Center for Information Security and Trust

Filter
Konferencebidrag i proceedings

Søgeresultater

  • 2021

    Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis

    Pardo, R., Rafnsson, W., Probst, C. & Wasowski, A., 2021, European Symposium on Research in Computer Security: Computer Security – ESORICS 2021. Springer, Bind 12973. (Lecture Notes in Computer Science, Bind 12973).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Security Protocols as Choreographies

    Bruni, A., Carbone, M., Giustolisi, R., Mödersheim, S. A. & Schürmann, C., 2021, Security Protocols as Choreographies: Joshua Guttman's Festschrift . Springer, s. 98 111 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
  • TARDIS: A Foundation of Time-Lock Puzzles in UC

    Baum, C., David, B., Dowsley, R., Nielsen, J. B. & Oechsner, S., 2021, Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part III.. Springer, s. 429-459 31 s. (Lecture Notes in Computer Science, Bind 12698).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Trimming Data Sets: a Verified Algorithm for Robust Mean Estimation

    Daukantas, I., Bruni, A. & Schürmann, C., 2021, Proceedings of PPDP (Principles of Declarative Programing Languages). Association for Computing Machinery

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Usable Verifiable Secrecy-Preserving E-Voting

    Kulyk, O., Ludwig, J., Volkamer, M., Koenig, R. & Locher, P., 2021, Proceedings of the Sixth International Conference for Electronic Voting (E-Vote-ID 2021). Springer, (Lecture Notes in Computer Science, Bind 12900).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Voter Perceptions of Trust in Risk-Limiting Audit

    Dalela, A., Kulyk, O. & Schürmann, C., 2021, Proceedings of the Sixth International Joint Conference on Electronic Voting (E-Vote-ID 2021). TalTech press

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Zoom and enhance: Action refinement via subprocesses in timed declarative processes

    Norman, H., Debois, S., Slaats, T. & Hildebrandt, T. T., 2021, Business process management - 19th international conference, BPM 2021, rome, italy, september 06-10, 2021, proceedings. Polyvyanyy, A., Wynn, M. T., Looy, A. V. & Reichert, M. (red.). Springer VS, Bind 12875. s. 161-178 18 s. (Lecture notes in computer science).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
  • 2020

    ALBATROSS: Publicly AttestabLe BATched Randomness Based On Secret Sharing

    Cascudo, I. & David, B., 2020, ASIACRYPT 2020: Advances in Cryptology – ASIACRYPT 2020. Moriai, S. & Wang, H. (red.). Springer, s. 311-341 (Lecture Notes in Computer Science, Bind 12493).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Does My Smart Device Provider Care About My Privacy? Investigating Trust Factors and User Attitudes in IoT Systems

    Kulyk, O., Milanovic, K. & Pitt, J., 2020, Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. Association for Computing Machinery, s. 1-12 29

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Effective Cybersecurity Awareness Training for Election Officials

    Schürmann, C., Jensen, L. H. & Sigbjörnsdóttir, R., 2020, Electronic Voting: E-Vote-ID 2020. Springer, s. 196-212 (Lecture Notes in Computer Science, Bind 12455).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model

    David, B. & Dowsley, R., 2020, Cryptology and Network Security. CANS 2020.. Krenn, S., Schulman, H. & Vaudenay, S. (red.). Springer, s. 462-481| (Lecture Notes in Computer Science, Bind 12579).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Fixing Vulnerabilities Automatically with Linters

    Rafnsson, W., Giustolisi, R., Kragerup, M. & Høyrup, M., 2020, 14th International Conference on Network and System Security. Springer

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Human Factors in Coercion Resistant Internet Voting–A Review of Existing Solutions and Open Challenges

    Kulyk, O. & Neumann, S., 2020, Proceedings of the Fifth International Joint Conference on Electronic Voting . TalTech press

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Insured MPC: Efficient Secure Computation with Financial Penalties

    Baum, C., David, B. & Dowsley, R., 2020, Financial Cryptography and Data Security. FC 2020.. Bonneau, J. & Heninger, N. (red.). Springer, s. 404-420 (Lecture Notes in Computer Science, Bind 12059).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • On the I/O Complexity of the k-Nearest Neighbors Problem

    Goswami, M., Jacob, R. & Pagh, R., jun. 2020, PODS'20: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. Association for Computing Machinery, s. 205-212 (ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • On the Subject of Non-Equivocation: Defining Non-Equivocation in Synchronous Agreement Systems

    Madsen, M. F. & Debois, S., jul. 2020, PODC '20: Proceedings of the 39th Symposium on Principles of Distributed Computing. Association for Computing Machinery, Bind 39. s. 159-168 10 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

  • Privacy-Preserving Dispute Resolution in the Improved Bingo Voting

    Giustolisi, R. & Bruni, A., 25 sep. 2020, E-Vote-ID: International Joint Conference on Electronic Voting. Springer, s. 67-83 16 s. (Lecture Notes in Computer Science, Bind 12455).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Security and Privacy Awareness in Smart Environments--A Cross-Country Investigation

    Kulyk, O., Reinheimer, B., Aldag, L., Mayer, P., Gerber, N. & Volkamer, M., 2020, International Conference on Financial Cryptography and Data Security. Springer, s. 84-101 18 s. (Lecture Notes in Computer Science, Bind 12063).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • The Designer’s Body as Resource in Design: Exploring Combinations of Point-of-view and Tense

    Svanæs, D. & Barkhuus, L., apr. 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, s. 1-13 12 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Towards improving the efficacy of code-based verification in internet voting

    Kulyk, O., Volkamer, M., Müller, M. & Renaud, K., 2020, International Conference on Financial Cryptography and Data Security. Springer, s. 291-309 19 s. (Lecture Notes in Computer Science, Bind 12063).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Watching Together but Apart: Shared Video Experiences During COVID-19 Outbreak

    Bryld, J. M., Schønrock, L., Løvlie, A. S. & Barkhuus, L., 17 jun. 2020, Adjunct Proceedings of the ACM International Conference on Interactive Media Experiences (IMX) 2020. Association for Computing Machinery

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • 2019

    A Security Analysis of the Danish Deposit Return System

    Garbacz, I., Giustolisi, R., Møller Nielsen, K. & Schürmann, C., 1 nov. 2019, Proceedings of the 9th Workshop on Socio-Technical Aspects in Security and Trust. Springer, (Lecture Notes in Computer Science).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Bear & Co: Simulating Value Conflicts in IoT Development

    Berner, A., Seyfried, M., Nordenskjöld, C., Kuhberg, P. & Shklovski, I., 2019, CHI EA '19 Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, 4 s. INT025

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Comparing “Challenge-Based” and “Code-Based” Internet Voting Verification Implementations

    Kulyk, O., Henzel, J., Renaud, K. & Volkamer, M., sep. 2019, 17th IFIP TC 13 International Conference on Human-Computer Interaction: INTERACT 2019. Lecture Notes in Computer Science, vol 11746. Springer, s. 519-538 (Lecture Notes in Computer Science, Bind 11746).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Consent Verification Under Evolving Privacy Policies

    Robol, M., D. Breaux, T., Paja, E. & Giorgini, P., 23 sep. 2019, Proceedings of the IEEE 27th International Requirements Engineering Conference (RE'19). Conf. Location: Jeju Island, Korea (South): IEEE, s. 422-427 6 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • DCR Event-reachability via Genetic Algorithms

    Högnasson, T. & Debois, S., 29 jan. 2019, Business Process Management Workshops: BPM 2018. Springer, Cham, Bind 342. (Lecture Notes in Business Information Processing, Bind 342).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Declarative Choreographies and Liveness

    Hildebrandt, T. T., Slaats, T., López, H. A., Debois, S. & Carbone, M., jun. 2019, International Conference on Formal Techniques for Distributed Objects, Components, and Systems: FORTE 2019: Formal Techniques for Distributed Objects, Components, and Systems . Springer, s. 129-147 19 s. (Lecture Notes in Computer Science, Bind 11535).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Fil
  • Efficient UC Commitment Extension with Homomorphism for Free (and Applications)

    Cascudo, I., Damgård, I., David, B., Dowsley, R., Döttling, N. & Giacomelli, I., 22 nov. 2019, Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II. Galbraith, S. & Moriai, S. (red.). Springer, s. 606-635 (Lecture Notes in Computer Science, Bind 11922).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Fragile Complexity of Comparison-Based Algorithms

    Afshani, P., Fagerberg, R., Hammer, D. M. G., Jacob, R., Kostitsyna, I., Meyer, U., Penschuck, M. & Sitchinava, N., 9 sep. 2019, 27th Annual European Symposium on Algorithms (ESA 2019). Schloss Dagstuhl--Leibniz-Zentrum für Informatik, s. 2:1–2:19 2. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Lower Bounds for Oblivious Data Structures

    Jacob, R., Larsen, K. G. & Nielsen, J. B., 6 jan. 2019, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Monitoring the GDPR: European Symposium on Research in Computer Security

    Kock, E. A., Basin, D. & Debois, S., 2019, Computer Security – ESORICS 2019: European Symposium on Research in Computer Security. Springer, s. 681-699 (Lecture Notes in Computer Science, Bind 11735).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • "Mothers as Candy Wrappers": Critical Infrastructure Supporting the Transition into Motherhood

    Britton, L., Barkhuus, L. & Semaan, B., dec. 2019, Proceedings of the ACM on Human-Computer Interaction: GROUP. Association for Computing Machinery, Bind 3. 21 s. 232

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement

    Baum, C., David, B. & Dowsley, R., 30 sep. 2019, Financial Cryptography and Data Security. FC 2019.. Goldberg, I. & Moore, T. (red.). Springer, s. 282-300 18 s. (Lecture Notes in Computer Science, Bind 11598).

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • Technical and Socio-Technical Attacks on the Danish Party Endorsement System

    Schürmann, C. & Bruni, A., 24 sep. 2019, Electronic Voting. Springer, Bind LLNCS11759. s. 200-215 15 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

  • Transforming Byzantine Faults using a Trusted Execution Environment

    Madsen, M. F., Gaub, M., Kirkbro, M. E. & Debois, S., 7 nov. 2019, 2019 15th European Dependable Computing Conference (EDCC). IEEE, s. 63-70 8 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil
  • What Are the Threats? (Charting the Threat Models of Security Ceremonies)

    Sempreboni, D., Bella, G., Giustolisi, R. & Vigano, L., 26 jul. 2019, Proceedings of the 16th International Joint Conference on e-Business and Telecommunications. SCITEPRESS Digital Library, Bind 2. s. 161*172 12 s.

    Publikation: Konference artikel i Proceeding eller bog/rapport kapitelKonferencebidrag i proceedingsForskningpeer review

    Åben adgang
    Fil