Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.
201929. SmartCard Workshop 2019. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2019Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection
Berger, Ivo; Rieke, Roland; Kolomeets, Maxim; Chechulin, Andrey; Kotenko, Igor
Conference Paper
2019Darknets as Tools for Cyber Warfare
Denker, Kai; Schäfer, Marcel; Steinebach, Martin
Book Article
2019A Hardware Based Solution for Freshness of Secure Onboard Communication in Vehicles
Gürgens, Sigrid; Zelle, Daniel
Conference Paper
2019The need for steganalysis in image distribution channels
Steinebach, Martin; Liu, Huajian; Ester, Andre
Journal Article
2019Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains
Sivachev, Alexey V.; Bashmakov, Daniil A.; Mikhailishenko, Olga V.; Korobeynikov, Anatoliy G.; Rieke, Roland
Conference Paper
2019Technisierung - Technische Möglichkeiten zur Verfolgung von Arzneimittelstraftaten im Internet
Steinebach, Martin; Yannikos, York; Halvani, Oren; Pflug, Annika
Book Article
201828. SmartCard Workshop 2018. Tagungsband
: Waldmann, Ulrich
Conference Proceedings
2018Anonymous charging and billing of electric vehicles
Zelle, Daniel; Springer, Markus; Zhdanova, Maria; Krauß, Christoph
Conference Paper
2018Artificial Intelligence in IT Security
Steinebach, Martin; Waidner, Michael
Book Article
2018Authorship verification in the absence of explicit features and thresholds
Halvani, Oren; Graner, Lukas; Vogel, Inna
Conference Paper
2018Begriffsbestimmungen
Selzer, Annika
Book Article
2018Blockchain - Grundlagen und Anwendungsmöglichkeiten
Lange, Benjamin
Conference Paper
2018Blockchain and smart contracts
Schütte, Julian; Fridgen, Gilbert; Prinz, Wolfgang; Rose, Thomas; Urbach, Nils; Hoeren, Thomas; Guggenberger, Nikolas; Welzel, Christian; Holly, Steffen; Schulte, Axel; Sprenger, Philipp; Schwede, Christian; Weimert, Birgit; Otto, Boris; Dalheimer, Mathias; Wenzel, Markus; Kreutzer, Michael; Fritz, Michael; Leiner, Ulrich; Nouak, Alexander
: Prinz, Wolfgang (Ed.); Schulte, Axel T. (Ed.)
Report
2018Channel steganalysis
Steinebach, Martin; Ester, Andre; Liu, Huajian
Conference Paper
2018Concise data definition language (CDDL): A notational convention to express CBOR data structures
Birkholz, Henk; Vigano, Christoph; Bormann, Carsten
Report
2018Cross-domain authorship attribution based on compression
Halvani, Oren; Graner, Lukas
Conference Paper
2018Darum könnte die Bitcoin-Technologie ein gefährliches Sicherheitsrisiko für die ganze Wirtschaft sein
Kreutzer, Michael
Journal Article
2018Datenschutz-Folgenabschätzung
Selzer, Annika
Book Article
2018Digitale Wasserzeichen in der Kriminalistik
Waschetzki, Michael; Steinebach, Martin
Journal Article
2018Domain validation++ for MitM-resilient PKI
Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael
Conference Paper
2018Double Embedding Steganalysis: Steganalysis with Low False Positive Rates
Steinebach, Martin; Ester, Andre; Liu, Huajian; Zmudzinski, Sascha
Conference Paper
2018Efficient Side-Channel Protections of ARX Ciphers
Jungk, Bernhard; Petri, Richard; Stöttinger, Marc
Journal Article, Conference Paper
2018EWV Ergebnisreport (Ergebnisse des Projekts Erkennung vor Wirtschaftskriminalität und Versicherungsbetrug)
Winter, Christian; Marschall, Kevin; Herfurth, Constantin; Riedel, Oliver; Halvani, Oren; Liu, Huajian; Yannikos, York; Friedrich, Stephanie; Finzen, Jan; Kintz, Maximilian; Schneider, Andrea; Ossege, Tobias; Steinebach, Martin
: Steinebach, Martin; Roßnagel, Alexander; Hornung, Gerrit; Riedel, Oliver; Rener, Thomas; Teichert, Jochen
Report
2018FPGA-based Niederreiter cryptosystem using binary goppa codes
Wang, W.; Szefer, J.; Niederhagen, R.
Conference Paper
2018Hybrid Image Encryption
Steinebach, Martin; Liu, Huajin; Stein, Richard; Mayer, Felix
Conference Paper
2018Implementing Joux-Vitse's crossbred algorithm for solving MQ systems over F2 on GPUs
Niederhagen, Ruben; Ning, Kai-Chun; Yang, Bo-Yin
Conference Paper
2018Implications of vulnerable internet infrastructure
Shulman, Haya
Book Article
2018Informationspflichten
Selzer, Annika
Book Article
2018Internet As a Source of Randomness
Brandt, Markus; Shulman, Haya; Waidner, Michael
Conference Paper
2018Method, computer program and system for providing a control signal for a software development environment
Eichler, Jörn; Holzinger, Philipp; Laabs, Martin; Poller, Andreas; Türpe, Sven; Weber, Heiko; Zenkoff, Albert
Patent
2018Monitoring product sales in darknet shops
Yannikos, York; Schäfer, Annika; Steinebach, Martin
Conference Paper
2018New authentication concept using certificates for big data analytic tools
Velthuis, Paul; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Off-path attacks against PKI
Dai, Tianxiang; Shulman, Haya; Waidner, Michael
Conference Paper
2018Open source value chains for addressing security issues efficiently
Weber, Arnd; Reith, Steffen; Kuhlmann, Dirk; Kasper, Michael; Seifert, Jean-Pierre; Krauß, Christoph
Conference Paper
2018Path MTU discovery considered harmful
Göhring, Matthias; Shulman, Haya; Waidner, Michael
Conference Paper
2018Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security
Gilad, Yossi; Hlavacek, Tomas; Herzberg, Amir; Schapira, Michael; Shulman, Haya
Conference Paper
2018Performance analysis of OpenFlow based software defined wired and wireless network
Jany, M.H.R.; Islam, N.; Khondoker, R.; Habib, M.A.
Conference Paper
2018Post-quantum cryptography on FPGAs. The Niederreiter cryptosystem. Extended Abstract
Wang, Wen; Szefer, Jakub; Niederhagen, Ruben
Abstract
2018Practical experience: Methodologies for measuring route origin validation
Hlavacek, Tomas; Herzberg, Amir; Shulman, Haya; Waidner, Michael
Conference Paper
2018Privacy and data protection in the domain name system: Threats and countermeasures
Kelpen, Kevin; Simo, Hervais
Book Article
2018Privacy Preserving Forensics for JPEG Images
Steinebach, Martin; Liu, Huajian; Stein, Richard; Mayer, Felix
Conference Paper
2018A reference architecture for integrating safety and security applications on railway command and control systems
Birkholz, Henk; Zhdanova, Maria; Krauß, Christoph; Arul, Tolga; Heinrich, Markus; Katzenbeisser, Stefan; Vateva-Gurova, Tsvetoslava; Suri, Neeraj; Kuzhiyelil, Don; Schlehuber, Christian
Conference Paper
2018Removing the Bottleneck for Practical 2PC
Shrishak, Kris; Shulman, Haya; Waidner, Michael
Conference Paper
2018Rethinking the evaluation methodology of authorship verification methods
Halvani, Oren; Graner, Lukas
Conference Paper
2018Roadmap to Privacy
Winter, Christian; Schäfer, Marcel
Presentation
2018Souveränität und die IT-Wertschöpfungskette
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Journal Article
2018Sovereignty in Information Technology. Security, Safety and Fair Market Access by Openness and Control of the Supply Chain
Weber, Arnd; Reith, Steffen; Kasper, Michael; Kuhlmann, Dirk; Seifert, Jean-Pierre; Krauß, Christoph
Report
2018Transfer Learning for Data Triage Applications
Mayer, Felix; Schäfer, Marcel; Steinebach, Martin
Conference Paper
2018Trust4App: Automating Trustworthiness Assessment of Mobile Applications
Habib, S.M.; Alexopoulos, N.; Islam, M.M.; Heider, J.; Marsh, S.; Mühlhäuser, M.
Conference Paper
2018Unterstützung bei Bildsichtungen durch Deep Learning
Mayer, Felix; Steinebach, Martin
Conference Paper
2018The user-centered privacy-aware control system PRICON. An interdisciplinary evaluation
Walter, Jonas; Abendroth, Bettina; Pape, Thilo von; Plappert, Christian; Zelle, Daniel; Krauß, Christoph; Gagzow, Gundula; Decke, Hendrik; Lange, Benjamin; Mauthofer, Sebastian
Conference Paper
2018Verbundprojekt. Erkennung von Wirtschaftskriminalität und Versicherungsbetrug EWV. Schlussbericht EWV
Winter, Christian
Report
2018VVV - Sicherer Zugang zu Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018VVV - Vertrauenswürdige Verteilung von Verschlüsselungsschlüsseln
Selzer, Annika; Waldmann, Ulrich
Report
2018Wie lässt sich eine Manipulation von Dokumenten und Bildern erkennen?
Steinebach, Martin; Winter, Christian
Journal Article
2018Workshops der INFORMATIK 2018. Architekturen, Prozesse, Sicherheit und Nachhaltigkeit
: Czarnecki, Christian; Brockmann, Carsten; Sultanow, Eldar; Koschmider, Agnes; Selzer, Annika
Conference Proceedings
2018XMSS and Embedded Systems. XMSS Hardware Accelerators for RISC-V
Wang, Wen; Jungk, Bernhard; Wälde, Julian; Deng, Shuwen; Gupta, Naina; Szefer, Jakob; Niederhagen, Ruben
Journal Article