{"id":15,"date":"2012-01-04T01:58:20","date_gmt":"2012-01-04T00:58:20","guid":{"rendered":"http:\/\/www.datenzone.de\/blog\/"},"modified":"2016-06-29T19:38:01","modified_gmt":"2016-06-29T18:38:01","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.datenzone.de\/blog\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>For my academic CV, see the <a title=\"Academic CV\" href=\"https:\/\/www.datenzone.de\/blog\/academic-cv\/\">CV page<\/a>.<\/p>\n<div class=\"teachpress_pub_list\"><form name=\"tppublistform\" method=\"get\"><a name=\"tppubs\" id=\"tppubs\"><\/a><\/form><div class=\"teachpress_publication_list\"><h3 class=\"tp_h3\" id=\"tp_h3_2016\">2016<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Baumann, Peter;  Katzenbeisser, Stefan;  Stopczynski, Martin;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('28','tp_links')\" style=\"cursor:pointer;\">Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, <\/span><span class=\"tp_pub_additional_pages\">pp. 37\u201346, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_address\">Vienna, Austria, <\/span><span class=\"tp_pub_additional_year\">2016<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 978-1-4503-4569-9<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_28\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('28','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_28\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('28','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_28\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Baumann:2016:DCB:2994620.2994621,<br \/>\r\ntitle = {Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection},<br \/>\r\nauthor = {Peter Baumann and Stefan Katzenbeisser and Martin Stopczynski and Erik Tews},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/10\/Disguised-Chromium-Browser-Robust-Browser-Flash-and-Canvas-Fingerprinting-Protection.pdf},<br \/>\r\ndoi = {10.1145\/2994620.2994621},<br \/>\r\nisbn = {978-1-4503-4569-9},<br \/>\r\nyear  = {2016},<br \/>\r\ndate = {2016-01-01},<br \/>\r\nbooktitle = {Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society},<br \/>\r\npages = {37--46},<br \/>\r\npublisher = {ACM},<br \/>\r\naddress = {Vienna, Austria},<br \/>\r\nseries = {WPES '16},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('28','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_28\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/10\/Disguised-Chromium-Browser-Robust-Browser-Flash-and-Canvas-Fingerprinting-Protection.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/10\/Disguised-Chromium-Brow[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/10\/Disguised-Chromium-Brow[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/2994620.2994621\" title=\"Follow DOI:10.1145\/2994620.2994621\" target=\"_blank\">doi:10.1145\/2994620.2994621<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('28','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Schulz, Matthias;  Klapper, Patrick;  Hollick, Matthias;  Tews, Erik;  Katzenbeisser, Stefan<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('27','tp_links')\" style=\"cursor:pointer;\">Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the 9th ACM Conference on Security &amp; Privacy in Wireless and Mobile Networks, <\/span><span class=\"tp_pub_additional_pages\">pp. 43\u201348, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_address\">Darmstadt, Germany, <\/span><span class=\"tp_pub_additional_year\">2016<\/span>, <span class=\"tp_pub_additional_isbn\">ISBN: 978-1-4503-4270-4<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_27\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('27','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_27\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('27','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_27\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{Schulz:2016:TWT:2939918.2940650,<br \/>\r\ntitle = {Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet},<br \/>\r\nauthor = { Matthias Schulz and Patrick Klapper and Matthias Hollick and Erik Tews and Stefan Katzenbeisser},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/07\/wisec2016-trust-the-wire.pdf<br \/>\r\nhttp:\/\/doi.acm.org\/10.1145\/2939918.2940650},<br \/>\r\ndoi = {10.1145\/2939918.2940650},<br \/>\r\nisbn = {978-1-4503-4270-4},<br \/>\r\nyear  = {2016},<br \/>\r\ndate = {2016-01-01},<br \/>\r\nbooktitle = {Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks},<br \/>\r\npages = {43--48},<br \/>\r\npublisher = {ACM},<br \/>\r\naddress = {Darmstadt, Germany},<br \/>\r\nseries = {WiSec '16},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('27','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_27\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/07\/wisec2016-trust-the-wire.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/07\/wisec2016-trust-the-wir[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/07\/wisec2016-trust-the-wir[...]<\/a><\/li><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/doi.acm.org\/10.1145\/2939918.2940650\" title=\"http:\/\/doi.acm.org\/10.1145\/2939918.2940650\" target=\"_blank\">http:\/\/doi.acm.org\/10.1145\/2939918.2940650<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/2939918.2940650\" title=\"Follow DOI:10.1145\/2939918.2940650\" target=\"_blank\">doi:10.1145\/2939918.2940650<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('27','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Senftleben, Marius;  Barroso, Ana;  Bucicoiu, Mihai;  Hollick, Matthias;  Katzenbeisser, Stefan;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('1','tp_links')\" style=\"cursor:pointer;\">On the Privacy and Performance of Mobile Anonymous Microblogging<\/a> <span class=\"tp_pub_type tp_  article\">Journal Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">IEEE Trans. Information Forensics and Security, <\/span><span class=\"tp_pub_additional_volume\">vol. 11, <\/span><span class=\"tp_pub_additional_number\">no. 7, <\/span><span class=\"tp_pub_additional_pages\">pp. 1578\u20131591, <\/span><span class=\"tp_pub_additional_year\">2016<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_1\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('1','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_1\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('1','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_1\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{DBLP:journals\/tifs\/SenftlebenBBH0T16,<br \/>\r\ntitle = {On the Privacy and Performance of Mobile Anonymous Microblogging},<br \/>\r\nauthor = {Marius Senftleben and Ana Barroso and Mihai Bucicoiu and Matthias Hollick and Stefan Katzenbeisser and Erik Tews},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/On-the-Privacy-and-Performance-of-Mobile-Anonymous-Microblogging.pdf},<br \/>\r\ndoi = {10.1109\/TIFS.2016.2541633},<br \/>\r\nyear  = {2016},<br \/>\r\ndate = {2016-01-01},<br \/>\r\njournal = {IEEE Trans. Information Forensics and Security},<br \/>\r\nvolume = {11},<br \/>\r\nnumber = {7},<br \/>\r\npages = {1578--1591},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('1','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_1\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/On-the-Privacy-and-Performance-of-Mobile-Anonymous-Microblogging.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/On-the-Privacy-and-Perf[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/On-the-Privacy-and-Perf[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2016.2541633\" title=\"Follow DOI:10.1109\/TIFS.2016.2541633\" target=\"_blank\">doi:10.1109\/TIFS.2016.2541633<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('1','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2014\">2014<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Karvelas, Nikolaos P.;  Peter, Andreas;  Katzenbeisser, Stefan;  Tews, Erik;  Hamacher, Kay<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('7','tp_links')\" style=\"cursor:pointer;\">Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Ahn, Gail-Joon;  Datta, Anupam (Ed.): <span class=\"tp_pub_additional_booktitle\">Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014, <\/span><span class=\"tp_pub_additional_pages\">pp. 1\u201310, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_7\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('7','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_7\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('7','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_7\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/wpes\/KarvelasP0TH14,<br \/>\r\ntitle = {Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM},<br \/>\r\nauthor = {Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Erik Tews and Kay Hamacher},<br \/>\r\neditor = {Gail-Joon Ahn and Anupam Datta},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Privacy-Preserving-Whole-Genome-Sequence-Processing-through-Proxy-Aided-ORAM.pdf},<br \/>\r\ndoi = {10.1145\/2665943.2665962},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014},<br \/>\r\npages = {1--10},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('7','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_7\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Privacy-Preserving-Whole-Genome-Sequence-Processing-through-Proxy-Aided-ORAM.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Privacy-Preserving-Whol[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Privacy-Preserving-Whol[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/2665943.2665962\" title=\"Follow DOI:10.1145\/2665943.2665962\" target=\"_blank\">doi:10.1145\/2665943.2665962<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('7','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Meyer, Christopher;  Somorovsky, Juraj;  Weiss, Eugen;  Schwenk, J\u00c3\u00b6rg;  Schinzel, Sebastian;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('6','tp_links')\" style=\"cursor:pointer;\">Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Fu, Kevin;  Jung, Jaeyeon (Ed.): <span class=\"tp_pub_additional_booktitle\">Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., <\/span><span class=\"tp_pub_additional_pages\">pp. 733\u2013748, <\/span><span class=\"tp_pub_additional_publisher\">USENIX Association, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_6\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('6','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_6\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('6','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_6\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/uss\/MeyerSWSST14,<br \/>\r\ntitle = {Revisiting SSL\/TLS Implementations: New Bleichenbacher Side Channels and Attacks},<br \/>\r\nauthor = {Christopher Meyer and Juraj Somorovsky and Eugen Weiss and J\u00c3\u00b6rg Schwenk and Sebastian Schinzel and Erik Tews},<br \/>\r\neditor = {Kevin Fu and Jaeyeon Jung},<br \/>\r\nurl = {https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/meyer<br \/>\r\nhttps:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Revisiting-SSL-TLS-Implementations-New-Bleichenbacher-Side-Channels-and-Attacks.pdf},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014.},<br \/>\r\npages = {733--748},<br \/>\r\npublisher = {USENIX Association},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('6','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_6\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/meyer\" title=\"https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentati[...]\" target=\"_blank\">https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentati[...]<\/a><\/li><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Revisiting-SSL-TLS-Implementations-New-Bleichenbacher-Side-Channels-and-Attacks.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Revisiting-SSL-TLS-Impl[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Revisiting-SSL-TLS-Impl[...]<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('6','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik;  Schlehuber, Christian<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('5','tp_links')\" style=\"cursor:pointer;\">Quantitative Ans\u00c3\u00a4tze zur IT-Risikoanalyse<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Katzenbeisser, Stefan;  Lotz, Volkmar;  Weippl, Edgar R. (Ed.): <span class=\"tp_pub_additional_booktitle\">Sicherheit 2014: Sicherheit, Schutz und Zuverl\u00c3\u00a4ssigkeit, Beitr\u00c3\u00a4ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00c3\u00bcr Informatik e.V. (GI), 19.-21. M\u00c3\u00a4rz 2014, Wien, \u00c3\u2013sterreich, <\/span><span class=\"tp_pub_additional_pages\">pp. 293\u2013303, <\/span><span class=\"tp_pub_additional_publisher\">GI, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_5\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_5\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/sicherheit\/TewsS14,<br \/>\r\ntitle = {Quantitative Ans\u00c3\u00a4tze zur IT-Risikoanalyse},<br \/>\r\nauthor = {Erik Tews and Christian Schlehuber},<br \/>\r\neditor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Quantitative-Ans\u00c3\u00a4tze-zur-IT-Risikoanalyse.pdf<br \/>\r\nhttp:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings228\/article9.html<br \/>\r\n},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl\u00c3\u00a4ssigkeit, Beitr\u00c3\u00a4ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f\u00c3\u00bcr Informatik e.V. (GI), 19.-21. M\u00c3\u00a4rz 2014, Wien, \u00c3\u2013sterreich},<br \/>\r\nvolume = {228},<br \/>\r\npages = {293--303},<br \/>\r\npublisher = {GI},<br \/>\r\nseries = {LNI},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_5\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Quantitative-Ans\u00c3\u00a4tze-zur-IT-Risikoanalyse.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Quantitative-Ans\u00c3\u00a4tze[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Quantitative-Ans\u00c3\u00a4tze[...]<\/a><\/li><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings228\/article9.html\" title=\"http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings228\/article9.html\" target=\"_blank\">http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings228\/article9.html<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('5','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Schlehuber, Christian;  Tews, Erik;  Katzenbeisser, Stefan<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('4','tp_links')\" style=\"cursor:pointer;\">IT-Security in Railway Signalling Systems<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Reimer, Helmut;  Pohlmann, Norbert;  Schneider, Wolfgang (Ed.): <span class=\"tp_pub_additional_booktitle\">ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014, <\/span><span class=\"tp_pub_additional_pages\">pp. 56\u201364, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_4\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_4\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/isse\/SchlehuberT014,<br \/>\r\ntitle = {IT-Security in Railway Signalling Systems},<br \/>\r\nauthor = {Christian Schlehuber and Erik Tews and Stefan Katzenbeisser},<br \/>\r\neditor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider},<br \/>\r\nurl = {http:\/\/dx.doi.org\/10.1007\/978-3-658-06708-3_4},<br \/>\r\ndoi = {10.1007\/978-3-658-06708-3_4},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {ISSE 2014 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2014 Conference, Brussels, Belgium, October 14-15, 2014},<br \/>\r\npages = {56--64},<br \/>\r\npublisher = {Springer},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_4\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/dx.doi.org\/10.1007\/978-3-658-06708-3_4\" title=\"http:\/\/dx.doi.org\/10.1007\/978-3-658-06708-3_4\" target=\"_blank\">http:\/\/dx.doi.org\/10.1007\/978-3-658-06708-3_4<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-658-06708-3_4\" title=\"Follow DOI:10.1007\/978-3-658-06708-3_4\" target=\"_blank\">doi:10.1007\/978-3-658-06708-3_4<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('4','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Senftleben, Marius;  Bucicoiu, Mihai;  Tews, Erik;  Armknecht, Frederik;  Katzenbeisser, Stefan;  Sadeghi, Ahmad-Reza<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('3','tp_links')\" style=\"cursor:pointer;\">MoP-2-MoP - Mobile Private Microblogging<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Christin, Nicolas;  Safavi-Naini, Reihaneh (Ed.): <span class=\"tp_pub_additional_booktitle\">Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 384\u2013396, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_3\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_3\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/fc\/SenftlebenBTAKS14,<br \/>\r\ntitle = {MoP-2-MoP - Mobile Private Microblogging},<br \/>\r\nauthor = {Marius Senftleben and Mihai Bucicoiu and Erik Tews and Frederik Armknecht and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},<br \/>\r\neditor = {Nicolas Christin and Reihaneh Safavi-Naini},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/MoP-2-MoP-\u00e2\u20ac\u201c-Mobile-private-microblogging.pdf},<br \/>\r\ndoi = {10.1007\/978-3-662-45472-5_25},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers},<br \/>\r\nvolume = {8437},<br \/>\r\npages = {384--396},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_3\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/MoP-2-MoP-\u00e2\u20ac\u201c-Mobile-private-microblogging.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/MoP-2-MoP-\u00e2\u20ac\u201c-Mobi[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/MoP-2-MoP-\u00e2\u20ac\u201c-Mobi[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-45472-5_25\" title=\"Follow DOI:10.1007\/978-3-662-45472-5_25\" target=\"_blank\">doi:10.1007\/978-3-662-45472-5_25<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('3','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Ghiglieri, Marco;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('2','tp_links')\" style=\"cursor:pointer;\">A privacy protection system for HbbTV in Smart TVs<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">11th IEEE Consumer Communications and Networking Conference, CCNC 2014, Las Vegas, NV, USA, January 10-13, 2014, <\/span><span class=\"tp_pub_additional_pages\">pp. 357\u2013362, <\/span><span class=\"tp_pub_additional_publisher\">IEEE, <\/span><span class=\"tp_pub_additional_year\">2014<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_2\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('2','tp_abstract')\" title=\"Show abstract\" style=\"cursor:pointer;\">Abstract<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_2\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('2','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_2\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('2','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_2\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/ccnc\/GhiglieriT14,<br \/>\r\ntitle = {A privacy protection system for HbbTV in Smart TVs},<br \/>\r\nauthor = {Marco Ghiglieri and Erik Tews},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/A-Privacy-Protection-System-for-HbbTV-in-Smart-TVs.pdf},<br \/>\r\ndoi = {10.1109\/CCNC.2014.6866595},<br \/>\r\nyear  = {2014},<br \/>\r\ndate = {2014-01-01},<br \/>\r\nbooktitle = {11th IEEE Consumer Communications and Networking Conference, CCNC 2014, Las Vegas, NV, USA, January 10-13, 2014},<br \/>\r\npages = {357--362},<br \/>\r\npublisher = {IEEE},<br \/>\r\nabstract = {The popularity of smart entertainment devices is growing every day. Products like blu-ray players, set-top boxes and Smart TVs (STV) with high connectivity are on the market. Many of them connect to the Internet via LAN or WiFi. Especially Smart TVs enable the broadcasting stations to provide<br \/>\r\nreal-time information directly to the consumers, for example additional information about a current TV program. HbbTV is one of the standards on STV for combining the two data media DVB and Internet. It defines how commonly used web technologies can be used as a transparent overlay over the current channel. Each respective broadcasting station is responsible for the contents of their channels\u00e2\u20ac\u2122 HbbTV signals.<br \/>\r\n<br \/>\r\nIn this article, we describe how broadcasting stations measure the consumers viewing behavior more accurately using HbbTV. We show which technologies are used and which cause privacy risks, i.e., which methods lead to the exposure of personal preferences. Additionally, we describe a method how an evil minded neighbor is able to monitor the viewing behavior without the user\u00e2\u20ac\u2122s knowledge and consent. This method is possible on<br \/>\r\nmost channels using HbbTV. It is not even required that the user actively starts the HbbTV application. Beyond that, we can collect this data on an encrypted WiFi network as well. Finally, we discuss our implementation for significantly reducing the privacy risk HbbTV poses.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('2','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_2\" style=\"display:none;\"><div class=\"tp_abstract_entry\">The popularity of smart entertainment devices is growing every day. Products like blu-ray players, set-top boxes and Smart TVs (STV) with high connectivity are on the market. Many of them connect to the Internet via LAN or WiFi. Especially Smart TVs enable the broadcasting stations to provide<br \/>\r\nreal-time information directly to the consumers, for example additional information about a current TV program. HbbTV is one of the standards on STV for combining the two data media DVB and Internet. It defines how commonly used web technologies can be used as a transparent overlay over the current channel. Each respective broadcasting station is responsible for the contents of their channels\u00e2\u20ac\u2122 HbbTV signals.<br \/>\r\n<br \/>\r\nIn this article, we describe how broadcasting stations measure the consumers viewing behavior more accurately using HbbTV. We show which technologies are used and which cause privacy risks, i.e., which methods lead to the exposure of personal preferences. Additionally, we describe a method how an evil minded neighbor is able to monitor the viewing behavior without the user\u00e2\u20ac\u2122s knowledge and consent. This method is possible on<br \/>\r\nmost channels using HbbTV. It is not even required that the user actively starts the HbbTV application. Beyond that, we can collect this data on an encrypted WiFi network as well. Finally, we discuss our implementation for significantly reducing the privacy risk HbbTV poses.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('2','tp_abstract')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_2\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/A-Privacy-Protection-System-for-HbbTV-in-Smart-TVs.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/A-Privacy-Protection-Sy[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/A-Privacy-Protection-Sy[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/CCNC.2014.6866595\" title=\"Follow DOI:10.1109\/CCNC.2014.6866595\" target=\"_blank\">doi:10.1109\/CCNC.2014.6866595<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('2','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2013\">2013<\/h3><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Peter, Andreas;  Tews, Erik;  Katzenbeisser, Stefan<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('8','tp_links')\" style=\"cursor:pointer;\">Efficiently Outsourcing Multiparty Computation Under Multiple Keys<\/a> <span class=\"tp_pub_type tp_  article\">Journal Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">IEEE Transactions on Information Forensics and Security, <\/span><span class=\"tp_pub_additional_volume\">vol. 8, <\/span><span class=\"tp_pub_additional_number\">no. 12, <\/span><span class=\"tp_pub_additional_pages\">pp. 2046\u20132058, <\/span><span class=\"tp_pub_additional_year\">2013<\/span>, <span class=\"tp_pub_additional_issn\">ISSN: 1556-6013<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_8\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('8','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_8\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('8','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_8\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{DBLP:journals\/tifs\/PeterTK13,<br \/>\r\ntitle = {Efficiently Outsourcing Multiparty Computation Under Multiple Keys},<br \/>\r\nauthor = {Andreas Peter and Erik Tews and Stefan Katzenbeisser},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Efficiently-Outsourcing-Multiparty-Computation-under-Multiple-Keys.pdf},<br \/>\r\ndoi = {10.1109\/TIFS.2013.2288131},<br \/>\r\nissn = {1556-6013},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-12-01},<br \/>\r\njournal = {IEEE Transactions on Information Forensics and Security},<br \/>\r\nvolume = {8},<br \/>\r\nnumber = {12},<br \/>\r\npages = {2046--2058},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('8','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_8\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Efficiently-Outsourcing-Multiparty-Computation-under-Multiple-Keys.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Efficiently-Outsourcing[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Efficiently-Outsourcing[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2013.2288131\" title=\"Follow DOI:10.1109\/TIFS.2013.2288131\" target=\"_blank\">doi:10.1109\/TIFS.2013.2288131<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('8','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Weiner, Michael;  Massar, Maurice;  Tews, Erik;  Giese, Dennis;  Wieser, Wolfgang<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('9','tp_links')\" style=\"cursor:pointer;\">Security analysis of a widely deployed locking system<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Sadeghi, Ahmad-Reza;  Gligor, Virgil D.;  Yung, Moti (Ed.): <span class=\"tp_pub_additional_booktitle\">2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, <\/span><span class=\"tp_pub_additional_pages\">pp. 929\u2013940, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2013<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_9\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('9','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_9\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('9','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_9\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/ccs\/WeinerMTGW13,<br \/>\r\ntitle = {Security analysis of a widely deployed locking system},<br \/>\r\nauthor = {Michael Weiner and Maurice Massar and Erik Tews and Dennis Giese and Wolfgang Wieser},<br \/>\r\neditor = {Ahmad-Reza Sadeghi and Virgil D. Gligor and Moti Yung},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-Analysis-of-a-Widely-Deployed-Locking-System.pdf},<br \/>\r\ndoi = {10.1145\/2508859.2516733},<br \/>\r\nyear  = {2013},<br \/>\r\ndate = {2013-01-01},<br \/>\r\nbooktitle = {2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013},<br \/>\r\npages = {929--940},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('9','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_9\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-Analysis-of-a-Widely-Deployed-Locking-System.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-Analysis-of-a-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-Analysis-of-a-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/2508859.2516733\" title=\"Follow DOI:10.1145\/2508859.2516733\" target=\"_blank\">doi:10.1145\/2508859.2516733<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('9','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2012\">2012<\/h3><div class=\"tp_publication tp_publication_phdthesis\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('10','tp_links')\" style=\"cursor:pointer;\">DECT security analysis<\/a> <span class=\"tp_pub_type tp_  phdthesis\">PhD Thesis<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_school\">Darmstadt University of Technology, <\/span><span class=\"tp_pub_additional_year\">2012<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_10\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('10','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_10\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_10\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@phdthesis{DBLP:phd\/dnb\/Tews12,<br \/>\r\ntitle = {DECT security analysis},<br \/>\r\nauthor = {Erik Tews},<br \/>\r\nurl = {http:\/\/eprint.iacr.org\/2012\/321<br \/>\r\nhttps:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DECT-Security-Analysis.pdf<br \/>\r\nhttp:\/\/tuprints.ulb.tu-darmstadt.de\/2932\/},<br \/>\r\nyear  = {2012},<br \/>\r\ndate = {2012-01-01},<br \/>\r\nschool = {Darmstadt University of Technology},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {phdthesis}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('10','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_10\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/eprint.iacr.org\/2012\/321\" title=\"http:\/\/eprint.iacr.org\/2012\/321\" target=\"_blank\">http:\/\/eprint.iacr.org\/2012\/321<\/a><\/li><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DECT-Security-Analysis.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DECT-Security-Analysis.[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DECT-Security-Analysis.[...]<\/a><\/li><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/tuprints.ulb.tu-darmstadt.de\/2932\/\" title=\"http:\/\/tuprints.ulb.tu-darmstadt.de\/2932\/\" target=\"_blank\">http:\/\/tuprints.ulb.tu-darmstadt.de\/2932\/<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('10','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2011\">2011<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> McHardy, Patrick;  Schuler, Andreas;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('12','tp_links')\" style=\"cursor:pointer;\">Interactive decryption of DECT phone calls<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Gollmann, Dieter;  Westhoff, Dirk;  Tsudik, Gene;  Asokan, N. (Ed.): <span class=\"tp_pub_additional_booktitle\">Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011, <\/span><span class=\"tp_pub_additional_pages\">pp. 71\u201378, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2011<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_12\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('12','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_12\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_12\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/wisec\/McHardyST11,<br \/>\r\ntitle = {Interactive decryption of DECT phone calls},<br \/>\r\nauthor = {Patrick McHardy and Andreas Schuler and Erik Tews},<br \/>\r\neditor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interactive-decryption-of-DECT-phone-calls.pdf},<br \/>\r\ndoi = {10.1145\/1998412.1998426},<br \/>\r\nyear  = {2011},<br \/>\r\ndate = {2011-01-01},<br \/>\r\nbooktitle = {Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011},<br \/>\r\npages = {71--78},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('12','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_12\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interactive-decryption-of-DECT-phone-calls.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interactive-decryption-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interactive-decryption-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/1998412.1998426\" title=\"Follow DOI:10.1145\/1998412.1998426\" target=\"_blank\">doi:10.1145\/1998412.1998426<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('12','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik;  W\u00c3\u00a4lde, Julian;  Weiner, Michael<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('11','tp_links')\" style=\"cursor:pointer;\">Breaking DVB-CSA<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Armknecht, Frederik;  Lucks, Stefan (Ed.): <span class=\"tp_pub_additional_booktitle\">Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 45\u201361, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2011<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_11\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('11','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_11\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('11','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_11\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/weworc\/TewsWW11,<br \/>\r\ntitle = {Breaking DVB-CSA},<br \/>\r\nauthor = {Erik Tews and Julian W\u00c3\u00a4lde and Michael Weiner},<br \/>\r\neditor = {Frederik Armknecht and Stefan Lucks},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-DVB-CSA.pdf},<br \/>\r\ndoi = {10.1007\/978-3-642-34159-5_4},<br \/>\r\nyear  = {2011},<br \/>\r\ndate = {2011-01-01},<br \/>\r\nbooktitle = {Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers},<br \/>\r\nvolume = {7242},<br \/>\r\npages = {45--61},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('11','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_11\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-DVB-CSA.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-DVB-CSA.pdf\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-DVB-CSA.pdf<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-34159-5_4\" title=\"Follow DOI:10.1007\/978-3-642-34159-5_4\" target=\"_blank\">doi:10.1007\/978-3-642-34159-5_4<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('11','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2010\">2010<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Weiner, Michael;  Tews, Erik;  Heinz, Benedikt;  Heyszl, Johann<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('15','tp_links')\" style=\"cursor:pointer;\">FPGA Implementation of an Improved Attack against the DECT Standard Cipher<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Rhee, Kyung Hyune;  Nyang, DaeHun (Ed.): <span class=\"tp_pub_additional_booktitle\">Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 177\u2013188, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2010<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_15\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('15','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_15\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('15','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_15\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/icisc\/WeinerTHH10,<br \/>\r\ntitle = {FPGA Implementation of an Improved Attack against the DECT Standard Cipher},<br \/>\r\nauthor = {Michael Weiner and Erik Tews and Benedikt Heinz and Johann Heyszl},<br \/>\r\neditor = {Kyung Hyune Rhee and DaeHun Nyang},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/FPGA-Implementation-of-an-Improved-Attack-Against-the-DECT-Standard-Cipher.pdf},<br \/>\r\ndoi = {10.1007\/978-3-642-24209-0_12},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\nbooktitle = {Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},<br \/>\r\nvolume = {6829},<br \/>\r\npages = {177--188},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('15','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_15\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/FPGA-Implementation-of-an-Improved-Attack-Against-the-DECT-Standard-Cipher.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/FPGA-Implementation-of-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/FPGA-Implementation-of-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-24209-0_12\" title=\"Follow DOI:10.1007\/978-3-642-24209-0_12\" target=\"_blank\">doi:10.1007\/978-3-642-24209-0_12<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('15','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Nohl, Karsten;  Tews, Erik;  Weinmann, Ralf-Philipp<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('14','tp_links')\" style=\"cursor:pointer;\">Cryptanalysis of the DECT Standard Cipher<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Hong, Seokhie;  Iwata, Tetsu (Ed.): <span class=\"tp_pub_additional_booktitle\">Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 1\u201318, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2010<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_14\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('14','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_14\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('14','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_14\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/fse\/NohlTW10,<br \/>\r\ntitle = {Cryptanalysis of the DECT Standard Cipher},<br \/>\r\nauthor = {Karsten Nohl and Erik Tews and Ralf-Philipp Weinmann},<br \/>\r\neditor = {Seokhie Hong and Tetsu Iwata},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Cryptanalysis-of-the-DECT-Standard-Cipher.pdf},<br \/>\r\ndoi = {10.1007\/978-3-642-13858-4_1},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\nbooktitle = {Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers},<br \/>\r\nvolume = {6147},<br \/>\r\npages = {1--18},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('14','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_14\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Cryptanalysis-of-the-DECT-Standard-Cipher.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Cryptanalysis-of-the-DE[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Cryptanalysis-of-the-DE[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-13858-4_1\" title=\"Follow DOI:10.1007\/978-3-642-13858-4_1\" target=\"_blank\">doi:10.1007\/978-3-642-13858-4_1<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('14','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Nohl, Karsten;  Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('13','tp_links')\" style=\"cursor:pointer;\">Kann man mit DECT noch vertraulich telefonieren?<\/a> <span class=\"tp_pub_type tp_  article\">Journal Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_journal\">Datenschutz und Datensicherheit, <\/span><span class=\"tp_pub_additional_volume\">vol. 34, <\/span><span class=\"tp_pub_additional_number\">no. 11, <\/span><span class=\"tp_pub_additional_pages\">pp. 758\u2013760, <\/span><span class=\"tp_pub_additional_year\">2010<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_13\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('13','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_13\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('13','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_13\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{DBLP:journals\/dud\/NohlT10,<br \/>\r\ntitle = {Kann man mit DECT noch vertraulich telefonieren?},<br \/>\r\nauthor = {Karsten Nohl and Erik Tews},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Kann-man-mit-DECT-noch-vertraulich-telefonieren.pdf},<br \/>\r\ndoi = {10.1007\/s11623-010-0206-0},<br \/>\r\nyear  = {2010},<br \/>\r\ndate = {2010-01-01},<br \/>\r\njournal = {Datenschutz und Datensicherheit},<br \/>\r\nvolume = {34},<br \/>\r\nnumber = {11},<br \/>\r\npages = {758--760},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('13','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_13\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Kann-man-mit-DECT-noch-vertraulich-telefonieren.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Kann-man-mit-DECT-noch-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Kann-man-mit-DECT-noch-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/s11623-010-0206-0\" title=\"Follow DOI:10.1007\/s11623-010-0206-0\" target=\"_blank\">doi:10.1007\/s11623-010-0206-0<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('13','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2009\">2009<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik;  Beck, Martin<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('17','tp_links')\" style=\"cursor:pointer;\">Practical attacks against WEP and WPA<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Basin, David A.;  Capkun, Srdjan;  Lee, Wenke (Ed.): <span class=\"tp_pub_additional_booktitle\">Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, <\/span><span class=\"tp_pub_additional_pages\">pp. 79\u201386, <\/span><span class=\"tp_pub_additional_publisher\">ACM, <\/span><span class=\"tp_pub_additional_year\">2009<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_17\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('17','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_17\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('17','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_17\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/wisec\/TewsB09,<br \/>\r\ntitle = {Practical attacks against WEP and WPA},<br \/>\r\nauthor = {Erik Tews and Martin Beck},<br \/>\r\neditor = {David A. Basin and Srdjan Capkun and Wenke Lee},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Practical-attacks-against-WEP-and-WPA.pdf},<br \/>\r\ndoi = {10.1145\/1514274.1514286},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nbooktitle = {Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009},<br \/>\r\npages = {79--86},<br \/>\r\npublisher = {ACM},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('17','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_17\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Practical-attacks-against-WEP-and-WPA.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Practical-attacks-again[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Practical-attacks-again[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1145\/1514274.1514286\" title=\"Follow DOI:10.1145\/1514274.1514286\" target=\"_blank\">doi:10.1145\/1514274.1514286<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('17','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Lucks, Stefan;  Schuler, Andreas;  Tews, Erik;  Weinmann, Ralf-Philipp;  Wenzel, Matthias<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('16','tp_links')\" style=\"cursor:pointer;\">Attacks on the DECT Authentication Mechanisms<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Fischlin, Marc (Ed.): <span class=\"tp_pub_additional_booktitle\">Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, <\/span><span class=\"tp_pub_additional_pages\">pp. 48\u201365, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2009<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_16\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('16','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_16\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('16','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_16\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/ctrsa\/LucksSTWW09,<br \/>\r\ntitle = {Attacks on the DECT Authentication Mechanisms},<br \/>\r\nauthor = {Stefan Lucks and Andreas Schuler and Erik Tews and Ralf-Philipp Weinmann and Matthias Wenzel},<br \/>\r\neditor = {Marc Fischlin},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-DECT-authentication-mechanisms.pdf},<br \/>\r\ndoi = {10.1007\/978-3-642-00862-7_4},<br \/>\r\nyear  = {2009},<br \/>\r\ndate = {2009-01-01},<br \/>\r\nbooktitle = {Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings},<br \/>\r\nvolume = {5473},<br \/>\r\npages = {48--65},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('16','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_16\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-DECT-authentication-mechanisms.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-DECT-aut[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-DECT-aut[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-00862-7_4\" title=\"Follow DOI:10.1007\/978-3-642-00862-7_4\" target=\"_blank\">doi:10.1007\/978-3-642-00862-7_4<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('16','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2008\">2008<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Hartle, M.;  Schumann, D.;  Botchak, A.;  Tews, E.;  M\u00c3\u00bchlh\u00c3\u00a4user, M.<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('22','tp_links')\" style=\"cursor:pointer;\">Describing Data Format Exploits Using Bitstream Segment Graphs<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">The Third International Multi-Conference on Computing in the Global Information Technology, 2008. ICCGI '08. , <\/span><span class=\"tp_pub_additional_pages\">pp. 119-124, <\/span><span class=\"tp_pub_additional_year\">2008<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_abstract_link\"><a id=\"tp_abstract_sh_22\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('22','tp_abstract')\" title=\"Show abstract\" style=\"cursor:pointer;\">Abstract<\/a><\/span> | <span class=\"tp_resource_link\"><a id=\"tp_links_sh_22\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('22','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_22\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('22','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_22\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{4591356,<br \/>\r\ntitle = {Describing Data Format Exploits Using Bitstream Segment Graphs},<br \/>\r\nauthor = {M. Hartle and D. Schumann and A. Botchak and E. Tews and M. M\u00c3\u00bchlh\u00c3\u00a4user},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DESCRIBING-DATA-FORMAT-EXPLOITS-USING-BITSTREAM-SEGMENT-GRAPHS.pdf},<br \/>\r\ndoi = {10.1109\/ICCGI.2008.21},<br \/>\r\nyear  = {2008},<br \/>\r\ndate = {2008-07-01},<br \/>\r\nbooktitle = {The Third International Multi-Conference on Computing in the Global Information Technology, 2008. ICCGI '08. },<br \/>\r\npages = {119-124},<br \/>\r\nabstract = {Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('22','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_abstract\" id=\"tp_abstract_22\" style=\"display:none;\"><div class=\"tp_abstract_entry\">Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific bug during processing, eg. in order to execute contained malicious code. Decomposing crafted data according to the purported data format and the function of its components that are not format-compliant is a step towards understanding the delivery mechanism of an exploit and fixing the vulnerable application. This paper demonstrates the use of bitstream segment graphs for describing the structure of exploits on the example of the TIFF Jailbreak exploit for the Apple iPhone and iPod Touch with firmware 1.1.1.<\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('22','tp_abstract')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_22\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DESCRIBING-DATA-FORMAT-EXPLOITS-USING-BITSTREAM-SEGMENT-GRAPHS.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DESCRIBING-DATA-FORMAT-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/DESCRIBING-DATA-FORMAT-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1109\/ICCGI.2008.21\" title=\"Follow DOI:10.1109\/ICCGI.2008.21\" target=\"_blank\">doi:10.1109\/ICCGI.2008.21<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('22','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Strenzke, Falko;  Tews, Erik;  Molter, H. Gregor;  Overbeck, Raphael;  Shoufan, Abdulhadi<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('18','tp_links')\" style=\"cursor:pointer;\">Side Channels in the McEliece PKC<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Buchmann, Johannes A.;  Ding, Jintai (Ed.): <span class=\"tp_pub_additional_booktitle\">Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, <\/span><span class=\"tp_pub_additional_pages\">pp. 216\u2013229, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2008<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_18\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('18','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_18\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('18','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_18\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/pqcrypto\/StrenzkeTMOS08,<br \/>\r\ntitle = {Side Channels in the McEliece PKC},<br \/>\r\nauthor = {Falko Strenzke and Erik Tews and H. Gregor Molter and Raphael Overbeck and Abdulhadi Shoufan},<br \/>\r\neditor = {Johannes A. Buchmann and Jintai Ding},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Side-Channels-in-the-McEliece-PKC.pdf},<br \/>\r\ndoi = {10.1007\/978-3-540-88403-3_15},<br \/>\r\nyear  = {2008},<br \/>\r\ndate = {2008-01-01},<br \/>\r\nbooktitle = {Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings},<br \/>\r\nvolume = {5299},<br \/>\r\npages = {216--229},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('18','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_18\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Side-Channels-in-the-McEliece-PKC.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Side-Channels-in-the-Mc[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Side-Channels-in-the-Mc[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-88403-3_15\" title=\"Follow DOI:10.1007\/978-3-540-88403-3_15\" target=\"_blank\">doi:10.1007\/978-3-540-88403-3_15<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('18','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2007\">2007<\/h3><div class=\"tp_publication tp_publication_mastersthesis\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('21','tp_links')\" style=\"cursor:pointer;\">Attacks on the WEP protocol<\/a> <span class=\"tp_pub_type tp_  mastersthesis\">Masters Thesis<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_year\">2007<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_21\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('21','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_21\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('21','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_21\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@mastersthesis{DBLP:journals\/iacr\/Tews07,<br \/>\r\ntitle = {Attacks on the WEP protocol},<br \/>\r\nauthor = {Erik Tews},<br \/>\r\nurl = {http:\/\/eprint.iacr.org\/2007\/471<br \/>\r\nhttps:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-WEP-protocol.pdf},<br \/>\r\nyear  = {2007},<br \/>\r\ndate = {2007-01-01},<br \/>\r\njournal = {IACR Cryptology ePrint Archive},<br \/>\r\nvolume = {2007},<br \/>\r\npages = {471},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {mastersthesis}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('21','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_21\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-globe\"><\/i><a class=\"tp_pub_list\" href=\"http:\/\/eprint.iacr.org\/2007\/471\" title=\"http:\/\/eprint.iacr.org\/2007\/471\" target=\"_blank\">http:\/\/eprint.iacr.org\/2007\/471<\/a><\/li><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-WEP-protocol.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-WEP-prot[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Attacks-on-the-WEP-prot[...]<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('21','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> Tews, Erik;  Weinmann, Ralf-Philipp;  Pyshkin, Andrei<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('20','tp_links')\" style=\"cursor:pointer;\">Breaking 104 Bit WEP in Less Than 60 Seconds<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Kim, Sehun;  Yung, Moti;  Lee, Hyung-Woo (Ed.): <span class=\"tp_pub_additional_booktitle\">Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 188\u2013202, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2007<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_20\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('20','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_20\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('20','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_20\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/wisa\/TewsWP07,<br \/>\r\ntitle = {Breaking 104 Bit WEP in Less Than 60 Seconds},<br \/>\r\nauthor = {Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin},<br \/>\r\neditor = {Sehun Kim and Moti Yung and Hyung-Woo Lee},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-104-Bit-WEP-in-Less-Than-60-Seconds.pdf},<br \/>\r\ndoi = {10.1007\/978-3-540-77535-5_14},<br \/>\r\nyear  = {2007},<br \/>\r\ndate = {2007-01-01},<br \/>\r\nbooktitle = {Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},<br \/>\r\nvolume = {4867},<br \/>\r\npages = {188--202},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('20','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_20\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-104-Bit-WEP-in-Less-Than-60-Seconds.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-104-Bit-WEP-in[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Breaking-104-Bit-WEP-in[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-77535-5_14\" title=\"Follow DOI:10.1007\/978-3-540-77535-5_14\" target=\"_blank\">doi:10.1007\/978-3-540-77535-5_14<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('20','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> D\u00c3\u00b6nigus, Daniel;  Endler, Stefan;  Fischlin, Marc;  H\u00c3\u00bclsing, Andreas;  J\u00c3\u00a4ger, Patrick;  Lehmann, Anja;  Podrazhansky, Sergey;  Schipp, Sebastian;  Tews, Erik;  Vowe, Sven;  Walthart, Matthias;  Weidemann, Frederik<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('19','tp_links')\" style=\"cursor:pointer;\">Security of Invertible Media Authentication Schemes Revisited<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span> Furon, Teddy;  Cayre, Fran\u00c3\u00a7ois;  Do\u00c3\u00abrr, Gwena\u00c3\u00abl J.;  Bas, Patrick (Ed.): <span class=\"tp_pub_additional_booktitle\">Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, <\/span><span class=\"tp_pub_additional_pages\">pp. 189\u2013203, <\/span><span class=\"tp_pub_additional_publisher\">Springer, <\/span><span class=\"tp_pub_additional_year\">2007<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_19\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('19','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_19\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('19','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_19\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{DBLP:conf\/ih\/DonigusEFHJLPSTVWW07,<br \/>\r\ntitle = {Security of Invertible Media Authentication Schemes Revisited},<br \/>\r\nauthor = {Daniel D\u00c3\u00b6nigus and Stefan Endler and Marc Fischlin and Andreas H\u00c3\u00bclsing and Patrick J\u00c3\u00a4ger and Anja Lehmann and Sergey Podrazhansky and Sebastian Schipp and Erik Tews and Sven Vowe and Matthias Walthart and Frederik Weidemann},<br \/>\r\neditor = {Teddy Furon and Fran\u00c3\u00a7ois Cayre and Gwena\u00c3\u00abl J. Do\u00c3\u00abrr and Patrick Bas},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-of-Invertible-Media-Authentication-Schemes-Revisited.pdf},<br \/>\r\ndoi = {10.1007\/978-3-540-77370-2_13},<br \/>\r\nyear  = {2007},<br \/>\r\ndate = {2007-01-01},<br \/>\r\nbooktitle = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers},<br \/>\r\nvolume = {4567},<br \/>\r\npages = {189--203},<br \/>\r\npublisher = {Springer},<br \/>\r\nseries = {Lecture Notes in Computer Science},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('19','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_19\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-of-Invertible-Media-Authentication-Schemes-Revisited.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-of-Invertible-[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Security-of-Invertible-[...]<\/a><\/li><li><i class=\"ai ai-doi\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-540-77370-2_13\" title=\"Follow DOI:10.1007\/978-3-540-77370-2_13\" target=\"_blank\">doi:10.1007\/978-3-540-77370-2_13<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('19','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2006\">2006<\/h3><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> B\u00c3\u00a4r, Henning;  R\u00c3\u00b6\u00c3\u0178ling, Guido;  Tews, Erik;  Lecher, Elmar<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('23','tp_links')\" style=\"cursor:pointer;\">Bluetooth Interaction Support in Lectures<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of Mobile Learning 2006, <\/span><span class=\"tp_pub_additional_pages\">pp. 360\u2013364, <\/span><span class=\"tp_pub_additional_publisher\">IADIS Press, <\/span><span class=\"tp_pub_additional_year\">2006<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_23\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('23','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_23\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('23','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_23\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{\tBRTL:20060,<br \/>\r\ntitle = {Bluetooth Interaction Support in Lectures},<br \/>\r\nauthor = {Henning B\u00c3\u00a4r and Guido R\u00c3\u00b6\u00c3\u0178ling and Erik Tews and Elmar Lecher},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/BLUETOOTH-INTERACTION-SUPPORT-IN-LECTURES.pdf},<br \/>\r\nyear  = {2006},<br \/>\r\ndate = {2006-01-01},<br \/>\r\nbooktitle = {Proceedings of Mobile Learning 2006},<br \/>\r\npages = {360--364},<br \/>\r\npublisher = {IADIS Press},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('23','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_23\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/BLUETOOTH-INTERACTION-SUPPORT-IN-LECTURES.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/BLUETOOTH-INTERACTION-S[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/BLUETOOTH-INTERACTION-S[...]<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('23','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><h3 class=\"tp_h3\" id=\"tp_h3_2005\">2005<\/h3><div class=\"tp_publication tp_publication_article\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> B\u00c3\u00a4r, Henning;  Tews, Erik;  R\u00c3\u00b6\u00c3\u0178ling, Guido<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('26','tp_links')\" style=\"cursor:pointer;\">Improving Feedback and Classroom Interaction Using Mobile Phones<\/a> <span class=\"tp_pub_type tp_  article\">Journal Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_year\">2005<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_26\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('26','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_26\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('26','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_26\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@article{bar2002improving,<br \/>\r\ntitle = {Improving Feedback and Classroom Interaction Using Mobile Phones},<br \/>\r\nauthor = {Henning B\u00c3\u00a4r and Erik Tews and Guido R\u00c3\u00b6\u00c3\u0178ling },<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Improving-Classroom-Interaction-Using-Mobile-Phones.pdf},<br \/>\r\nyear  = {2005},<br \/>\r\ndate = {2005-01-01},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {article}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('26','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_26\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Improving-Classroom-Interaction-Using-Mobile-Phones.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Improving-Classroom-Int[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Improving-Classroom-Int[...]<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('26','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><div class=\"tp_publication tp_publication_inproceedings\"><div class=\"tp_pub_info\"><p class=\"tp_pub_author\"> B\u00c3\u00a4r, Henning;  M\u00c3\u00bchlh\u00c3\u00a4user, Max;  Tews, Erik;  R\u00c3\u00b6\u00c3\u0178ling, Guido<\/p><p class=\"tp_pub_title\"><a class=\"tp_title_link\" onclick=\"teachpress_pub_showhide('24','tp_links')\" style=\"cursor:pointer;\">Interaction during lectures using mobile phones<\/a> <span class=\"tp_pub_type tp_  inproceedings\">Proceedings Article<\/span> <\/p><p class=\"tp_pub_additional\"><span class=\"tp_pub_additional_in\">In: <\/span><span class=\"tp_pub_additional_booktitle\">Proceedings of the World Conference on Educational Multimedia, Hypermedia &amp; Telecommunication (ED-MEDIA), Montr`eal, Canada, <\/span><span class=\"tp_pub_additional_pages\">pp. 3767\u20133772, <\/span><span class=\"tp_pub_additional_year\">2005<\/span>.<\/p><p class=\"tp_pub_menu\"><span class=\"tp_resource_link\"><a id=\"tp_links_sh_24\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('24','tp_links')\" title=\"Show links and resources\" style=\"cursor:pointer;\">Links<\/a><\/span> | <span class=\"tp_bibtex_link\"><a id=\"tp_bibtex_sh_24\" class=\"tp_show\" onclick=\"teachpress_pub_showhide('24','tp_bibtex')\" title=\"Show BibTeX entry\" style=\"cursor:pointer;\">BibTeX<\/a><\/span><\/p><div class=\"tp_bibtex\" id=\"tp_bibtex_24\" style=\"display:none;\"><div class=\"tp_bibtex_entry\"><pre>@inproceedings{bar2005interaction,<br \/>\r\ntitle = {Interaction during lectures using mobile phones},<br \/>\r\nauthor = {Henning B\u00c3\u00a4r and Max M\u00c3\u00bchlh\u00c3\u00a4user and Erik Tews and Guido R\u00c3\u00b6\u00c3\u0178ling},<br \/>\r\nurl = {https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interaction-during-lectures-using-mobile-phones.pdf},<br \/>\r\nyear  = {2005},<br \/>\r\ndate = {2005-01-01},<br \/>\r\nbooktitle = {Proceedings of the World Conference on Educational Multimedia, Hypermedia & Telecommunication (ED-MEDIA), Montr`eal, Canada},<br \/>\r\npages = {3767--3772},<br \/>\r\nkeywords = {},<br \/>\r\npubstate = {published},<br \/>\r\ntppubtype = {inproceedings}<br \/>\r\n}<br \/>\r\n<\/pre><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('24','tp_bibtex')\">Close<\/a><\/p><\/div><div class=\"tp_links\" id=\"tp_links_24\" style=\"display:none;\"><div class=\"tp_links_entry\"><ul class=\"tp_pub_list\"><li><i class=\"fas fa-file-pdf\"><\/i><a class=\"tp_pub_list\" href=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interaction-during-lectures-using-mobile-phones.pdf\" title=\"https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interaction-during-lect[...]\" target=\"_blank\">https:\/\/www.datenzone.de\/blog\/wp-content\/uploads\/2016\/06\/Interaction-during-lect[...]<\/a><\/li><\/ul><\/div><p class=\"tp_close_menu\"><a class=\"tp_close\" onclick=\"teachpress_pub_showhide('24','tp_links')\">Close<\/a><\/p><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>For my academic CV, see the CV page.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-15","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":23,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":131,"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/pages\/15\/revisions\/131"}],"wp:attachment":[{"href":"https:\/\/www.datenzone.de\/blog\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}