Search Results - "Tews, Erik"
-
1
Efficiently Outsourcing Multiparty Computation Under Multiple Keys
Published in IEEE transactions on information forensics and security (01-12-2013)“…Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these inputs encrypted…”
Get full text
Journal Article -
2
On the Privacy and Performance of Mobile Anonymous Microblogging
Published in IEEE transactions on information forensics and security (01-07-2016)“…Microblogging is a popular form of online social networking activity. It allows users to send messages in a one-to-many publish-subscribe manner. Most current…”
Get full text
Journal Article -
3
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss
Published in 2022 APWG Symposium on Electronic Crime Research (eCrime) (30-11-2022)“…In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery…”
Get full text
Conference Proceeding -
4
Ransomware Economics: A Two-Step Approach To Model Ransom Paid
Published in 2023 APWG Symposium on Electronic Crime Research (eCrime) (15-11-2023)“…Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts aim to reduce the profitability of ransomware attacks…”
Get full text
Conference Proceeding -
5
A privacy protection system for HbbTV in Smart TVs
Published in 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) (01-01-2014)“…The popularity of smart entertainment devices is growing every day. Products like blu-ray players, set-top boxes and Smart TVs (STV) with high connectivity are…”
Get full text
Conference Proceeding -
6
Lost and Found: Stopping Bluetooth Finders from Leaking Private Information
Published 17-05-2020“…A Bluetooth finder is a small battery-powered device that can be attached to important items such as bags, keychains, or bikes. The finder maintains a…”
Get full text
Journal Article -
7
Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics
Published 11-06-2018“…Robots have gained relevance in society, increasingly performing critical tasks. Nonetheless, robot security is being underestimated. Robotics security is a…”
Get full text
Journal Article -
8
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario
Published in 2009 Fifth International Conference on Wireless and Mobile Communications (01-08-2009)“…We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force…”
Get full text
Conference Proceeding -
9
Describing Data Format Exploits Using Bitstream Segment Graphs
Published in 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008) (01-07-2008)“…Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific…”
Get full text
Conference Proceeding -
10
Kann man mit DECT noch vertraulich telefonieren?
Published in Datenschutz und Datensicherheit (01-11-2010)“…Zusammenfassung Nachdem Sicherheitslücken im veralteten DECT-Standards bereits auf dem CCC-Kongress im Dezember 2008 erkennbar wurden, präsentierten die…”
Get full text
Magazine Article