Details

Displaying results 1 to 20 out of 10117

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
Nutzerbeteiligung
Andrea Abel and Christian M. Meyer
In: Annette Klosa: Handbuch Internetlexikografie, chap. 8, p. (to appear), Berlin: Akademie, 2016.

IOT: Using Channel State Information for Tamper Detection in the Internet of Things
Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz and Matthias Hollick
In: 31st Annual Computer Security Applications Conference (ACSAC 2015), Dezember 2015.

Capricate: A Fabrication Pipeline to Design and 3D Print Capacitive Touch Sensors for Interactive Objects
Martin Schmitz, Mohammadreza Khalilbeigi, Matthias Balwierz, Roman Lissermann, Max Mühlhäuser, Jürgen Steimle
In: UIST '15, Proceedings of the 28th annual ACM symposium on User interface software and technology, ACM, November 2015. ISBN 978-1-4503-3779-3.
www.tk.informatik.tu-darmstadt.de/de/research/tangible-interaction/capricate/.

PBMC: Symbolic Slicing for the Verification of Concurrent Programs
Habib Saissi, Peter Bokor, Neeraj Suri
In: Proceedings of the Symposium on Automated Technology for Verification and Analysis, ATVA 2015, Oktober 2015.

Topology Control with Application Constraints
Michael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser
In: Proceedings of the Local Computer Networks Conference, Oktober 2015.

a-kTC: Integrating Topology Control into the Stack
Immanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser
In: In Proceedings of the Local Computer Networks Conference (LCN), Oktober 2015.

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Christopher Liebchen, Marco Negro, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Stephen Crane, Mohaned Qunaibit, Michael Franz, Mauro Conti
In: 22nd ACM Conference on Computer and Communications Security (CCS), Oktober 2015.

It's a TRAP: Table Randomization and Protection against Function Reuse Attacks
Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz
In: 22nd ACM Conference on Computer and Communications Security (CCS), Oktober 2015.

Lattice Basis Reduction Attack against Physically Unclonable Functions
Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015) , Oktober 2015.
www.sigsac.org/ccs/CCS2015/.

Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
In: ACM: 22nd ACM Conference on Computer and Communications Security (CCS'15), Oktober 2015.
www.sigsac.org/ccs/CCS2015/index.html.

SEDA: Scalable Embedded Device Attestation
N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann
In: 22nd ACM Conference on Computer and Communications Security (CCS), Oktober 2015.

Combining Topic Models
Carsten Schnober and Iryna Gurevych
In: (to appear): (to appear), CIKM 2015 Workshop, Topic Models: Post-Processing and Applications, vol. (to appear), no. (to appear), p. (to appear), Sheridan Communications, Oktober 2015.
https://sites.google.com/site/cikm2015topicmodels/home.

Towards Secure Integration of Cryptographic Software
Steven Arzt, Sarah Nadi, Karim Ali, Eric Bodden, Sebastian Erdweg, Mira Mezini
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, Oktober 2015.

A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), p. 14, ACM, Oktober 2015.
www.sigsac.org/ccs/CCS2015/.

Personality Profiling of Fictional Characters using Sense-Level Links between Lexical Resources
Lucie Flekova and Iryna Gurevych
In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing (EMNLP), p. to appear, Association for Computational Linguistics, September 2015.

Open-Source German Distant Speech Recognition: Corpus and Acoustic Model
Stephan Radeck-Arneth, Benjamin Milde, Arvid Lange, Evandro Gouvea, Stefan Radomski, Max Mühlhäuser, Chris Biemann
In: Text, Speech and Dialogue. Proceedings of the 18th International Conference TSD2015, Plzen, Czech Republic, to appear, Springer, September 2015.

Extending Helios Towards Private Eligibility Verifiability
Oksana Kulyk, Vanessa Teague, Melanie Volkamer
In: 5th International Conference on E-voting and Identity (VoteID), September 2015.

Always the Best: Executing Transitions between Search Overlays
Alexander Frömmgen, Stefan Haas, Michael Stein, Robert Rehner, Alejandro Buchmann, Max Mühlhäuser
In: Proceedings of the Workshop on Architecting Self-Managing Distributed Systems, p. 1-4, September 2015.

PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation
Daniel Germanus, Hatem Ismail and Neeraj Suri
In: InProceedings of the 34th International Symposium on Reliable Distributed Systems, 28.09.2015-01.10.2015, Montreal, September 2015.

On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman
In: InProceedings of the 11th European Dependable Computing Conference ,07.09.2015-11.09.2015, Paris, September 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang