Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
  • Zielgruppen
  • Suche
 

Publikationen

Suche nach
in in allen Feldern AutorTitelBeschreibung
Kategorie
Jahr
 

2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 1994 1992 1991 alle Jahre

Konferenzen

Benjamin Henne, Christian Kater, Matthew Smith, and Michael Brenner(2013): Selective Cloaking: Need-to-know for Location-based Apps,Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. Datei

Benjamin Henne, Christian Szongott, Matthew Smith(2013): SnapMe if You Can: Privacy Threats of Other Peoples' Geo-tagged Media and What We Can Do About It,Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2013) Datei

Benjamin Henne, Marian Harbach, Matthew Smith (2013): Location Privacy Revisited: Factors of Privacy Decisions, CHI '13 Extended Abstracts on Human Factors in Computing Systems Datei

Benjamin Henne, Matthew Smith(2013): Awareness about photos on the Web and how privacy-privacy-tradeoffs could help,Proceedings of the 2013 International Conference on Financial Cryptography and Data Security (FC13), Workshop on Usable Security (USec13) Datei

Marian Harbach, Sascha Fahl, Matthias Rieger and Matthew Smith (2013): On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards, Privacy Enhancing Technologies Symposium (PETS) Datei

Marian Harbach, Sascha Fahl, Polina Yakovleva, and Matthew Smith (2013): Sorry, I Don’t Get It: An Analysis of Warning Message Texts,17th International Conference on Financial Cryptography and Data Security, USEC Workshop Datei

Markus Hettig, Eugen Kiss, Jan-Frederik Kassel, Susanne Weber, Marian Harbach, Matthew Smith (2013): Visualizing Risk by Example: Demonstrating Threats Arising From Android Apps, Workshop on Risk Perception in IT Security and Privacy, SOUPS 2013 Datei

Michael Brenner and Matthew Smith(2013): Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ISBN 978-1-4503-2477-9/13/11, pp. 1363-1365 Datei

Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith(2013): Rethinking SSL Development in an Appified World,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013) Datei

Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders and Matthew Smith (2013): Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers,Financial Cryptography and Data Security, Springer Lecture Notes in Computer Science, to appear

Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith(2013): On the Ecological Validity of a Password Study,Ninth Symposium On Usable Privacy and Security (SOUPS 2013)

Journale

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2013): Privacy/performance trade-off in private search on bio-medical data,Elsevier Future Generation Computer Systems (ISSN 0167-739X)

Zeitschriftenartikel

Matthew Smith, Benjamin Henne, Gabriele von Voigt(2013): Big Data Privacy Issues in Public Social Media,in: Newsletter of E-INNOVATION Germany, Big Data, Issue 36, March 2013

Michael Brenner(2013): Geheimes Rechnen - Homomorphe Kryptosysteme: Algebra mit verschlüsselten Zahlen,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 7/2013, S. 115-118, heise Verlag

Bücher und Buchbeiträge

Andrew A. Adams, Michael Brenner, Matthew Smith (Eds.)(2013): 17th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2013 Workshops USEC and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 7862, ISBN 978-3-642-41319-3 (print) / 41320-9 (online)

Vorträge

Michael Brenner, Henning Perl(2013): The hcrypt Project: Applying Homomorphic Cryptography,Oberseminar-Vortrag beim CDC der TU Darmstadt

Technische Berichte

Michael Brenner(2013): ENISA-Empfehlungen zu Krypto-Verfahren,Heise Security online http://heise.de/-2043356

Studentische Arbeiten (Auszug)

Christian Kater(2013): Ein Location-Privacy-Framework für Android,Prüfer: M. Smith, G. von Voigt; Betreuer: B. Henne; Bachelorarbeit, Februar 2013 Datei

Maximilian Koch(2013): Eine Browser-Erweiterung zur Erhöhung der Transparenz und der Sicherheit von Foto-Metadaten im Web,Prüfer: M. Smith, G. von Voigt; Betreuer: B. Henne; Bachelorarbeit, Februar 2013 Datei