Search Results - "Tews, Erik"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Efficiently Outsourcing Multiparty Computation Under Multiple Keys by Peter, Andreas, Tews, Erik, Katzenbeisser, Stefan

    “…Secure multiparty computation enables a set of users to evaluate certain functionalities on their respective inputs while keeping these inputs encrypted…”
    Get full text
    Journal Article
  2. 2

    On the Privacy and Performance of Mobile Anonymous Microblogging by Senftleben, Marius, Barroso, Ana, Bucicoiu, Mihai, Hollick, Matthias, Katzenbeisser, Stefan, Tews, Erik

    “…Microblogging is a popular form of online social networking activity. It allows users to send messages in a one-to-many publish-subscribe manner. Most current…”
    Get full text
    Journal Article
  3. 3

    Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss by Meurs, Tom, Junger, Marianne, Tews, Erik, Abhishta, Abhishta

    “…In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery…”
    Get full text
    Conference Proceeding
  4. 4

    Ransomware Economics: A Two-Step Approach To Model Ransom Paid by Meurs, Tom, Cartwright, Edward, Cartwright, Anna, Junger, Marianne, Hoheisel, Raphael, Tews, Erik, Abhishta, Abhishta

    “…Ransomware poses a significant and pressing challenge in today's society. Mitigation efforts aim to reduce the profitability of ransomware attacks…”
    Get full text
    Conference Proceeding
  5. 5

    A privacy protection system for HbbTV in Smart TVs by Ghiglieri, Marco, Tews, Erik

    “…The popularity of smart entertainment devices is growing every day. Products like blu-ray players, set-top boxes and Smart TVs (STV) with high connectivity are…”
    Get full text
    Conference Proceeding
  6. 6

    Lost and Found: Stopping Bluetooth Finders from Leaking Private Information by Weller, Mira, Classen, Jiska, Ullrich, Fabian, Waßmann, Denis, Tews, Erik

    Published 17-05-2020
    “…A Bluetooth finder is a small battery-powered device that can be attached to important items such as bags, keychains, or bikes. The finder maintains a…”
    Get full text
    Journal Article
  7. 7
  8. 8

    An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario by Molter, H.G., Ogata, K., Tews, E., Weinmann, R.-P.

    “…We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force…”
    Get full text
    Conference Proceeding
  9. 9

    Describing Data Format Exploits Using Bitstream Segment Graphs by Hartle, M., Schumann, D., Botchak, A., Tews, E., Muhlhauser, M.

    “…Exploits based on data processing bugs are delivered through crafted data that seems to follow a data format, yet is altered in some way to trigger a specific…”
    Get full text
    Conference Proceeding
  10. 10

    Kann man mit DECT noch vertraulich telefonieren? by Nohl, Karsten, Tews, Erik

    Published in Datenschutz und Datensicherheit (01-11-2010)
    “…Zusammenfassung Nachdem Sicherheitslücken im veralteten DECT-Standards bereits auf dem CCC-Kongress im Dezember 2008 erkennbar wurden, präsentierten die…”
    Get full text
    Magazine Article