert, Markus and Schneider, Michael and Schröder, Dominique
(2010)
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Unruh, Dominique
(2010)
Universally Composable Quantum Multi-Party Computation.
Unruh, Dominique and Müller-Quade, Jörn
(2010)
Universally Composable Incoercibility.
Valkov, Dimitar and Steinicke, Frank and Bruder, Gerd and Hinrichs, Klaus H. and Schöning, Johannes and Daiber, Florian and Krüger, Antonio
(2010)
Touching Floating Objects in Projection-based Virtual Reality Environments.
Vaziri, Mandana and Tip, Frank and Dolby, Julian and Hammer, Christian and Vitek, Jan
(2010)
A Type System for Data-Centric Synchronization.
and Dejan E. Lazich and J\"rn M\"ller-Quade, Nico D\"ttling and de Almeida, Antonio Sobreira
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
von Luxburg, Ulrike and Radl, Agnes and Hein, Matthias
(2010)
Getting lost in space: Large sample analysis of the resistance distance.
von Zadow, Ulrich and Daiber, Florian and Schöning, Johannes and Krüger, Antonio
(2010)
GlobalData: multi-user interaction with geographic information systems on interactive surfaces.
Article
Backes, Michael and Unruh, Dominique
(2010)
Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6).
pp. 1077-1155.
Dittrich, Jens
(2010)
Paper bricks: an alternative to complete-story peer reviewing.
SIGMOD Record, 39 (4).
pp. 31-36.
Garg, Deepak and Franklin, Jason and Kaynar, Dilsun Kirli and Datta, Anupam
(2010)
Compositional System Security with Interface-Confined Adversaries.
Electr. Notes Theor. Comput. Sci., 265.
49–71.
Krüger, Antonio and Spassova, Lübomira and Jung, Ralf
(2010)
Innovative Retail Laboratory - Investigating Future Shopping Technologies (Innovative Retail Laboratory - Erforschung von Technologien für das Einkaufen von morgen).
it - Information Technology, 52 (2).
114–119.
Lee, Wonwoo and Krüger, Antonio and Thomas, Bruce H. and Wagner, Daniel and Pulli, Kari and Woo, Woontack
(2010)
International Symposium on Ubiquitous Virtual Reality 2009.
IEEE Pervasive Computing, 9 (2).
78–80.
Müller-Quade, Jörn and Unruh, Dominique
(2010)
Long-term Security and Universal Composability.
Journal of Cryptology, 23 (4).
pp. 594-671.
Rodrigues, Rodrigo and Druschel, Peter
(2010)
Peer-to-peer systems.
Commun. ACM, 53 (10).
72–82.
Schöning, Johannes and Löchtefeld, Markus and Rohs, Michael and Krüger, Antonio
(2010)
Projector Phones: A New Class of Interfaces for Augmented Reality.
IJMHCI, 2 (3).
1–14.
Sorge, Christoph and Niccolini, Saverio and Seedorf, Jan
(2010)
The Legal Ramifications of Call-Filtering Solutions.
IEEE Security & Privacy, 8 (2).
pp. 45-50.
Steinke, Florian and Hein, Matthias and Schölkopf, Bernhard
(2010)
Nonparametric Regression between General Riemannian Manifolds.
SIAM J. Imaging Sciences, 3 (3).
527–563.
Vreeken, Jilles
(2010)
Making Pattern Mining Useful.
SIGKDD Explorations, 12 (1).
pp. 75-76.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
Useful Patterns (UP’10) ACM SIGKDD Workshop Report.
SIGKDD Explorations, 12 (2).
pp. 56-58.
Weber, Ingo and Hoffmann, Jörg and Mendling, Jan
(2010)
Beyond soundness: on the verification of semantic business process models.
Distributed and Parallel Databases, 27 (3).
271–343.
Zhang, Bo and Ng, Tze Sing Eugene and Nandi, Animesh and Riedi, Rudolf H. and Druschel, Peter and Wang, Guohui
(2010)
Measurement-based analysis, modeling, and synthesis of the internet delay space.
IEEE/ACM Trans. Netw., 18 (1).
229–242.
Zimmermann, Thomas and Premraj, Rahul and Bettenburg, Nicolas and Just, Sascha and Schröter, Adrian and Weiss, Cathrin
(2010)
What Makes a Good Bug Report?
IEEE Transactions on Software Engineering, 36 (5).
pp. 618-643.
\vCapkun Srdjan and, Mario and Karame, Ghassan and Tippenhauer, Nils Ole
(2010)
Integrity Regions: Authentication Through Presence in Wireless Networks.
IEEE Transactions on Mobile Computing.
Thesis
Doychev, Goran
(2010)
Speaker Recognition in Encrypted Voice Streams.
Bachelors thesis, Saarland University.
Driedger, Jonathan
(2010)
Formalization of Game-Transformations.
Bachelors thesis, Saarland University.
Dürmuth, Markus
(2010)
Novel Classes of Side Channels and Covert Channels.
Doctoral thesis, UNSPECIFIED.
Eigner, Fabienne
(2010)
Type-Based Verification of Electronic Voting Systems.
Masters thesis, Saarland University.
Feld, Dominik
(2010)
Anonymity in Online Polls.
Bachelors thesis, Saarland University.
Grochulla, Martin
(2010)
Moment Preserving Diffusion in Image Processing.
Masters thesis, Saarland University.
Lund, Rajiv
(2010)
Formale Analyse von Mastermind.
Bachelors thesis, UNSPECIFIED.
Petrlic, Ronald
(2010)
Integrity Protection for Automated Teller Machines.
Masters thesis, UNSPECIFIED.
Rickert, Nicolas
(2010)
Digital Watermarking: Methods and Applications for Digital Images.
Bachelors thesis, Saarland University.
Schröder, Dominique
(2010)
On the complexity of blind signatures.
Doctoral thesis, Darmstadt University of Technology.
Skoruppa, Malte
(2010)
Formal Verification of ElGamal Encryption using a Probabilistic Lambda-Calculus.
Bachelors thesis, Saarland University.
Tarrach, Thorsten
(2010)
Automatically Verifying 'M' Modelling Language Constraints.
Masters thesis, Saarland University.
Book
UNSPECIFIED, ed.
(2010)
Pervasive Computing, 8th International Conference, Pervasive 2010, Helsinki, Finland, May 17-20, 2010. Proceedings.
Lecture Notes in Computer Science, 6030
.
Springer.
UNSPECIFIED, ed.
(2010)
Pervasive Public Displays, 03.01. - 08.01.2010.
Dagstuhl Seminar Proceedings, 10011
.
Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany.
UNSPECIFIED, ed.
(2010)
Proceedings of the 2010 Workshop on Programming Languages and Analysis for Security, PLAS 2010, Toronto, ON, Canada, 10 June, 2010.
ACM.
UNSPECIFIED, ed.
(2010)
Proceedings of the 20th International Conference on Automated Planning and Scheduling, ICAPS 2010, Toronto, Ontario, Canada, May 12-16, 2010.
AAAI.
UNSPECIFIED, ed.
(2010)
Smart Graphics, 10th International Symposium on Smart Graphics, Banff, Canada, June 24-26, 2010, Proceedings.
Lecture Notes in Computer Science, 6133
.
Springer.
Vreeken, Jilles and Tatti, Nikolaj and Goethals, Bart
(2010)
UP '10: Proceedings of the ACM SIGKDD Workshop on Useful Patterns.
ACM Press, New York, NY, USA.
Other
Petrlic, Ronald and Krummel, Volker
(2010)
Method for testing system integrity of self-service machine e.g. automated teller machine, involves analyzing digital data by comparing digital data with identity data of self-service machine to make statement about system integrity.
Sorge, Christoph and Seedorf, Jan
(2010)
Method for Supporting Attack Detection in a Distributed System.
Unruh, Dominique
(2010)
The impossibility of computationally sound XOR.
This list was generated on Sun Dec 22 03:48:49 2024 CET.