2013
2012
2011
Benenson, Zinaida ; Dewald, Andreas ; Eßer, Hans-Georg ; Freiling, Felix ; Müller, Thilo ; Moch, Christian ; Vömel, Stefan ; Schinzel, Sebastian ; Spreitzenbarth, Michael ; Stock, Ben ; Stüttgen, Johannes
Exploring the Landscape of Cybercrime.
69-72
In: Proceedings of the First SysSec Workshop
(2011)
Washington, DC
SysSec 2011
(Amsterdam)
[Conference or workshop publication]
|
|
Müller, Thilo ; Freiling, Felix ; Dewald, Andreas
TRESOR Runs Encryption Securely Outside RAM.
17-32
In: Proceedings of the 20th USENIX conference on Security (SEC '11)
(2011)
Berkeley, Calif.
(San Francisco, Calif.)
[Conference or workshop publication]
|
|
2010
Müller, Tilo ; Freiling, Felix ; Dewald, Andreas
AESSE: A Cold-boot Resistant Implementation of AES.
42-47
In: Proceedings of the Third European Workshop on System Security, EUROSEC '10
(2010)
New York, NY [u.a.]
(Paris)
[Conference or workshop publication]
|
|
Holz, Thorsten ; Spreitzenbarth, Michael
Towards secure deletion on smartphones.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
165-176
In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Berlin
(2010)
Bonn
[Conference or workshop publication]
|
|
Göbel, Jan Gerrit ; Trinius, Philipp
Towards Optimal Sensor Placement Strategies for Early Warning Systems.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
191-204
In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5. - 7. Oktober 2010 in Berlin
(2010)
Bonn
[Conference or workshop publication]
|
|
Göbel, Jan Gerrit
Amun: Automatic Capturing of Malicious Software.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
177-190
In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Berlin
(2010)
Bonn
[Conference or workshop publication]
|
|
Trinius, Philipp ; Willems, Carsten ; Holz, Thorsten ; Rieck, Konrad
A Malware Instruction Set for Behavior-Based Analysis.
Freiling, Felix
GI-Edition : Lecture Notes in Informatics. Proceedings
170
205-216
In: Sicherheit 2010 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 5. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Berlin
(2010)
Bonn
[Conference or workshop publication]
|
|
Catrina, Octavian ; Hoogh, Sebastiaan de
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic.
Gritzalis, Dimitris
Lecture Notes in Computer Science
6345
134-150
In: Computer Security - ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20 - 22, 2010; proceedings
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Catrina, Octavian ; Hoogh, Sebastiaan de
Improved Primitives for Secure Multiparty Integer Computation.
Garay, Juan A.
Lecture Notes in Computer Science
6280
182-199
In: Security and cryptography for networks : 7th international conference, SCN 2010, Amalfi, Italy; proceedings
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Catrina, Octavian ; Saxena, Amitabh
Secure Computation with Fixed-point Numbers.
Sion, Radu
Lecture Notes in Computer Science
6052
35-50
In: Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain; revised selected papers
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2009
Freiling, Felix ; Lambertz, Christian ; Majster-Cederbaum, Mila
Modular Consensus Algorithms for the Crash-Recovery Model.
287-292
In: 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies : PDCAT 2009 ; Higashi-Hiroshima, Japan, 8 - 11 December 2009 ; [including workshop papers]
(2009)
Washington, DC
[Conference or workshop publication]
|
|
Stock, Ben ; Göbel, Jan Gerrit ; Engelberth, Markus ; Freiling, Felix ; Holz, Thorsten
Walowdac - Analysis of a Peer-to-Peer Botnet.
13-20
In: 2009 European Conference on Computer Network Defence (EC2ND)
(2009)
New York, NY
(Milano, Italy)
[Conference or workshop publication]
|
|
Trinius, Philipp ; Holz, Thorsten ; Göbel, Jan Gerrit ; Freiling, Felix
Visual Analysis of Malware Behavior (Short paper).
In: 6th International Workshop on Visualization for Cyber Security
(2009)
Piscataway, NJ
(Atlantic City, NJ)
[Conference or workshop publication]
|
|
Böhme, Rainer ; Freiling, Felix ; Gloe, Thomas ; Kirchner, Matthias
Multimedia Forensics is not Computer Forensics.
Geradts, Zeno
Lecture Notes in Computer Science
5718
90-103
In: Computational Forensics : Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13 - 14, 2009; proceedings
(2009)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Göbel, Jan Gerrit ; Holz, Thorsten ; Trinius, Philipp
Towards Proactive Spam Filtering (Extended Abstract).
Flegel, Ulrich
Lecture Notes in Computer Science
5587
36-47
In: Detection of intrusions and malware, and vulnerability assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9 - 10, 2009; proceedings
(2009)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Badura, Thomas ; Becher, Michael
Testing the Symbian OS Platform Security Architecture.
Awan, Irfan
838-844
In: International Conference on Advanced Information Networking and Applications, 2009 : AINA '09 ; Bradford, United Kingdom, 26 - 29 May 2009
(2009)
Piscataway, NJ
[Conference or workshop publication]
|
|
Krontiris, Ioannis ; Benenson, Zinaida ; Giannetsos, Thanassis ; Freiling, Felix ; Dimitriou, Tassos
Cooperative Intrusion Detection in Wireless Sensor Networks.
Rödig, Utz
Lecture Notes in Computer Science
5432
263-278
In: Wireless sensor networks : 6th European Conference, EWSN 2009, Cork, Ireland, February 11 - 13, 2009; proceedings
(2009)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Moch, Christian ; Freiling, Felix
The Forensic Image Generator Generator (Forensig2).
Goebel, Oliver
78-93
In: Fifth International Conference on IT Security Incident Management and IT Forensics, 2009 : IMF '09 ; Stuttgart, Germany, 15 - 17 Sept. 2009
(2009)
Piscataway, NJ
[Conference or workshop publication]
|
|
2008
Hund, Ralf ; Hamann, Matthias ; Holz, Thorsten
Towards Next-Generation Botnets.
33-40
In: 2008 European Conference on Computer Network Defense : (EC2ND) ; Dublin, Ireland, 11 - 12 December 2008
(2008)
Piscataway, NJ
[Conference or workshop publication]
|
|
Freiling, Felix ; Holz, Thorsten ; Mink, Martin
Reconstructing Peoples Lives: A Case Study in Teaching Forensic Computing.
Göbel, Oliver
GI-Edition : Lecture Notes in Informatics. Proceedings
140
125-142
In: IMF 2008 : IT Incident Management & IT-Forensics; proceedings of the 4th International Conference on IT Incident Management & IT-Forensics; September 23 - 25, 2008, Mannheim, Germany
(2008)
Bonn
[Conference or workshop publication]
|
|
Eusgeld, Irene ; Freiling, Felix ; Reussner, Ralf
(2008)
Dependability Metrics.
Lecture Notes in Computer Science
Berlin [u.a.]
4909
[Book]
|
|
Beek, Frank van der ; Mink, Martin
Wie lehrt man IT-Sicherheit am Besten? Eine empirische Studie.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
499-511
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Conference or workshop publication]
|
|
Freiling, Felix ; Becher, Michael
Towards Dynamic Malware Analysis to Increase Mobile Device Security.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
423-433
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Conference or workshop publication]
|
|
Ikinci, Ali ; Holz, Thorsten ; Freiling, Felix
Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients.
Alkassar, Ammar
GI-Edition : Lecture Notes in Informatics. Proceedings
128
407-421
In: Sicherheit 2008 : Sicherheit - Schutz und Zuverlässigkeit ; Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI) ... ; 2. - 4. April 2008 im Saarbrücker Schloss
(2008)
Bonn
[Conference or workshop publication]
|
|
Holz, Thorsten ; Gorecki, Christian ; Rieck, Konrad ; Freiling, Felix
Measuring and Detecting Fast-Flux Service Networks.
257-268
In: Proceedings / 2008 Network and Distributed System Security Symposium : February 10 - 13, 2008, San Diego, California
(2008)
Reston, Va.
[Conference or workshop publication]
|
|
Gorecki, Christian
Truman Box - Transparente Emulation von Internetdiensten.
Paulsen, Christian
E [1-19]
In: 15. DFN-Workshop Sicherheit in Vernetzten Systemen : 13./14. Februar 2008 in Hamburg ; [Berichte ; DFN, Deutsches Forschungsnetz]
(2008)
Hamburg
[Conference or workshop publication]
|
|
2007
Benenson, Zinaida
(2007)
Lower Bounds.
Wagner, Dorothea
Algorithms for Sensor and Ad Hoc Networks
Lecture Notes in Computer Science
Berlin [u.a.]
4621
117-130
[Book chapter]
|
|
Benenson, Zinaida ; Freiling, Felix ; Cholewinski, Peter M.
Advanced Evasive Data Storage in Sensor Networks.
146-151
In: Proceedings / 2007 International Conference on Mobile Data Management : MDM 2007, May 7 - 11, 2007, Mannheim, Germany
(2007)
Piscataway, NJ [u.a.]
[Conference or workshop publication]
|
|
Zhuge, Jianwei ; Holz, Thorsten ; Han, Xinhui ; Song, Chengyu ; Zou, Wei
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Qing, Sihan
Lecture Notes in Computer Science
4861
438-451
In: Information and communications security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12 - 15, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Biely, Martin ; Hutle, Martin ; Draque Penso, Lucia ; Widder, Josef
Relating Stabilizing Timing Assumptions to Stabilizing Failure Detectors Regarding Solvability and Efficiency.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
4-20
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Freiling, Felix ; Jhumka, Arshad
Global Predicate Detection in Distributed Systems with Small Faults.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
296-310
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Freiling, Felix ; Schwittay, Bastian
Towards Reliable Rootkit Detection in Live Response.
Frings, Sandra
GI-Edition : Lecture Notes in Informatics. Proceedings
114
125-144
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Conference or workshop publication]
|
|
Freiling, Felix ; Dornseif, Maximillian ; Daiya, Harish
Testing Forensic Hash Tools on Sparse Files.
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics ; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Conference or workshop publication]
|
|
Freiling, Felix ; Schwittay, Bastian
A Common Process Model for Incident Response and Computer Forensics.
Frings, Sandra
GI-Edition : Lecture Notes in Informatics. Proceedings
114
19-40
In: IMF 2007 : IT-Incident Management and IT-Forensics; proceedings of the 3rd International Conference on IT-Incident Management &IT-Forensics; September 11 -13, 2007, Stuttgart, Germany
(2007)
Bonn
[Conference or workshop publication]
|
|
Freiling, Felix ; Majuntke, Matthias ; Mittal, Neeraj
On Detecting Termination in the Crash-Recovery Model.
In: Euro-Par 2007, parallel processing : 13th International Euro-Par Conference, Rennes, France, August 28 - 31, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Göbel, Jan Gerrit ; Holz, Thorsten ; Willems, Carsten
Measurement and Analysis of Autonomous Spreading Malware in a University Environment.
Hämmerli, Bernhard M.
Lecture Notes in Computer Science
4579
109-128
In: Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12 - 13, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Cortiñas, Roberto ; Freiling, Felix ; Ghajar-Azadanlou, Marjan ; Lafuente, Alberto ; Larrea, Mikel ; Draque Penso, Lucia ; Soraluze, Iratxe
Secure Failure Detection in TrustedPals.
Masuzawa, Toshimitsu
Lecture Notes in Computer Science
4838
173-188
In: Stabilization, safety, and security of distributed systems : 9th International Symposium, SSS 2007, Paris, France, November 14 - 16, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Delporte-Gallet, Carole ; Fauconnier, Hugues ; Freiling, Felix ; Draque Penso, Lucia ; Tielmann, Andreas
From Crash-Stop to Permanent Omission: Automatic Transformations and Weakest Failure Detectors.
Pelc, Andrzej
Lecture Notes in Computer Science
4731
165-178
In: Distributed computing : 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24 - 26, 2007; proceedings
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2006
Holz, Thorsten
Learning More About Attack Patterns With Honeypots.
GI-Edition : Lecture Notes in Informatics. Proceedings
77
30-41
In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar
(2006)
Bonn
[Conference or workshop publication]
|
|
Holz, Thorsten ; Wicherski, Georg
Effektives Sammeln von Malware mit Honeypots.
Paulsen, Christian
G
In: 13. Workshop Sicherheit in vernetzten Systemen : 1./2. März 2006 in Hamburg; [Berichte; DFN, Deutsches Forschungsnetz]
(2006)
Hamburg
[Conference or workshop publication]
|
|
Holz, Thorsten
Learning More About Attack Patterns With Honeypots.
Dittmann, Jana
GI-Edition : Lecture Notes in Informatics. Proceedings
77
30-41
In: Sicherheit 2006 : Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006
(2006)
Bonn
[Conference or workshop publication]
|
|
Nasserian, Samad ; Tsudik, Gene
Revisiting Oblivious Signature-Based Envelopes : New Constructs and Properties.
Di Crescenzo, Giovanni
Lecture Notes in Computer Science
4107
221-235
In: Financial Cryptography and Data Security : 10th International Conference, FC 2006, Anguilla, British West Indies, February 27 - March 2, 2006; revised selected papers
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Becher, Alexander ; Benenson, Zinaida ; Dornseif, Maximillian
Tampering with Motes : Real-World Attacks on Wireless Sensor Networks.
In: Sicherheit 2006 : Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Konferenzband der 3. Jahrestagung [des] Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006
(2006)
Bonn
[Conference or workshop publication]
|
|
Achtzehn, Andreas ; Benenson, Zinaida ; Rohner, Christian
Implementing Agreement Protocols in Sensor Networks.
858-863
In: 2006 IEEE International Conference on Mobile Ad-hoc and Sensor Systems : [Vancouver, B.C, Canada], 9-12 Oct. 2006; proceedings
(2006)
Piscataway, NJ
[Conference or workshop publication]
|
|
Benenson, Zinaida ; Freiling, Felix ; Pfitzmann, Birgit ; Rohner, Christian ; Waidner, Michael
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks.
Buttyán, Levente
Lecture Notes in Computer Science
4357
165-178
In: Security and privacy in ad-hoc and sensor networks : Third European Workshop, ESAS 2006, Hamburg, Germany, September 20 - 21, 2006; revised selected papers
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Anderson, Philip ; Dornseif, Maximillian ; Freiling, Felix ; Holz, Thorsten ; Irons, Alastair ; Laing, Christopher ; Mink, Martin
A Comparative Study of Teaching Forensics at a University Degree Level.
Göbel, Oliver
GI-Edition : Lecture Notes in Informatics. Proceedings
97
116-127
In: IMF 2006 : IT-Incident Management and IT-Forensics; conference proceedings; October 18th-19th, 2006, Stuttgart, Germany
(2006)
Bonn
[Conference or workshop publication]
|
|
Baecher, Paul ; Koetter, Markus ; Holz, Thorsten ; Dornseif, Maximillian ; Freiling, Felix
The Nepenthes Platform: An Efficient Approach to Collect Malware.
Zamboni, Diego
Lecture Notes in Computer Science
4219
165-184
In: Recent advances in intrusion detection : 9th International Symposium, RAID 2006, Hamburg, Germany, September 20 - 22, 2006; proceedings
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Fort, Milan ; Freiling, Felix ; Draque Penso, Lucia ; Benenson, Zinaida ; Kesdogan, Dogan
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Gollmann, Dieter
Lecture Notes in Computer Science
4189
34-48
In: Computer security - ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18 - 20, 2006; proceedings
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Böhme, Rainer ; Holz, Thorsten
The Effect of Stock Spam on Financial Markets.
1-24
In: 5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006
(2006)
Cambridge
[Conference or workshop publication]
|
|
Dornseif, Maximillian ; Freiling, Felix ; Gedicke, Nils ; Holz, Thorsten
Design and Implementation of the Honey-DVD.
231-238
In: 7th Annual IEEE Information Assurance Workshop : 21-23 June 2006, United States Military Academy, West Point, New York : the West Point Workshop
(2006)
Piscataway, NJ
[Conference or workshop publication]
|
|
Benenson, Zinaida ; Freiling, Felix ; Hammerschmidt, Ernest ; Lucks, Stefan ; Pimenidis, Lexi
Authenticated Query Flooding in Sensor Networks.
In: Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
(2006)
New York, NY [u.a.]
[Conference or workshop publication]
|
|
Dornseif, Maximillian ; Benenson, Zinaida ; Becher, Michael ; Lucks, Stefan ; Hammerschmidt, Ernest ; Pimenidis, Lexi
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
In: Security in pervasive computing : Third International Conference, SPC 2006, York, UK, April 18 - 21, 2006; proceedings
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Benenson, Zinaida ; Draque Penso, Lucia ; Freiling, Felix ; Holz, Thorsten ; Kesdogan, Dogan
Safety, Liveness, and Information Flow: Dependability Revisited.
In: ARCS'06 : 19th International Conference on Architecture of Computing Systems; Workshop proceedings; March 16, 2006, Frankfurt am Main
(2006)
Bonn
[Conference or workshop publication]
|
|
Warns, Timo ; Freiling, Felix ; Hasselbring, Wilhelm
Solving consensus using structural failure models.
212-224
In: Proceedings - 25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006 : 2 - 4 October 2006, Leeds, United Kingdom
(2006)
Los Alamitos, Calif. [u.a.]
[Conference or workshop publication]
|
|
2005
Pouget, Fabien ; Holz, Thorsten
A Pointillist Approach for Comparing Honeypots.
Julisch, Klaus
Lecture Notes in Computer Science
3548
51-68
In: Detection of Intrusions and Malware and Vulnerability Assessment : Second International Conference, DIMVA 2005, Vienna, Austria; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Holz, Thorsten
(2005)
A Short Visit to the Bot Zoo.
IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers
New York, NY
3
3
76-79
[Article]
|
|
Holz, Thorsten ; Raynal, Frederic
Detecting Honeypots and Other Suspicious Environments.
29-36
In: Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop : West Point, New York ; workshop papers
(2005)
Piscataway, NJ
[Conference or workshop publication]
|
|
Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan
Secure Multi-Party Computation with Security Modules.
Federrath, Hannes
GI-Edition : Lecture Notes in Informatics. Proceedings
62
41-52
In: Sicherheit 2005 : Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI); 5. - 8. April 2005 in Regensburg
(2005)
Bonn
[Conference or workshop publication]
|
|
Avoine, Gildas ; Freiling, Felix ; Guerraoui, Rachid ; Vukolic, Marko
Gracefully Degrading Fair Exchange with Security Modules.
Dal Cin, Mario
Lecture Notes in Computer Science
3463
55-71
In: Dependable computing - EDCC 2005 : 5th European Dependable Computing Conference, Budapest, Hungary, April 20 - 22, 2005; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Holz, Thorsten ; Dornseif, Maximillian
On the limits of deception.
235-252
In: Heute schon das Morgen sehen : 9. DFN-Arbeitstagung über Kommunikationsnetze in Düsseldorf
(2005)
Bonn
[Conference or workshop publication]
|
|
Mink, Martin ; Freiling, Felix ; Dornseif, Maximillian ; Pimenidis, Lexi
Teaching Data Security at University Degree Level.
Miloslavskaya, Natalia
213-222
In: Success through information security knowledge : proceedings of the IFIP TC11 WG 11.8 Fourth World Conference Information Security Education, (WISE4), 18-20 May 2005, Moscow, Russia
(2005)
Moscow
[Conference or workshop publication]
|
|
Freiling, Felix ; Herlihy, Maurice ; Draque Penso, Lucia
Optimal Randomized Fair Exchange with Secret Shared Coins.
Anderson, James H.
Lecture Notes in Computer Science
3974
61-72
In: Principles of distributed systems : 9th International Conference, OPODIS 2005, Pisa, Italy, December 12 - 14, 2005; revised selected paper
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Holz, Thorsten
(2005)
A Short Visit to the Bot Zoo.
IEEE Security & Privacy : Building Confidence in a Networked World / IEEE Computer Society, Institute of Electrical and Electronics Engineers
New York, NY
3
3
76-79
[Article]
|
|
Benenson, Zinaida ; Gedicke, Nils ; Raivio, Ossi
Realizing Robust User Authentication in Sensor Networks.
Technical report / Swedish Institute of Computer Science
2005,9
In: Proceedings of the First REALWSN 2005 Workshop on Real-World Wireless Sensor Networks : Stockholm, Sweden, 20 - 21 June 2005
(2005)
Stockholm
[Conference or workshop publication]
|
|
Benenson, Zinaida
Authenticated Queries in Sensor Networks.
In: Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13 - 14, 2005; revised selected papers
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Freiling, Felix ; Ghosh, Sukumar
Code Stabilization.
Herman, Ted
Lecture Notes in Computer Science
3764
128-139
In: Self-stabilizing systems : 7th International Symposium, SSS 2005, Barcelona, Spain, October 26 - 27, 2005; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Benenson, Zinaida ; Cholewinski, Peter M. ; Freiling, Felix
Simple Evasive Data Storage in Sensor Networks.
Zheng, Si-Qing
779-784
In: Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA
(2005)
Anaheim, Calif. [u.a.]
[Conference or workshop publication]
|
|
2004
Bornhövd, Christof ; Buchmann, Alejandro ; Cilia, Mariano ; Fiege, Ludger ; Freiling, Felix ; Liebig, Christoph ; Meixner, Matthias ; Mühl, Gero
(2004)
DREAM : Distributed Reliable Event-Based Application Management.
Levene, Mark
Web Dynamics : Adapting to Change in Content, Size, Topology and Use
Berlin [u.a.]
319-349
[Book chapter]
|
|
Holz, Thorsten ; Freiling, Felix ; Dornseif, Maximillian
Ermittlung von Verwundbarkeiten mit elektronischen Ködern.
129-141
In: Detection of intrusions and malware & vulnerability assessment : GI Special Interest Group SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6 - 7, 2004
(2004)
Bonn
[Conference or workshop publication]
|
|
Vukolic, Marko ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas
Modern Security with Traditional Distributed Algorithms.
1-4
In: Workshop on Secure Multiparty Protocols : SMP 2004 ; 7-8 October 2004; Amsterdam, The Netherlands
(2004)
Zurich
[Conference or workshop publication]
|
|
Klein, Christian ; Holz, Thorsten ; Dornseif, Maximillian
NoSEBrEaK - Attacking Honeynets.
In: Proceedings of the 5th Annual IEEE Information Assurance Workshop, Westpoint, 10.-11. June 2004
(2004)
West Point, NY
[Conference or workshop publication]
|
|
Kursawe, Klaus ; Guerraoui, Rachid ; Freiling, Felix ; Avoine, Gildas ; Vaudenay, Serge ; Vukolic, Marko
(2004)
Reducing Fair Exchange to Atomic Commit.
Technical report / Ecole Polytechnique Fédérale, Swiss Federal Institute of Technology (EPFL)
Lausanne
11
[Working paper]
|
|
Benenson, Zinaida ; Freiling, Felix ; Kesdogan, Dogan
User authentication in sensor networks (extended abstract).
Dadam, Peter
GI-Edition : Lecture Notes in Informatics. Proceedings
51
385-389
In: Informatik 2004 : 34. Jahrestagung der Gesellschaft für Informatik; 2: Informatik verbindet; Workshop on Sensor Networks
(2004)
Bonn
[Conference or workshop publication]
|
|
2003
Fiege, Ludger ; Mühl, Gero ; Freiling, Felix
(2003)
Modular event-based systems.
Knowledge Engineering Review
Cambridge
17
4
55-85
[Article]
|
|
2002
Pagnia, Henning ; Vogt, Holger ; Freiling, Felix
(2002)
Fairer Austausch im Mobile Business.
Reichwald, Ralf
Mobile Kommunikation : Wertschöpfung, Technologien, neue Dienste
Wiesbaden
157-170
[Book chapter]
|
|
Freiling, Felix
Fehlermodellierung ohne explizite Fehlerzustände.
Brinkschulte, Uwe
71-80
In: Trends in network and pervasive computing ; workshop proceedings / International Conference on Architecture of Computing Systems, ARCS 2002, Karlsruhe, Germany, April 8 - 12, 2002
(2002)
Berlin
[Conference or workshop publication]
|
|
Jhumka, Arshad ; Freiling, Felix ; Fetzer, Christof ; Suri, Neeraj
(2002)
On Systematic Design of Fast and Perfect Detectors.
Technical Report / Swiss Federal Institute of Technology (EPFL), School of Computer and Communication Sciences
Lausanne
200263
[Working paper]
|
|
2001
Fiege, Ludger ; Mühl, Gero ; Freiling, Felix
A Modular Approach to Build Structured Event-based Systems.
Lamont, Gary
385-392
In: Applied computing 2002 : proceedings of the 2002 ACM Symposium on Applied Computing ; Universidad Carlos III De Madrid, Madrid, Spain, March 11 - 14, 2002
(2001)
New York, NY
[Conference or workshop publication]
|
|
Pleisch, Stefan ; Freiling, Felix
(Im)Possibilities of predicate detection in crash-affected systems.
Datta, Ajoy K.
Lecture Notes in Computer Science
2194
98-113
In: Self-stabilizing systems : 5th international workshop; proceedings; WSS 2001, Lisbon, Portugal, October 1 - 2, 2001
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2000
Freiling, Felix
Formale Grundlagen der Fehlertoleranz.
137-139
In: Informatiktage 1999 : fachwissenschaftlicher Informatik-Kongreß, 12. und 13. November 1999 im Neuen Kloster Bad Schussenried
(2000)
Leinfelden-Echterdingen
[Conference or workshop publication]
|
|
1999
Theel, Oliver ; Freiling, Felix
An Exercise in Proving Convergence through Transfer Functions.
Arora, Anish
41-47
In: Workshop on Self-Stabilizing Systems : proceedings / 19th International Conference on Distributed Computing Systems : May 31 - June 4, 1999, Austin, Texas
(1999)
Los Alamitos, Calif. [u.a.]
[Conference or workshop publication]
|
|
1998
Stetter, Franz
Trends in der Informationstechnologie.
Veröffentlichungen des Instituts für Mittelstandsforschung / Grüne Reihe
37
56-61
In: Neue Informations- und Kommunikationstechniken in KMU : am 26. November 1998
(1998)
Mannheim
[Conference or workshop publication]
|
|
Freiling, Felix
(1998)
The PretzelBook.
TU Darmstadt, Fachgebiet Systemprogrammierung
Darmstadt
[Working paper]
|
|
1997
This list was created automatically on Wed Jan 27 04:38:28 2021 CET
|