Search dblp for Publications

export results for "stream:conf/sicherheit:"

 download as .bib file

@inproceedings{DBLP:conf/sicherheit/BelzSM24,
  author       = {Ann{-}Marie Belz and
                  Julian Suleder and
                  Andreas Mayer},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Sicherheit von Lernmanagement-Systemen an terti{\"{a}}ren Bildungseinrichtungen
                  in der DACH-Region},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {173--187},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_011},
  doi          = {10.18420/SICHERHEIT2024\_011},
  timestamp    = {Mon, 14 Oct 2024 17:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BelzSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Dessani24,
  author       = {Leo Dessani},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {A Privacy-Preserving Architecture for Collaborative Botnet Detection},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {289--294},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_022},
  doi          = {10.18420/SICHERHEIT2024\_022},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Dessani24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DittmannKKAVWWN24,
  author       = {Jana Dittmann and
                  Christian Kr{\"{a}}tzer and
                  Stefan Kiltz and
                  Robert Altschaffel and
                  Claus Vielhauer and
                  Steffen Wendzel and
                  Sandro Wefel and
                  Holger Nitsch},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Attribution von verdeckten (Informations-)Kan{\"{a}}len im Bereich
                  kritischer Infrastrukturen und Potentiale f{\"{u}}r Pr{\"{a}}vention
                  und Reaktion {(ATTRIBUT)}},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {265--269},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_018},
  doi          = {10.18420/SICHERHEIT2024\_018},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DittmannKKAVWWN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DrexelHV24,
  author       = {Joshua Drexel and
                  Esther H{\"{a}}nggi and
                  Iy{\'{a}}n M{\'{e}}ndez Veiga},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Reproducible Builds and Insights from an Independent Verifier for
                  Arch Linux},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {243--257},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_016},
  doi          = {10.18420/SICHERHEIT2024\_016},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DrexelHV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EckhardtFH0P24,
  author       = {Dennis Eckhardt and
                  Felix C. Freiling and
                  Dominik Herrmann and
                  Stefan Katzenbeisser and
                  Henrich C. P{\"{o}}hls},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen
                  Forschungsfeldes f{\"{u}}r die L{\"{o}}sung allt{\"{a}}glicher
                  Sicherheitsprobleme},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {107--118},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_007},
  doi          = {10.18420/SICHERHEIT2024\_007},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EckhardtFH0P24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FlorisASR24,
  author       = {Alice Floris and
                  Stefanie Astfalk and
                  Rachelle Sellung and
                  Heiko Ro{\ss}nagel},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Tracking or being tracked: How much do self-trackers care about their
                  data's privacy?},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {121--136},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_008},
  doi          = {10.18420/SICHERHEIT2024\_008},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FlorisASR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GordejevaMP24,
  author       = {Jelizaveta Gordejeva and
                  Andreas Mayer and
                  Monika Pobiruchin},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Self-Tracking {\&} Running a Marathon: Is your Privacy in Danger?},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {137--152},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_009},
  doi          = {10.18420/SICHERHEIT2024\_009},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GordejevaMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HeinemannM24,
  author       = {Markus Heinemann and
                  Christian Mayerl},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Chancen zur Effizienzsteigerung bei der Umsetzung einer Regulatorik-konformen
                  Zugriffskontrolle},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {269--272},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_019},
  doi          = {10.18420/SICHERHEIT2024\_019},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HeinemannM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HengSA24,
  author       = {Youzhe Heng and
                  Rainer Schnell and
                  Frederik Armknecht},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Cryptanalysis of the Record Linkage Protocol used by German Cancer
                  Registries},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {65--74},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_004},
  doi          = {10.18420/SICHERHEIT2024\_004},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HengSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Henrich24,
  author       = {Johanna Henrich},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Ways for confidential and authenticated hop-by-hop key establishment
                  in {QKDN}},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {301--306},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_024},
  doi          = {10.18420/SICHERHEIT2024\_024},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Henrich24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HornemannPUG24,
  author       = {Jan H{\"{o}}rnemann and
                  Norbert Pohlmann and
                  Tobias Urban and
                  Matteo Gro{\ss}e{-}Kampmann},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Sharing is Caring: Towards Analyzing Attack Surfaces on Shared Hosting
                  Providers},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {217--229},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_014},
  doi          = {10.18420/SICHERHEIT2024\_014},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HornemannPUG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KirschH24,
  author       = {Andreas Kirsch and
                  Dominik Herrmann},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Reliable and secure on-premise e-assessment with psi-exam},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {189--202},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_012},
  doi          = {10.18420/SICHERHEIT2024\_012},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KirschH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Lenz24,
  author       = {Julia Lenz},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Warum Nutzer ihre alternden smarten Ger{\"{a}}te ersetzen: Eine
                  Push-Pull-Mooring Perspektive},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {295--300},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_023},
  doi          = {10.18420/SICHERHEIT2024\_023},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Lenz24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Ottenhues24,
  author       = {Johannes Ottenhues},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {An overview of symmetric fuzzy {PAKE} protocols},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {75--89},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_005},
  doi          = {10.18420/SICHERHEIT2024\_005},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Ottenhues24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PohlOB024,
  author       = {Timo Pohl and
                  Marc Ohm and
                  Felix Boes and
                  Michael Meier},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {You Can Run But You Can't Hide: Runtime Protection Against Malicious
                  Package Updates For Node.js},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {231--241},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_015},
  doi          = {10.18420/SICHERHEIT2024\_015},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PohlOB024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RehbohmS24,
  author       = {Thomas Rehbohm and
                  Kurt Sandkuhl},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Cybersicherheitsevaluation einer Referenzarchitektur f{\"{u}}r
                  Land, Kommune und systemrelevante Infrastruktur},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {19--32},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_001},
  doi          = {10.18420/SICHERHEIT2024\_001},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RehbohmS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SaatjohannIS24,
  author       = {Christoph Saatjohann and
                  Fabian Ising and
                  Sebastian Schinzel},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {{KIM:} Kaos In der Medizin},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {93--104},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_006},
  doi          = {10.18420/SICHERHEIT2024\_006},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SaatjohannIS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schafer0A24,
  author       = {Jochen Sch{\"{a}}fer and
                  Christian M{\"{u}}ller and
                  Frederik Armknecht},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {0 Sterne f{\"{u}}r die Sicherheit: Wie Kundenbewertungen die
                  Bitcoin-Adressen von Darknet-H{\"{a}}ndlern verraten},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {153--170},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_010},
  doi          = {10.18420/SICHERHEIT2024\_010},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schafer0A24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchmittHHAW24,
  author       = {Nicolai Schmitt and
                  Johanna Henrich and
                  Dominik Heinz and
                  Nouri Alnahawi and
                  Alexander Wiesmaier},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {On Criteria and Tooling for Cryptographic Inventories},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {49--63},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_003},
  doi          = {10.18420/SICHERHEIT2024\_003},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchmittHHAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchwarzBDFPWW24,
  author       = {Linda Schwarz and
                  Nikolas Becker and
                  Marius Dechand and
                  Hannes Federrath and
                  Tom Petersen and
                  Jasmin Wagner and
                  Friederike Wenderoth},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Sieben Handlungsfelder f{\"{u}}r mehr Cybersicherheit in der
                  Stromwirtschaft},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {261--264},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_017},
  doi          = {10.18420/SICHERHEIT2024\_017},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchwarzBDFPWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SwierzyHBBHSS024,
  author       = {Ben Swierzy and
                  Melina Hoffmann and
                  Felix Boes and
                  Felix Betke and
                  Lennart Hein and
                  Maxim Shevchishin and
                  Jan{-}Niklas Sohn and
                  Michael Meier},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {{TEEM:} {A} {CPU} Emulator for Teaching Transient Execution Attacks},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {203--214},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_013},
  doi          = {10.18420/SICHERHEIT2024\_013},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SwierzyHBBHSS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Tippe24,
  author       = {Pascal Tippe},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {A Study of Deanonymization Attacks of Onion Services},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {281--287},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_021},
  doi          = {10.18420/SICHERHEIT2024\_021},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Tippe24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Walter024,
  author       = {Markus Walter and
                  J{\"{o}}rg Keller},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {5G UnCovert: Hiding Information in 5G New Radio},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {33--46},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_002},
  doi          = {10.18420/SICHERHEIT2024\_002},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Walter024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Wohnert24,
  author       = {Kai Hendrik W{\"{o}}hnert},
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Distributed Machine Learning Based Intrusion Detection System for
                  Smart Grid},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  pages        = {275--279},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://doi.org/10.18420/sicherheit2024\_020},
  doi          = {10.18420/SICHERHEIT2024\_020},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Wohnert24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2024,
  editor       = {Steffen Wendzel and
                  Christian Wressnegger and
                  Laura Hartmann and
                  Felix C. Freiling and
                  Frederik Armknecht and
                  Lena Reinfelder},
  title        = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  12. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2024, Worms, Germany, April 9-11,
                  2024},
  series       = {{LNI}},
  volume       = {{P-345}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2024},
  url          = {https://dl.gi.de/handle/20.500.12116/43948},
  isbn         = {978-3-88579-739-5},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BeckertBGKKKMMN22,
  author       = {Bernhard Beckert and
                  Jurlind Budurushi and
                  Armin Grunwald and
                  Robert Krimmer and
                  Oksana Kulyk and
                  Ralf K{\"{u}}sters and
                  Andreas Mayer and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Stephan Neumann and
                  Melanie Volkamer},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Recent Developments in the Context of Online Elections and Digital
                  Polls in Germany},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {213--217},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_16},
  doi          = {10.18420/SICHERHEIT2022\_16},
  timestamp    = {Mon, 14 Oct 2024 17:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BeckertBGKKKMMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BreigW22,
  author       = {Jan Breig and
                  Dirk Westhoff},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Short Paper: Debating Ethics with Cybersecurity Students},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {183--192},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_12},
  doi          = {10.18420/SICHERHEIT2022\_12},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BreigW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BurkertBF22,
  author       = {Christian Burkert and
                  Jonathan Balack and
                  Hannes Federrath},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {PrivacyDates: {A} Framework for More Privacy-Preserving Timestamp
                  Data Types},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {101--112},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_06},
  doi          = {10.18420/SICHERHEIT2022\_06},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BurkertBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DemirTUP22,
  author       = {Nurullah Demir and
                  Daniel Theis and
                  Tobias Urban and
                  Norbert Pohlmann},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Towards Understanding First-Party Cookie Tracking in the Field},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {19--34},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_01},
  doi          = {10.18420/SICHERHEIT2022\_01},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DemirTUP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DoernerMM22,
  author       = {Dominik Doerner and
                  Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Hardening the Security of Server-Aided {MPC} Using Remotely Unhackable
                  Hardware Modules},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {83--99},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_05},
  doi          = {10.18420/SICHERHEIT2022\_05},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DoernerMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Fraune22,
  author       = {Bastian Fraune},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Automated Monitoring of Operational Technology Security and Compliance
                  for Power Grids},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {231--236},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_19},
  doi          = {10.18420/SICHERHEIT2022\_19},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Fraune22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GarskeN22,
  author       = {Viktor Garske and
                  Andreas Noack},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Recovering information from pixelized credentials},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {129--141},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_08},
  doi          = {10.18420/SICHERHEIT2022\_08},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GarskeN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GruberF22,
  author       = {Jan Gruber and
                  Felix C. Freiling},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Fighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing
                  a VMI-Based Human Interaction Simulator},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {49--64},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_03},
  doi          = {10.18420/SICHERHEIT2022\_03},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GruberF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GruberHGUP22,
  author       = {Moritz Gruber and
                  Christian H{\"{o}}fig and
                  Matteo Gro{\ss}e{-}Kampmann and
                  Tobias Urban and
                  Norbert Pohlmann},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Short Paper: Business Chat ist verwirrt. Es hat sich vor Verwirrung
                  selbst verletzt!},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {193--202},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_13},
  doi          = {10.18420/SICHERHEIT2022\_13},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GruberHGUP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Gudemann22,
  author       = {Matthias G{\"{u}}demann},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {SMT-Based Verification of Concurrent Critical System},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {67--82},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_04},
  doi          = {10.18420/SICHERHEIT2022\_04},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Gudemann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Hennig22,
  author       = {Anne Hennig},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Your website has been hijacked: Raising awareness for an invisible
                  problem},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {225--230},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_18},
  doi          = {10.18420/SICHERHEIT2022\_18},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Hennig22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Heseding22,
  author       = {Hauke Heseding},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Reinforcement Learning-Controlled Mitigation of Volumetric DDoS Attacks},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {237--242},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_20},
  doi          = {10.18420/SICHERHEIT2022\_20},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Heseding22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Hinrichs22,
  author       = {Torge Hinrichs},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Ongoing Automated Data Set Generation for Vulnerability Prediction
                  from Github Data},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {219--222},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_17},
  doi          = {10.18420/SICHERHEIT2022\_17},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Hinrichs22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/JacobBH22,
  author       = {Florian Jacob and
                  Saskia Bayreuther and
                  Hannes Hartenstein},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {On CRDTs in Byzantine Environments},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {113--126},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_07},
  doi          = {10.18420/SICHERHEIT2022\_07},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/JacobBH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LochmannS22,
  author       = {Fabian Lochmann and
                  Sebastian Schmerl},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Cyber-Defense "Gemessen, Bewertet und Ausgerichtet" - Ein Praxisbericht},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {205--208},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_14},
  doi          = {10.18420/SICHERHEIT2022\_14},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LochmannS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MayerW022,
  author       = {Nico Mayer and
                  Steffen Wendzel and
                  J{\"{o}}rg Keller},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Short Paper: Untersuchung des Gender-gaps bei Cybersecurity-Publikationen},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {173--182},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_11},
  doi          = {10.18420/SICHERHEIT2022\_11},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MayerW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Moller22,
  author       = {Jonas M{\"{o}}ller},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Differential Testing: How to find differences between programs that
                  mostly behave identically?},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {243--248},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_21},
  doi          = {10.18420/SICHERHEIT2022\_21},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Moller22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerRWWH22,
  author       = {Robin M{\"{u}}ller and
                  Julius Ruppert and
                  Katharina Will and
                  Lukas W{\"{u}}steney and
                  Tobias Heer},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Analyzing the Software Patch Discipline Across Different Industries
                  and Countries},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {159--170},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_10},
  doi          = {10.18420/SICHERHEIT2022\_10},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerRWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SaatjohannIGNSK22,
  author       = {Christoph Saatjohann and
                  Fabian Ising and
                  Matthias Gierlings and
                  Dominik Noss and
                  Sascha Schimmler and
                  Alexander Klemm and
                  Leif Grundmann and
                  Tilman Frosch and
                  Sebastian Schinzel},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Sicherheit medizintechnischer Protokolle im Krankenhaus},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {143--158},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_09},
  doi          = {10.18420/SICHERHEIT2022\_09},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SaatjohannIGNSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StrotmannKRBK22,
  author       = {Carsten Strotmann and
                  Patrick Ben Koetter and
                  Roland van Rijswijk{-}Deij and
                  Markus de Br{\"{u}}n and
                  Anders K{\"{o}}lligan},
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Studie {\"{u}}ber das Gefahrenpotential und Gegenma{\ss}nahmen
                  zu Angriffen auf das {DNS} Protokoll durch IP-Fragmentierung},
  booktitle    = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  pages        = {209--212},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://doi.org/10.18420/sicherheit2022\_15},
  doi          = {10.18420/SICHERHEIT2022\_15},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StrotmannKRBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2022,
  editor       = {Christian Wressnegger and
                  Delphine Reinhardt and
                  Thomas Barber and
                  Bernhard C. Witt and
                  Daniel Arp and
                  Zolt{\'{a}}n {\'{A}}d{\'{a}}m Mann},
  title        = {Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit: Konferenzband der
                  11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r
                  Informatik e.V. (GI), Sicherheit 2022, Karlsruhe, Germany, April 5-8,
                  2022},
  series       = {{LNI}},
  volume       = {{P-323}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://dl.gi.de/handle/20.500.12116/40129},
  isbn         = {978-3-88579-717-3},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Greven20,
  author       = {Frauke Greven},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Informationssicherheit f{\"{u}}r KRITIS-Betreiber: Kritische
                  Dienstleistungen systematisch sch{\"{u}}tzen},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {117--120},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_09},
  doi          = {10.18420/SICHERHEIT2020\_09},
  timestamp    = {Mon, 14 Oct 2024 17:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Greven20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HofmeierL20,
  author       = {Manfred Hofmeier and
                  Ulrike Lechner},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Schwachstellen und Angriffsketten in der Wertsch{\"{o}}pfungskette
                  der Fleischproduktion},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {67--77},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_05},
  doi          = {10.18420/SICHERHEIT2020\_05},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HofmeierL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kneib20,
  author       = {Marcel Kneib},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {A Survey on Sender Identification Methodologies for the Controller
                  Area Network},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {91--103},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_07},
  doi          = {10.18420/SICHERHEIT2020\_07},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kneib20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LukasederHK20,
  author       = {Thomas Lukaseder and
                  Maya Halter and
                  Frank Kargl},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Context-based Access Control and Trust Scores in Zero Trust Campus
                  Networks},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {53--66},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_04},
  doi          = {10.18420/SICHERHEIT2020\_04},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LukasederHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Marx20,
  author       = {Matthias Marx},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Abusers don't get Privacy. Sensitively Logging and Blocking Tor Abuse},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {153--158},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_16},
  doi          = {10.18420/SICHERHEIT2020\_16},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Marx20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Mitseva0020,
  author       = {Asya Mitseva and
                  Thomas Engel and
                  Andriy Panchenko},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Analyzing PeerFlow - {A} Bandwidth Estimation System for Untrustworthy
                  Environments},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {29--40},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_02},
  doi          = {10.18420/SICHERHEIT2020\_02},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Mitseva0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MomenF20,
  author       = {Nurul Momen and
                  Lothar Fritsch},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {App-generated digital identities extracted through Android permission-based
                  data access - a survey of app privacy},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {15--28},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_01},
  doi          = {10.18420/SICHERHEIT2020\_01},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MomenF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerMF20,
  author       = {Nico M{\"{u}}ller and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Urheberrecht ./. Sicherheitsanalyse},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {105--115},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_08},
  doi          = {10.18420/SICHERHEIT2020\_08},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Petersen20,
  author       = {Tom Petersen},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Datenschutzgerechte und mehrseitig sichere IT-Plattformen f{\"{u}}r
                  die medizinische Forschung},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {135--140},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_13},
  doi          = {10.18420/SICHERHEIT2020\_13},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Petersen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Richter20,
  author       = {Alexander Richter},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Do Privacy Concerns Prevent Employees' Acceptance of Smart Wearables
                  and Collaborative Robots?},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {141--146},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_14},
  doi          = {10.18420/SICHERHEIT2020\_14},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Richter20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schaad20,
  author       = {Andreas Schaad},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Project {OVVL} - Threat Modeling Support for the entire secure development
                  lifecycle},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {121--124},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_10},
  doi          = {10.18420/SICHERHEIT2020\_10},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schaad20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Stubs20,
  author       = {Marius St{\"{u}}bs},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Hierarchical Distributed Consensus for Smart Grids},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {147--152},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_15},
  doi          = {10.18420/SICHERHEIT2020\_15},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Stubs20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WaltherKS20,
  author       = {Paul Walther and
                  Robert Knauer and
                  Thorsten Strufe},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Passive Angriffe auf kanalbasierten Schl{\"{u}}sselaustausch},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {41--51},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_03},
  doi          = {10.18420/SICHERHEIT2020\_03},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WaltherKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Wiefling20,
  author       = {Stephan Wiefling},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Usability, Sicherheit und Privatsph{\"{a}}re von risikobasierter
                  Authentifizierung},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {129--134},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_12},
  doi          = {10.18420/SICHERHEIT2020\_12},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Wiefling20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/X20,
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Sicherheit 2020 - Komplettband},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://dl.gi.de/handle/20.500.12116/31786},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZibuschkaZ20,
  author       = {Jan Zibuschka and
                  Christian Zimmermann},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Lean Privacy by Design},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {125--128},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_11},
  doi          = {10.18420/SICHERHEIT2020\_11},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZibuschkaZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZimmermannBA20,
  author       = {Till Zimmermann and
                  Jan Bauer and
                  Nils Aschenbruck},
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {CryptoCAN - Ensuring Confidentiality in Controller Area Networks for
                  Agriculture},
  booktitle    = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  pages        = {79--90},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://doi.org/10.18420/sicherheit2020\_06},
  doi          = {10.18420/SICHERHEIT2020\_06},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZimmermannBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2020,
  editor       = {Delphine Reinhardt and
                  Hanno Langweg and
                  Bernhard C. Witt and
                  Mathias Fischer},
  title        = {Sicherheit 2020, Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Konferenzband der 10. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 17.-20. M{\"{a}}rz
                  2020, G{\"{o}}ttingen},
  series       = {{LNI}},
  volume       = {{P-301}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2020},
  url          = {https://dl.gi.de/handle/20.500.12116/31777},
  isbn         = {978-3-88579-695-4},
  timestamp    = {Mon, 14 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/0001TBGLR18,
  author       = {Sebastian Pape and
                  Daniel Tasche and
                  Iulia Bastys and
                  Akos Grosz and
                  J{\"{o}}rg L{\"{a}}ssig and
                  Kai Rannenberg},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy
                  by Design to Online Shopping},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {17--28},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_01},
  doi          = {10.18420/SICHERHEIT2018\_01},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/0001TBGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Bock18,
  author       = {Sven Bock},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {My Data is Mine - Users' Handling of Personal Data in Everyday Life},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {261--266},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_22},
  doi          = {10.18420/SICHERHEIT2018\_22},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Bock18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BuchmannHB18,
  author       = {Erik Buchmann and
                  Andreas Hartmann and
                  Stephanie Bauer},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Informationssicherheitskonzept nach IT-Grundschutz f{\"{u}}r
                  Containervirtualisierung in der Cloud},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {235--248},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_18},
  doi          = {10.18420/SICHERHEIT2018\_18},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BuchmannHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ChilleMM18,
  author       = {Vanessa Chille and
                  Sybille Mund and
                  Andreas M{\"{o}}ller},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Harmonizing physical and {IT} security levels for critical infrastructures},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {133--143},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_10},
  doi          = {10.18420/SICHERHEIT2018\_10},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ChilleMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GeigerKM18,
  author       = {Robert Geiger and
                  Sabrina Krausz and
                  Holger Mettler},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Ein integriertes Vorgehensmodell zur Planung und Umsetzung eines {ISMS}
                  am Beispiel der Pharmaproduktion},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {249--252},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_19},
  doi          = {10.18420/SICHERHEIT2018\_19},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GeigerKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Gorski18,
  author       = {Peter Leo Gorski},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Usability von Security-APIs f{\"{u}}r massiv-skalierbare vernetzte
                  Service-orientierte Systeme},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {285--290},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_26},
  doi          = {10.18420/SICHERHEIT2018\_26},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Gorski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HarborthBG0R18,
  author       = {David Harborth and
                  Maren Braun and
                  Akos Grosz and
                  Sebastian Pape and
                  Kai Rannenberg},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Anreize und Hemmnisse f{\"{u}}r die Implementierung von Privacy-Enhancing
                  Technologies im Unternehmenskontext},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {29--41},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_02},
  doi          = {10.18420/SICHERHEIT2018\_02},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HarborthBG0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Hartmann18,
  author       = {Lukas Hartmann},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Bounded Privacy: Formalising the Trade-Off Between Privacy and Quality
                  of Service},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {267--272},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_23},
  doi          = {10.18420/SICHERHEIT2018\_23},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Hartmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HaupertP18,
  author       = {Vincent Haupert and
                  Gaston Pugliese},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Ich sehe was, das du nicht siehst - Die Realit{\"{a}}t von Mobilebanking
                  zwischen allgemeinen und rechtlichen Anforderungen},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {171--182},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_13},
  doi          = {10.18420/SICHERHEIT2018\_13},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HaupertP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KohlerPB18,
  author       = {Olaf Markus K{\"{o}}hler and
                  Cecilia Pasquini and
                  Rainer B{\"{o}}hme},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Verbesserung der Syndrome-Trellis-Kodierung zur Erh{\"{o}}hung
                  der Unvorhersagbarkeit von Einbettpositionen in steganographischen
                  Systemen},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {83--94},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_06},
  doi          = {10.18420/SICHERHEIT2018\_06},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KohlerPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KurowskiFR18,
  author       = {Sebastian Kurowski and
                  Nicolas F{\"{a}}hnrich and
                  Heiko Ro{\ss}nagel},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {On the possible impact of security technology design on policy adherent
                  user behavior - Results from a controlled empirical experiment},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {145--158},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_11},
  doi          = {10.18420/SICHERHEIT2018\_11},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KurowskiFR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MalderleWK018,
  author       = {Timo Malderle and
                  Matthias W{\"{u}}bbeling and
                  Sven Knauer and
                  Michael Meier},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Ein Werkzeug zur automatisierten Analyse von Identit{\"{a}}tsdaten-Leaks},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {43--54},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_03},
  doi          = {10.18420/SICHERHEIT2018\_03},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MalderleWK018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MarkyKV18,
  author       = {Karola Marky and
                  Oksana Kulyk and
                  Melanie Volkamer},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Comparative Usability Evaluation of Cast-as-Intended Verification
                  Approaches in Internet Voting},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {197--208},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_15},
  doi          = {10.18420/SICHERHEIT2018\_15},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MarkyKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MarxZMBF18,
  author       = {Matthias Marx and
                  Ephraim Zimmer and
                  Tobias Mueller and
                  Maximilian Blochberger and
                  Hannes Federrath},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Hashing of personally identifiable information is not sufficient},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {55--68},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_04},
  doi          = {10.18420/SICHERHEIT2018\_04},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MarxZMBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MengesBVPTRL18,
  author       = {Florian Menges and
                  Fabian B{\"{o}}hm and
                  Manfred Vielberth and
                  Alexander Puchta and
                  Benjamin Taubmann and
                  No{\"{e}}lle Rakotondravony and
                  Tobias Latzo},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Introducing DINGfest: An architecture for next generation {SIEM} systems},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {257--260},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_21},
  doi          = {10.18420/SICHERHEIT2018\_21},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MengesBVPTRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Momen18,
  author       = {Nurul Momen},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Turning the Table Around: Monitoring App Behavior},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {279--284},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_25},
  doi          = {10.18420/SICHERHEIT2018\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Momen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Reuben18,
  author       = {Jenni Reuben},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Towards a Differential Privacy Theory for Edge-Labeled Directed Graphs},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {273--278},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_24},
  doi          = {10.18420/SICHERHEIT2018\_24},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Reuben18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Ropke18,
  author       = {Christian R{\"{o}}pke},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {{SDN} Ro2tkits: {A} Case Study of Subverting {A} Closed Source {SDN}
                  Controller},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {95--106},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_07},
  doi          = {10.18420/SICHERHEIT2018\_07},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Ropke18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchuckertHKL18,
  author       = {Felix Schuckert and
                  Max Hildner and
                  Basel Katt and
                  Hanno Langweg},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Source Code Patterns of Buffer Overflow Vulnerabilities in Firefox},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {107--118},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_08},
  doi          = {10.18420/SICHERHEIT2018\_08},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchuckertHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SeuffertSR18,
  author       = {Julian Seuffert and
                  Marc Stamminger and
                  Christian Riess},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Towards Forensic Exploitation of 3-D Lighting Environments in Practice},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {159--169},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_12},
  doi          = {10.18420/SICHERHEIT2018\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SeuffertSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Spath18,
  author       = {Christopher Sp{\"{a}}th},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Is MathML dangerous?},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {119--132},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_09},
  doi          = {10.18420/SICHERHEIT2018\_09},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Spath18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ThaeterR18,
  author       = {Florian Thaeter and
                  R{\"{u}}diger Reischuk},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Improving Anonymization Clustering},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {69--82},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_05},
  doi          = {10.18420/SICHERHEIT2018\_05},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ThaeterR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TraderZH18,
  author       = {Daniel Tr{\"{a}}der and
                  Alexander Zeier and
                  Andreas Heinemann},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Auf dem Weg zu sicheren abgeleiteten Identit{\"{a}}ten mit Payment
                  Service Directive 2},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {183--196},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_14},
  doi          = {10.18420/SICHERHEIT2018\_14},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TraderZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/UblerGM18,
  author       = {David {\"{U}}bler and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Secure Remote Computation using Intel {SGX}},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {209--219},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_16},
  doi          = {10.18420/SICHERHEIT2018\_16},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/UblerGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Ullrich18,
  author       = {Steffen Ullrich},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Fallstricke bei der Inhaltsanalyse von Mails: Beispiele, Ursachen
                  und L{\"{o}}sungsm{\"{o}}glichkeiten},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {253--256},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_20},
  doi          = {10.18420/SICHERHEIT2018\_20},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Ullrich18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WieseHWB18,
  author       = {Lena Wiese and
                  Daniel Homann and
                  Tim Waage and
                  Michael Brenner},
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Homomorphe Verschl{\"{u}}sselung f{\"{u}}r Cloud-Datenbanken:
                  {\"{U}}bersicht und Anforderungsanalyse},
  booktitle    = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  pages        = {221--234},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://doi.org/10.18420/sicherheit2018\_17},
  doi          = {10.18420/SICHERHEIT2018\_17},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WieseHWB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2018,
  editor       = {Hanno Langweg and
                  Michael Meier and
                  Bernhard C. Witt and
                  Delphine Reinhardt},
  title        = {Sicherheit 2018, Beitr{\"{a}}ge der 9. Jahrestagung des Fachbereichs
                  Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 25.-27.4.2018,
                  Konstanz},
  series       = {{LNI}},
  volume       = {{P-281}},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2018},
  url          = {https://dl.gi.de/handle/20.500.12116/20074},
  isbn         = {978-3-88579-675-6},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AstrakhantcevaK16,
  author       = {Mariia Astrakhantceva and
                  G{\"{u}}nter Karjoth and
                  Bettina H{\"{u}}bscher},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Die Bordkarte als Authentifikationsmittel bei Flugreisen},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {113--124},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/860},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AstrakhantcevaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Beterke16,
  author       = {Fabian Beterke},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Distributed evolutionary fuzzing with Evofuzz},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {23--32},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/878},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Beterke16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Braband16,
  author       = {Jens Braband},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Why 2 times 2 ain't neccessarily 4 - at least not in {IT} security
                  risk assessment},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {1--10},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/858},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Braband16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ButtMKB16,
  author       = {Moazzam Butt and
                  Johannes Merkle and
                  Ulrike Korte and
                  Christoph Busch},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Correlation-resistant fuzzy vault for fingerprints},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {125--136},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/861},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ButtMKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/CorbettSKP16,
  author       = {Christopher Corbett and
                  Elmar Schoch and
                  Frank Kargl and
                  Felix Preussner},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Automotive Ethernet: security opportunity or challenge?},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {45--54},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/880},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/CorbettSKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GlanzerKK16,
  author       = {Harald Glanzer and
                  Lukas Krammer and
                  Wolfgang Kastner},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Increasing security and availability in {KNX} networks},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {241--252},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/875},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GlanzerKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrafHMS16,
  author       = {Juergen Graf and
                  Martin Hecker and
                  Martin Mohr and
                  Gregor Snelting},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Sicherheitsanalyse mit {JOANA}},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {11--22},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/869},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrafHMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HahnPM16,
  author       = {Sebastian Hahn and
                  Mykola Protsenko and
                  Tilo M{\"{u}}ller},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Comparative evaluation of machine learning-based malware detection
                  on Android},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {79--88},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/883},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HahnPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HaupertM16,
  author       = {Vincent Haupert and
                  Tilo M{\"{u}}ller},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Auf dem Weg verTAN: {\"{U}}ber die Sicherheit App-basierter TAN-Verfahren},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {101--112},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/859},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HaupertM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HerrmannL16,
  author       = {Dominik Herrmann and
                  Jens Lindemann},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Obtaining personal data and asking for erasure: do app vendors and
                  website owners honour your privacy rights?},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {149--160},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/863},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HerrmannL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Hertle16,
  author       = {Florian Hertle},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Lessons learned bei KMUs aus dem Befall durch Ransomware},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {171--176},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/865},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Hertle16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Jasser16,
  author       = {Stefanie Jasser},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Sicherheit im Softwareentwurf - Integrierte Modellierung von Security
                  und Softwarearchitektur},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {185--190},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/867},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Jasser16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kasem-Madani16,
  author       = {Saffija Kasem{-}Madani},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {A framework for encrypted computation on shared data},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {191--196},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/868},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kasem-Madani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KrombholzJGW16,
  author       = {Katharina Krombholz and
                  Aljosha Judmayer and
                  Matthias Gusenbauer and
                  Edgar R. Weippl},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {F{\"{u}}r bare M{\"{u}}nze? NutzerInnenerfahrungen mit Sicherheit
                  und Datenschutz bei Bitcoin},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {137--148},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/862},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KrombholzJGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MerkelKHKKD16,
  author       = {Ronny Merkel and
                  Christian Kraetzer and
                  Mario Hildebrandt and
                  Stefan Kiltz and
                  Sven Kuhlmann and
                  Jana Dittmann},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {A semantic framework for a better understanding, investigation and
                  prevention of organized financial crime},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {55--66},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/881},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MerkelKHKKD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerABM16,
  author       = {Christian M{\"{u}}ller and
                  Frederik Armknecht and
                  Zinaida Benenson and
                  Philipp Morgner},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {On the security of the ZigBee Light Link touchlink commissioning procedure},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {229--240},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/874},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PrausKP16,
  author       = {Friedrich Praus and
                  Wolfgang Kastner and
                  Peter Palensky},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Software security requirements in building automation},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {217--228},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/873},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PrausKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RastBK16,
  author       = {Severin Rast and
                  Timo Brecher and
                  Sabine Kammerhofer},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {IT-Grundschutz in gro{\ss}en Institutionen - Herausforderungen und
                  L{\"{o}}sungsstrategien},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {161--170},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/864},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RastBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Renners16,
  author       = {Leonard Renners},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Towards adaptive event prioritization for network security - ideas
                  and challenges},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {197--202},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/870},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Renners16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Rieck16,
  author       = {Jakob Rieck},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Attacks on fitness trackers revisited: a case-study of unfit firmware
                  security},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {33--44},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/879},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Rieck16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Ropke16,
  author       = {Christian R{\"{o}}pke},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {{SDN} malware: problems of current protection systems and potential
                  countermeasures},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {89--100},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/884},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Ropke16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schuckert16,
  author       = {Felix Schuckert},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Generating security vulnerabilities in source code},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {177--184},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/866},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schuckert16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchurmannW16,
  author       = {Dominik Sch{\"{u}}rmann and
                  Lars C. Wolf},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Surreptitious sharing on Android},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {67--78},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/882},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchurmannW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TonejcKK16,
  author       = {Jernej Tonejc and
                  Jaspreet Kaur and
                  Alexandra Kobekova},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Detecting anomalies in BACnet network data},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {253--264},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/876},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TonejcKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Valipour16,
  author       = {Siavash Valipour},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Designing resilient and secure smart micro grids},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {203--208},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/871},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Valipour16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Waage16,
  author       = {Tim Waage},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Order preserving encryption for wide column stores},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {209--216},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/872},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Waage16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2016,
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/20073},
  isbn         = {978-3-88579-650-3},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AccorsiHSZ14,
  author       = {Rafael Accorsi and
                  Julius Holderer and
                  Thomas Stocker and
                  Richard M. Zahoransky},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Security Workflow Analysis Toolkit},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {433--442},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20062},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AccorsiHSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AltiokUH14,
  author       = {Irfan Altiok and
                  Sebastian Uellenbeck and
                  Thorsten Holz},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {GraphNeighbors: Hampering Shoulder-Surfing Attacks on Smartphones},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {25--35},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20057},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AltiokUH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ArmknechtH014,
  author       = {Frederik Armknecht and
                  Matthias Hamann and
                  Matthias Krause},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Hardware Efficient Authentication based on Random Selection},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {169--185},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20041},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ArmknechtH014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BartschBBBHKMSV14,
  author       = {Steffen Bartsch and
                  Bernhard J. Berger and
                  Eric Bodden and
                  Achim D. Brucker and
                  Jens Heider and
                  Mehmet Kus and
                  S{\"{o}}nke Maseberg and
                  Karsten Sohr and
                  Melanie Volkamer},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Zertifizierte Datensicherheit f{\"{u}}r Android-Anwendungen auf
                  Basis statischer Programmanalysen},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {283--291},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20050},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BartschBBBHKMSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Boehmer14,
  author       = {Wolfgang Boehmer},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Bestimmung des technical-Value at Risk mittels der bedingten Wahrscheinlichkeit,
                  Angriffsb{\"{a}}umen und einer Risikofunktion},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {305--317},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20052},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Boehmer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrinnerR14,
  author       = {Andreas Brinner and
                  Ren{\'{e}} Rietz},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Verbesserung der Netzsicherheit in virtualisierten Umgebungen mit
                  Hilfe von OpenFlow},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {79--89},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20070},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrinnerR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrodowskiDFKR14,
  author       = {Dominik Brodowski and
                  Andreas Dewald and
                  Felix C. Freiling and
                  Steve Kov{\'{a}}cs and
                  Martin Rieger},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {391--405},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20059},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrodowskiDFKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BroxM14,
  author       = {Kirsten Brox and
                  Anastasia Meletiadou},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Security-Awareness-Programm unter Ber{\"{u}}cksichtigung viraler
                  Marketingmethoden},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {157--168},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20040},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BroxM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BruckerS14,
  author       = {Achim D. Brucker and
                  Uwe Sodan},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Deploying Static Application Security Testing on a Large Scale},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {91--101},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20071},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BruckerS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EkelhartGKSS14,
  author       = {Andreas Ekelhart and
                  Bernhard Grill and
                  Elmar Kiesling and
                  Christine Strau{\ss} and
                  Christian Stummer},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Komplexe Systeme, heterogene Angreifer und vielf{\"{a}}ltige
                  Abwehrmechanismen: Simulationsbasierte Entscheidungsunterst{\"{u}}tzung
                  im IT-Sicherheitsmanagement},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {345--361},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20055},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EkelhartGKSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Formann14,
  author       = {Johannes Formann},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {An efficient approach to tolerate attackers in fault-tolerant systems},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {419--432},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20061},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Formann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FreckmannG14,
  author       = {Christian Freckmann and
                  Ulrich Greveler},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {IT-Sicherheitsaspekte industrieller Steuerungssysteme},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {149--156},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20039},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FreckmannG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FruhwirtKHSW14,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Christoph Hochreiner and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {InnoDB Datenbank Forensik Rekonstruktion von Abfragen {\"{u}}ber
                  Datenbank-interne Logfiles},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {363--374},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20056},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FruhwirtKHSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FussGKK14,
  author       = {J{\"{u}}rgen Fu{\ss} and
                  Bernhard Greslehner{-}Nimmervoll and
                  Wolfgang Kastl and
                  Robert Kolmhofer},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Effizienteres Bruteforcing auf einem heterogenen Cluster mit GPUs
                  und FPGAs},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {127--136},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20037},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FussGKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GasconUWR14,
  author       = {Hugo Gascon and
                  Sebastian Uellenbeck and
                  Christopher Wolf and
                  Konrad Rieck},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Continuous Authentication on Mobile Devices by Analysis of Typing
                  Motion Behavior},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {1--12},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20035},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GasconUWR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GenzelSHD14,
  author       = {Carl{-}Heinz Genzel and
                  Richard Sethmann and
                  Olav Hoffmann and
                  Kai{-}Oliver Detken},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Sicherheitskonzept zum Schutz der Gateway-Integrit{\"{a}}t in
                  Smart Grids},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {137--148},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20038},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GenzelSHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14,
  author       = {Patrick Grofig and
                  Martin H{\"{a}}rterich and
                  Isabelle Hang and
                  Florian Kerschbaum and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Experiences and observations on the industrial implementation of a
                  system to search over outsourced encrypted data},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {115--125},
  publisher    = {{GI}},
  year         = {2014},
  url          = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html},
  timestamp    = {Tue, 20 May 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HalvaniSN14,
  author       = {Oren Halvani and
                  Martin Steinebach and
                  Svenja Neitzel},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {L{\"{a}}sst sich der Schreibstil verf{\"{a}}lschen um die
                  eigene Anonymit{\"{a}}t in Textdokumenten zu sch{\"{u}}tzen?},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {229--241},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20045},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HalvaniSN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HanspachG14,
  author       = {Michael Hanspach and
                  Michael Goetz},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Recent Developments in Covert Acoustical Communications},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {243--254},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20047},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HanspachG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HerrmannFF14,
  author       = {Dominik Herrmann and
                  Karl{-}Peter Fuchs and
                  Hannes Federrath},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Fingerprinting Techniques for Target-oriented Investigations in Network
                  Forensics},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {375--390},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20058},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HerrmannFF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HintzEBF14,
  author       = {Nadina Hintz and
                  Markus Engelberth and
                  Zinaida Benenson and
                  Felix C. Freiling},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Phishing still works: Erfahrungen und Lehren aus der Durchf{\"{u}}hrung
                  von Phishing-Experimenten},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {37--51},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20067},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HintzEBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KalberDI14,
  author       = {Sven K{\"{a}}lber and
                  Andreas Dewald and
                  Steffen Idler},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {331--343},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20054},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KalberDI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KurtzTF14,
  author       = {Andreas Kurtz and
                  Markus Tro{\ss}bach and
                  Felix C. Freiling},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Snoop-it: Dynamische Analyse und Manipulation von Apple iOS Apps},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {13--23},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20046},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KurtzTF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LuhnBB14,
  author       = {Sebastian Luhn and
                  Ina Bruns and
                  Rainer B{\"{o}}hme},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Consumer Participation in Online Contracts - Exploring Cross-Out Clauses},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {255--270},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20048},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LuhnBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MayerMS14,
  author       = {Andreas Mayer and
                  Vladislav Mladenov and
                  J{\"{o}}rg Schwenk},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {On the Security of Holder-of-Key Single Sign-On},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {65--77},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20069},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MayerMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MeierP14,
  author       = {Stefan Meier and
                  G{\"{u}}nther Pernul},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Einsatz von digitaler Forensik in Unternehmen und Organisationen},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {103--114},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20072},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MeierP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RassS14,
  author       = {Stefan Rass and
                  Peter Schartner},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Chameleon-Hashing f{\"{u}}r Interaktive Beweise der Verf{\"{u}}gbarkeit
                  dynamischer Daten in der Cloud},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {187--199},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20042},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RassS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RiekeZRGG14,
  author       = {Roland Rieke and
                  Maria Zhdanova and
                  J{\"{u}}rgen Repp and
                  Romain Giot and
                  Chrystel Gaber},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Verhaltensanalyse zur Erkennung von Missbrauch mobiler Geldtransferdienste},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {271--282},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20049},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RiekeZRGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SibingerM14,
  author       = {Christoph Sibinger and
                  Tilo M{\"{u}}ller},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Verwendung von Festplattenvollverschl{\"{u}}sselung im gesch{\"{a}}ftlichen
                  und privaten Umfeld},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {201--216},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20043},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SibingerM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StockLJ14,
  author       = {Ben Stock and
                  Sebastian Lekies and
                  Martin Johns},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {DOM-basiertes Cross-Site Scripting im Web: Reise in ein unerforschtes
                  Land},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {53--64},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20068},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StockLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SzlosarczykWKMS14,
  author       = {Sebastian Szl{\'{o}}sarczyk and
                  Steffen Wendzel and
                  Jaspreet Kaur and
                  Michael Meier and
                  Frank Schubert},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Towards Suppressing Attacks on and Improving Resilience of Building
                  Automation Systems - an Approach Exemplified Using BACnet},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {407--418},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20060},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SzlosarczykWKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TewsS14,
  author       = {Erik Tews and
                  Christian Schlehuber},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Quantitative Ans{\"{a}}tze zur IT-Risikoanalyse},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {293--303},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20051},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TewsS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WendzelZMS14,
  author       = {Steffen Wendzel and
                  Viviane Zwanger and
                  Michael Meier and
                  Sebastian Szl{\'{o}}sarczyk},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Envisioning Smart Building Botnets},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {319--329},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20053},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WendzelZMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld14,
  author       = {Andreas Westfeld},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Angriffe auf eine Spreizspektrummethode f{\"{u}}r Audio-Steganographie},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {217--227},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20044},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2014,
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20034},
  isbn         = {978-3-88579-622-0},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MakriEHPAHJ13,
  author       = {Eleftheria Makri and
                  Maarten H. Everts and
                  Sebastiaan de Hoogh and
                  Andreas Peter and
                  Harm op den Akker and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Privacy-Preserving Verification of Clinical Research},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {481--500},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/20065},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MakriEHPAHJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Mitrengova13,
  author       = {Marika Mitrengov{\'{a}}},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Multi-LHL protocol},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {461--480},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/20064},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Mitrengova13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/NilgesMH13,
  author       = {Tobias Nilges and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Huber},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Structural Composition Attacks on Anonymized Data},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {443--460},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/20063},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/NilgesMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BenensonKK12,
  author       = {Zinaida Benenson and
                  Olaf Kroll{-}Peters and
                  Matthias Krupp},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Mentale Modelle der IT-Sicherheit bei der Nutzung mobiler Endger{\"{a}}te},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {7--24},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18284},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BenensonKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Braband12,
  author       = {Jens Braband},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Security und Safety - das Yin und Yang der Systemsicherheit?},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {3},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18281},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Braband12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrzuskaDF12,
  author       = {Christina Brzuska and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {TLS, PACE, and {EAC:} ACryptographic View at Modern Key Exchange Protocols},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {71--82},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18264},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrzuskaDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Cachin12,
  author       = {Christian Cachin},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Sicherheits-Forschung f{\"{u}}r die Cloud - Heisse Luft oder
                  Wolke Sieben?},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {1},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18262},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Cachin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/CheikhrouhouSDFU12,
  author       = {Lassaad Cheikhrouhou and
                  Werner Stephan and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Markus Ullmann},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Merging the Cryptographic Security Analysis and the Algebraic-Logic
                  Security Proof of {PACE}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {83--94},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18265},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/CheikhrouhouSDFU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DewaldFSSSVW12,
  author       = {Andreas Dewald and
                  Felix C. Freiling and
                  Thomas Schreck and
                  Michael Spreitzenbarth and
                  Johannes St{\"{u}}ttgen and
                  Stefan V{\"{o}}mel and
                  Carsten Willems},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Analyse und Vergleich von BckR2D2-I und {II}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {47--58},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18287},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DewaldFSSSVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EngelberthGSF12,
  author       = {Markus Engelberth and
                  Jan G{\"{o}}bel and
                  Christian Sch{\"{o}}nbein and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {PyBox - {A} Python Sandbox},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {137--148},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18269},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EngelberthGSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FuchsHF12,
  author       = {Karl{-}Peter Fuchs and
                  Dominik Herrmann and
                  Hannes Federrath},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {gMix: Eine generische Architektur f{\"{u}}r Mix-Implementierungen
                  und ihre Umsetzung als Open-Source-Framework},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {123--135},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18268},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FuchsHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrevelerJL12,
  author       = {Ulrich Greveler and
                  Benjamin Justus and
                  Dennis L{\"{o}}hr},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Identifikation von Videoinhalten {\"{u}}ber granulare Stromverbrauchsdaten},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {35--45},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18286},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrevelerJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HartungPB12,
  author       = {Daniel Hartung and
                  Anika Pflug and
                  Christoph Busch},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Vein Pattern Recognition Using Chain Codes Spatial Information and
                  Skeleton Fusing},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {245--256},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18279},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HartungPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12,
  author       = {Detlef H{\"{u}}hnlein and
                  Dirk Petrautzki and
                  Johannes Schm{\"{o}}lz and
                  Tobias Wich and
                  Moritz Horsch and
                  Thomas Wieland and
                  Jan Eichholz and
                  Alexander Wiesmaier and
                  Johannes Braun and
                  Florian Feldmann and
                  Simon Potzernheim and
                  J{\"{o}}rg Schwenk and
                  Christian Kahlo and
                  Andreas K{\"{u}}hne and
                  Heiko Veit},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {On the design and implementation of the Open eCard App},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {95--110},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18266},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HuhnleinPSWHWEWBFPSKKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KauerPVTB12,
  author       = {Michaela Kauer and
                  Thomas Pfeiffer and
                  Melanie Volkamer and
                  Heike Theuerling and
                  Ralph Bruder},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {It is not about the design - it is about the content! Making warnings
                  more efficient by communicating risks appropriately},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {187--198},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18274},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KauerPVTB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KuhnenLM12,
  author       = {Marcus Quintino Kuhnen and
                  Mario Lischka and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Triggering {IDM} Authentication Methods based on Device Capabilities
                  Information},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {235--244},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18278},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KuhnenLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LekiesTJ12,
  author       = {Sebastian Lekies and
                  Walter Tighzert and
                  Martin Johns},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Towards stateless, client-side driven Cross-Site Request Forgery protection
                  for Web applications},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {111--121},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18267},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LekiesTJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Lotz12,
  author       = {Volkmar Lotz},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Towards a Secure and Trusted Business Web},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {4--5},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18282},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Lotz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MenzelTFKD12,
  author       = {Wiebke Menzel and
                  Sven Tuchscheerer and
                  Jana Fruth and
                  Christian Kr{\"{a}}tzer and
                  Jana Dittmann},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Designansatz und Evaluation von Kindgerechten Securitywarnungen f{\"{u}}r
                  Smartphones},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {211--221},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18276},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MenzelTFKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PenningerMF12,
  author       = {Stefan Penninger and
                  Stefan Meier and
                  Hannes Federrath},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Usability von CAPTCHA-Systemen},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {199--210},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18275},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PenningerMF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TriniusF12,
  author       = {Philipp Trinius and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Filtern von Spam-Nachrichten mit kontextfreien Grammatiken},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {163--174},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18271},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TriniusF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/UllmannBG12,
  author       = {Markus Ullmann and
                  Ralph Breithaupt and
                  Frank Gehring},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {"On-Card" User Authentication for Contactless Smart Cards based on
                  Gesture Recognition},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {223--234},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18277},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/UllmannBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Voelcker12,
  author       = {Hinrich Voelcker},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {{IT} Security - Effiziente Organisation {\"{u}}ber Governance
                  hinaus},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {2},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18273},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Voelcker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Wendzel12,
  author       = {Steffen Wendzel},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {The Problem of Traffic Normalization Within a Covert Channel's Network
                  Environment Learning Phase},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {149--161},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18270},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Wendzel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfS12,
  author       = {Patrick Wolf and
                  Martin Steinebach},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang
                  der Medien-Wertsch{\"{o}}pfungskette},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {175--185},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18272},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Zhou12,
  author       = {Xuebing Zhou},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {A Practical View of Privacy Preserving Biometric Authentication},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {6},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18283},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Zhou12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZibuschkaR12,
  author       = {Jan Zibuschka and
                  Heiko Ro{\ss}nagel},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {On Some Conjectures in {IT} Security: The Case for Viable Security
                  Solutions},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {25--33},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18285},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZibuschkaR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZimmermannSSF12,
  author       = {Christian Zimmermann and
                  Michael Spreitzenbarth and
                  Sven Schmitt and
                  Felix C. Freiling},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Forensic Analysis of {YAFFS2}},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {59--69},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18263},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZimmermannSSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2012,
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/19975},
  isbn         = {978-3-88579-289-5},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BaecherFGLLS10,
  author       = {Paul Baecher and
                  Marc Fischlin and
                  Lior Gordon and
                  Robert Langenberg and
                  Michael L{\"{u}}tzow and
                  Dominique Schr{\"{o}}der},
  editor       = {Felix C. Freiling},
  title        = {CAPTCHAs: The Good, the Bad, and the Ugly},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {353--365},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19796},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BaecherFGLLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BohmeP10,
  author       = {Rainer B{\"{o}}hme and
                  Stefanie P{\"{o}}tzsch},
  editor       = {Felix C. Freiling},
  title        = {Social Lending aus der Perspektive des Datenschutzes},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {317--328},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19792},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BohmeP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BuschANKZ10,
  author       = {Christoph Busch and
                  Sebastian Abt and
                  Claudia Nickel and
                  Ulrike Korte and
                  Xuebing Zhou},
  editor       = {Felix C. Freiling},
  title        = {Biometrische Template-Protection-Verfahren und Interoperabilit{\"{a}}tsstrategien},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {1--12},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19773},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BuschANKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BuschH10,
  author       = {Christoph Busch and
                  Daniel Hartung},
  editor       = {Felix C. Freiling},
  title        = {Biometrische Nachrichten-Authentisierung},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {13--24},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19784},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BuschH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ChristleinRA10,
  author       = {Vincent Christlein and
                  Christian Riess and
                  Elli Angelopoulou},
  editor       = {Felix C. Freiling},
  title        = {A Study on Features for the Detection of Copy-Move Forgeries},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {105--116},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19774},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ChristleinRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DistlerKR10,
  author       = {Tobias Distler and
                  R{\"{u}}diger Kapitza and
                  Hans P. Reiser},
  editor       = {Felix C. Freiling},
  title        = {State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous
                  Replicated Services},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {61--72},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19800},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DistlerKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Gobel10,
  author       = {Jan G{\"{o}}bel},
  editor       = {Felix C. Freiling},
  title        = {Amun: Automatic Capturing of Malicious Software},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {177--190},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19780},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Gobel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GobelT10,
  author       = {Jan G{\"{o}}bel and
                  Philipp Trinius},
  editor       = {Felix C. Freiling},
  title        = {Towards Optimal Sensor Placement Strategies for Early Warning Systems},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {191--204},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19781},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GobelT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GudemannO10,
  author       = {Matthias G{\"{u}}demann and
                  Frank Ortmeier},
  editor       = {Felix C. Freiling},
  title        = {Quantitative Model-Based Safety Analysis: {A} Case Study},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {37--48},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19798},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GudemannO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HeumannTK10,
  author       = {Thomas Heumann and
                  Sven T{\"{u}}rpe and
                  J{\"{o}}rg Keller},
  editor       = {Felix C. Freiling},
  title        = {Quantifying the Attack Surface of a Web Application},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {305--316},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19791},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HeumannTK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HoppeHTKD10,
  author       = {Tobias Hoppe and
                  S{\"{o}}nke Holthusen and
                  Sven Tuchscheerer and
                  Stefan Kiltz and
                  Jana Dittmann},
  editor       = {Felix C. Freiling},
  title        = {Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch
                  sicheren Datenspeicherung},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {153--164},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19778},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HoppeHTKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HuhnleinRZ10,
  author       = {Detlef H{\"{u}}hnlein and
                  Heiko Ro{\ss}nagel and
                  Jan Zibuschka},
  editor       = {Felix C. Freiling},
  title        = {Diffusion of Federated Identity Management},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {25--36},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19795},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HuhnleinRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KastlL10,
  author       = {Wolfgang Kastl and
                  Thomas Loimayr},
  editor       = {Felix C. Freiling},
  title        = {A Parallel Computing System with Specialized Coprocessors for Cryptanalytic
                  Algorithms},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {73--84},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19801},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KastlL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KiltzHAD10,
  author       = {Stefan Kiltz and
                  Mario Hildebrandt and
                  Robert Altschaffel and
                  Jana Dittmann},
  editor       = {Felix C. Freiling},
  title        = {A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {93--104},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19803},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KiltzHAD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kirchner10,
  author       = {Matthias Kirchner},
  editor       = {Felix C. Freiling},
  title        = {Lineare Zeilen- und Spaltenpr{\"{a}}diktoren zur Erkennung von
                  Bildskalierungen},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {117--128},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19775},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kirchner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kuhn10,
  author       = {Ulrich K{\"{u}}hn},
  editor       = {Felix C. Freiling},
  title        = {On Security Protocols for Desktop Sharing},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {229--240},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19785},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kuhn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MessmerK10,
  author       = {Roman Messmer and
                  J{\"{o}}rg Keller},
  editor       = {Felix C. Freiling},
  title        = {Real-Time Fault-Tolerant Routing in High-Availability Multicast-Aware
                  Video Networks},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {49--60},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19799},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MessmerK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Pohls10,
  author       = {Henrich Christopher P{\"{o}}hls},
  editor       = {Felix C. Freiling},
  title        = {Why Showing One {TLS} Certificate is not Enough - Towards a Browser
                  Feedback for Multiple {TLS} Certificate Verifications},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {265--276},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19788},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Pohls10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RietzSVK10,
  author       = {Ren{\'{e}} Rietz and
                  Sebastian Schmerl and
                  Michael Vogel and
                  Hartmut K{\"{o}}nig},
  editor       = {Felix C. Freiling},
  title        = {Iterative pr{\"{a}}zisionsbewertende Signaturgenerierung},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {141--152},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19777},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RietzSVK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RistigFS10,
  author       = {Christian Ristig and
                  Ren{\'{e}} Fritzsche and
                  Christian Siemers},
  editor       = {Felix C. Freiling},
  title        = {WatchCop - Safer Software Execution through Hardware/Software Co-Design},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {277--288},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19789},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RistigFS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchaferBSZHK10,
  author       = {Marcel Sch{\"{a}}fer and
                  Waldemar Berchtold and
                  Martin Steinebach and
                  Sascha Zmudzinski and
                  Margareta Heilmann and
                  Stefan Katzenbeisser},
  editor       = {Felix C. Freiling},
  title        = {Collusion-Secure Fingerprint Watermarking for Real World Applications},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {129--140},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19776},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchaferBSZHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchneiderB10,
  author       = {Michael Schneider and
                  Johannes Buchmann},
  editor       = {Felix C. Freiling},
  title        = {Extended Lattice Reduction Experiments Using the {BKZ} Algorithm},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {241--252},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19786},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchneiderB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchrankBJP10,
  author       = {Michael Schrank and
                  Bastian Braun and
                  Martin Johns and
                  Joachim Posegga},
  editor       = {Felix C. Freiling},
  title        = {Session Fixation - The Forgotten Vulnerability?},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {341--352},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19794},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchrankBJP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schryen10,
  author       = {Guido Schryen},
  editor       = {Felix C. Freiling},
  title        = {A Fuzzy Model for {IT} Security Investments},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {289--304},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19790},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schryen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchwabFSP10,
  author       = {Fabian Schwab and
                  Alexander Findeisen and
                  Peter Sakal and
                  Hartmut Pohl},
  editor       = {Felix C. Freiling},
  title        = {Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {253--264},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19787},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchwabFSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SovisKS10,
  author       = {Pavol Sovis and
                  Florian Kohlar and
                  J{\"{o}}rg Schwenk},
  editor       = {Felix C. Freiling},
  title        = {Security Analysis of OpenID},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {329--340},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19793},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SovisKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SpreitzenbarthH10,
  author       = {Michael Spreitzenbarth and
                  Thorsten Holz},
  editor       = {Felix C. Freiling},
  title        = {Towards Secure Deletion on Smartphones},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {165--176},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19779},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SpreitzenbarthH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StelteS10,
  author       = {Bj{\"{o}}rn Stelte and
                  Bj{\"{o}}rn Saxe},
  editor       = {Felix C. Freiling},
  title        = {State-of-the-Art Kryptoverfahren f{\"{u}}r drahtlose Sensornetze
                  - Eine Krypto-Bibliothek f{\"{u}}r MantisOS},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {217--228},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19783},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StelteS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TriniusWHR10,
  author       = {Philipp Trinius and
                  Carsten Willems and
                  Thorsten Holz and
                  Konrad Rieck},
  editor       = {Felix C. Freiling},
  title        = {A Malware Instruction Set for Behavior-Based Analysis},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {205--216},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19782},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TriniusWHR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WeisSF10,
  author       = {R{\"{u}}diger Weis and
                  Brian Sch{\"{u}}ler and
                  Stefan A. Flemming},
  editor       = {Felix C. Freiling},
  title        = {Towards Secure and Reliable Firewall Systems based on {MINIX3}},
  booktitle    = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  pages        = {85--92},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19802},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WeisSF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2010,
  editor       = {Felix C. Freiling},
  title        = {Sicherheit 2010: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 5. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. Oktober
                  2010 in Berlin},
  series       = {{LNI}},
  volume       = {{P-170}},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19974},
  isbn         = {978-3-88579-264-2},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AdelsbachG08,
  author       = {Andr{\'{e}} Adelsbach and
                  Ulrich Greveler},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {{ANOCAST:} Rethinking Broadcast Anonymity in the Case of Wireless
                  Communication},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {71--84},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21518},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AdelsbachG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AlkassarGQ08,
  author       = {Ammar Alkassar and
                  Utz Gnaida and
                  Thomas Quirin},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {MoTrust-TCG: Manipulationsschutz f{\"{u}}r mobile Signaturanwendungen
                  mittels "Trusted Computing"},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {575--580},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21512},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AlkassarGQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BacksP08,
  author       = {Peter Backs and
                  Norbert Pohlmann},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Einfluss von Sicherungsma{\ss}nahmen auf die {\"{U}}bertragungsqualit{\"{a}}t
                  von VoIP},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {563--568},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21510},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BacksP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BecherF08,
  author       = {Michael Becher and
                  Felix C. Freiling},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards Dynamic Malware Analysis to Increase Mobile Device Security423},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {423--433},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21495},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BecherF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BeekM08,
  author       = {Frank van der Beek and
                  Martin Mink},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Wie lernt man IT-Sicherheit am besten? Eine empirische Studie},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {499--511},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21501},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BeekM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BuchmannDL08,
  author       = {Johannes Buchmann and
                  Martin D{\"{o}}ring and
                  Richard Lindner},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Efficiency Improvement for {NTRU}},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {163--178},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21474},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BuchmannDL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BushN08,
  author       = {Christoph Busch and
                  Alexander Nouak},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {3-D-Gesichtserkennung f{\"{u}}r die unbeaufsichtigte Grenzkontrolle},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {249--261},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21480},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BushN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DietrichR08,
  author       = {Christian J. Dietrich and
                  Christian Rossow},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Empirische Untersuchung von IP-Blacklists},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {545--549},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21507},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DietrichR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EbingerS08,
  author       = {Peter Ebinger and
                  Martin Sommer},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Using Localization Information for Attack Detection in Mobile Ad hoc
                  Networks},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {395--406},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21493},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EbingerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EichholzH08,
  author       = {Jan Eichholz and
                  Detlef H{\"{u}}hnlein},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Using {ISO/IEC} 24727 for Mobile Devices},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {581--587},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21513},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EichholzH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FederrathP08,
  author       = {Hannes Federrath and
                  Wolfgang P{\"{o}}ppel},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Detektion von anonym abgerufenen rechtswidrigen Inhalten mit einem
                  hashwertbasierten Datenscanner},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {59--70},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21514},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FederrathP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FreilingL08,
  author       = {Felix C. Freiling and
                  Jens Liebchen},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Iterative Kompromittierungsgraphverfeinerung als methodische Grundlage
                  f{\"{u}}r Netzwerkpenetrationstests},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {435--447},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21496},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FreilingL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FritschA08,
  author       = {Lothar Fritsch and
                  Habtamu Abie},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards a Research Road Map for the Management of Privacy Risks in
                  Information Systems},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {1--15},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21470},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FritschA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GanstererI08,
  author       = {Wilfried N. Gansterer and
                  Michael Ilger},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards Self-Learning and Fully Transparent {UCE} Prevention},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {277--290},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21483},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GanstererI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GebhardtIS08,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {On an Approach to Compute (at least Almost) Exact Probabilities for
                  Differentia Hash Collision Paths},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {111--125},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21521},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GebhardtIS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Heinlein08,
  author       = {Peer Heinlein},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Rechtliche Aspekte der Spamfilterung f{\"{u}}r Unternehmen und
                  Administratoren},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {539--544},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21506},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Heinlein08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HickI08,
  author       = {Sibylle Hick and
                  Luigi Lo Iacono},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Elliptic Curve Cryptography in x.509-based {PKI}},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {137--147},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21472},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HickI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HildmannKR08,
  author       = {Thomas Hildmann and
                  Odej Kao and
                  Christopher Ritter},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {eXtreme Role Engineering: Ein neuer Ansatz zur Rechtedefinition und
                  -vergabe},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {569--573},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21511},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HildmannKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HoppeD08,
  author       = {Tobias Hoppe and
                  Jana Dittmann},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Vort{\"{a}}uschen von Komponentenfunktionalit{\"{a}}t im
                  Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen
                  am Beispiel des Airbags},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {341--353},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21488},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HoppeD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/IkinciHF08,
  author       = {Ali Ikinci and
                  Thorsten Holz and
                  Felix C. Freiling},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Monkey-Spider: Detecting Malicious Websites with Low-Interaction Honeyclients},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {407--421},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21494},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/IkinciHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/JagerJS08,
  author       = {Tibor Jager and
                  Heiko J{\"{a}}kel and
                  J{\"{o}}rg Schwenk},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation
                  bei {SSL/TLS}},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {127--136},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21471},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/JagerJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/JahnkeTM08,
  author       = {Marko Jahnke and
                  Christian Thul and
                  Peter Martini},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Comparison and Improvement of Metrics for Selecting Intrusion Response
                  Measures against DoS Attacks},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {381--393},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21491},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/JahnkeTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KesdoganPP08,
  author       = {Dogan Kesdogan and
                  Dang Vinh Pham and
                  Lexi Pimenidis},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Analyse der Verkettbarkeit in nutzergesteuerten Identit{\"{a}}tsmanagementsystemen},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {17--30},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21481},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KesdoganPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KorteKMPNTVM08,
  author       = {Ulrike Korte and
                  Michael Krawczak and
                  Johannes Merkle and
                  Rainer Plaga and
                  Matthias Niesing and
                  Carsten Tiemann and
                  A. J. Han Vinck and
                  Ulrich Martini},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {A Cryptographic Biometric Authentication System based on Genetic Fingerprints},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {263--276},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21482},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KorteKMPNTVM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KuhnPTW08,
  author       = {Ulrich K{\"{u}}hn and
                  Andrei Pyshkin and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Variants of Bleichenbacher's Low-Exponent Attack on PKCS{\#}1 {RSA}
                  Signatures},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {97--109},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21520},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KuhnPTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LowisHG08,
  author       = {Lutz Lowis and
                  Sebastian H{\"{o}}hn and
                  Maike Gilliot},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Vulnerability Effect Propagation in Service-Oriented Archtectures},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {473--484},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21499},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LowisHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MakrushinDKH08,
  author       = {Andrey Makrushin and
                  Jana Dittmann and
                  Stefan Kiltz and
                  Tobias Hoppe},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-,
                  Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {315--327},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21486},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MakrushinDKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MattesSPMH08,
  author       = {Tina Mattes and
                  Frank Schiller and
                  J{\"{o}}rg Pfahler and
                  Annemarie M{\"{o}}rwald and
                  Thomas Honold},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Nachweis der G{\"{u}}te von Kombinationen des {CRC}},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {355--366},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21489},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MattesSPMH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MeintsH08,
  author       = {Martin Meints and
                  Marit Hansen},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Der ePass - eine Sicherheits-und Datenschutzanalyse},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {31--43},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21492},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MeintsH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MiedlM08,
  author       = {Horst Miedl and
                  Josef M{\"{a}}rtz},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Qualifizierung integrierter Werkzeugumgebungen f{\"{u}}r die
                  Erstellung sicherheitsrelevanter Software in Kernkraftwerken},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {589--593},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21515},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MiedlM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/OppligerSH08,
  author       = {Rolf Oppliger and
                  J{\"{o}}rg Schwenk and
                  J{\"{o}}rg Helbach},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Protecting Code Voting Against Vote Selling},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {193--204},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21476},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/OppligerSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Pohls08,
  author       = {Henrich Christopher P{\"{o}}hls},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {ConCert: Content Revocation Using Certificates},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {149--162},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21473},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Pohls08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PoschmannK08,
  author       = {Christoph P{\"{o}}rschmann and
                  Heiko Knospe},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Analyse spektraler Parameter des Audiosignals zur Identifikation und
                  Abwehr von Telefon-SPAM},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {551--555},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21508},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PoschmannK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RossnagelZ08,
  author       = {Heiko Rossnagel and
                  Jan Zibuschka},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Umsetzung starker Authentifizierung auf Basis von Passwort-Mechanismen},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {533--537},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21505},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RossnagelZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Royer08,
  author       = {Denis Royer},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Ganzheitliche Bewertung von Enterprise Identity Management Systemen
                  - Der Ansatz der Balanced Scorecard als taktisches Entscheidungsunterst{\"{u}}tzungsinstrument},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {449--460},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21497},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Royer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchmerlRK08,
  author       = {Sebastian Schmerl and
                  Ren{\'{e}} Rietz and
                  Hartmut K{\"{o}}nig},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Systematische Ableitung von Signaturen durch Wiederverwendung am Beispiel
                  von Snort},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {367--379},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21490},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchmerlRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SeedorfdNE08,
  author       = {Jan Seedorf and
                  Nico d'Heureuse and
                  Saverio Niccolini and
                  Thilo Ewald},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {VoIP {SEAL:} {A} Research Prototype for Protecting Voice-over-IP Networks
                  and Users},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {557--561},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21509},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SeedorfdNE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Seewald08,
  author       = {Alexander K. Seewald},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards Autmating Malware Classification and Characterization},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {291--302},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21484},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Seewald08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ShoufanH08,
  author       = {Abdulhadi Shoufan and
                  Sorin A. Huss},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Schl{\"{u}}sselverwaltung im Sicheren Multicast},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {179--191},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21475},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ShoufanH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SohnleinS08,
  author       = {Sven S{\"{o}}hnlein and
                  Francesca Saglietti},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Nachweis hoher Softwarezuverl{\"{a}}ssigkeit auf der Basis von
                  Test- und Betriebserfahrung mit wiederverwendbaren Komponenten},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {303--314},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21485},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SohnleinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StampfelGI08,
  author       = {Gerald Stampfel and
                  Wilfried N. Gansterer and
                  Martin Ilger},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Implications of the {EU} Data Retention Directive 2006/24/EC},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {45--58},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21503},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StampfelGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SteinebachML08,
  author       = {Martin Steinebach and
                  Christoph Moebius and
                  Huajian Liu},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Bildforensische Verfahren zur Unterst{\"{u}}tzung von Wasserzeichendetektion},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {205--217},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21477},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SteinebachML08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/TrukenmullerH08,
  author       = {Jan Trukenm{\"{u}}ller and
                  Olaf Henniger},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {OpenPGP-Karten mit biometrischer Benutzerauthentisierung},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {527--531},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21504},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/TrukenmullerH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/UrbasLSH08,
  author       = {Leon Urbas and
                  Sandro Leuchter and
                  Torsten Schaft and
                  Marcus Heinath},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Modellgest{\"{u}}tzte Bewertung der Ablenkungswirkung von neuen
                  interaktiven Diensten im Fahrzeug},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {329--340},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21487},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/UrbasLSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Weiss08,
  author       = {Stefan Weiss},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Using the Concept of Topic Maps for Enhancing Information Privacy
                  in Social Networking Applications},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {85--96},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21519},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Weiss08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WeissM08,
  author       = {Steffen Weiss and
                  Klaus Meyer{-}Wegener},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Towards Solving the Data Problem in Measurement of Organisations'
                  Security},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {461--472},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21498},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WeissM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Steganalyse von JPEG-Dateien},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {219--232},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21478},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld08a,
  author       = {Andreas Westfeld},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Von Bogensch{\"{u}}tzen und digitalen Wasserzeichen},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {595--599},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21516},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WillemsM08,
  author       = {Christian Willems and
                  Christoph Meinel},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Awareness Creation mit Tele-Lab IT-Security: Praktisches Sicherheitstraining
                  im virtuellen Labor am Beispiel Trojanischer Pferde},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {513--532},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21502},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WillemsM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfP08,
  author       = {Marko Wolf and
                  Christof Paar},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Security Requirements Engineering in the Automotive Domain: On Specification
                  Procedures and Implementation Aspects},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {485--498},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21500},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZmudzinskiS08,
  author       = {Sascha Zmudzinski and
                  Martin Steinebach},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Content-based Message Authentication Coding for Audio Data},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {233--247},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21479},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZmudzinskiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2008,
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21469},
  isbn         = {978-3-88579-222-2},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AlkassarAL06,
  author       = {Ammar Alkassar and
                  Elena Andreeva and
                  Helger Lipmaa},
  editor       = {Jana Dittmann},
  title        = {{SLC:} Efficient Authenticated Encryption for Short Packages},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {270--278},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24782},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AlkassarAL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ArmknechtBI06,
  author       = {Frederik Armknecht and
                  J{\"{o}}rg Brandeis and
                  Egor Ilinykh},
  editor       = {Jana Dittmann},
  title        = {Experimental results on algebraic attacks on stream ciphers},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {279--282},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24783},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ArmknechtBI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BecherBD06,
  author       = {Alexander Becher and
                  Zinaida Benenson and
                  Maximillian Dornseif},
  editor       = {Jana Dittmann},
  title        = {Tampering with Motes: Real-World Attacks on Wireless Sensor Networks},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {26--29},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24799},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BecherBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BelliBH06,
  author       = {Fevzi Belli and
                  Christof J. Budnik and
                  Axel Hollmann},
  editor       = {Jana Dittmann},
  title        = {Holistic Testing of Interactive Systems Using Statecharts},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {345--356},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24793},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BelliBH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BoursasH06,
  author       = {Latifa Boursas and
                  Wolfgang Hommel},
  editor       = {Jana Dittmann},
  title        = {Policy-gesteuerte Datenfreigaben und Trust Management im organisations{\"{u}}bergreifenden
                  Identit{\"{a}}ts-Management},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {91--102},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24759},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BoursasH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ClaussS06,
  author       = {Sebastian Clau{\ss} and
                  Stefan Schiffner},
  editor       = {Jana Dittmann},
  title        = {Anonymit{\"{a}}t auf Andwendungsebene},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {171--182},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24770},
  timestamp    = {Thu, 10 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ClaussS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ClaussSSKKP06,
  author       = {Sebastian Clau{\ss} and
                  Stefan Schiffner and
                  Sandra Steinbrecher and
                  Dogan Kesdogan and
                  Tobias K{\"{o}}lsch and
                  Lexi Pimenidis},
  editor       = {Jana Dittmann},
  title        = {Identit{\"{a}}tsmanagement und das Risiko der Re-Identifikation},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {188--191},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24772},
  timestamp    = {Thu, 10 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ClaussSSKKP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/CockWP06,
  author       = {Danny De Cock and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Jana Dittmann},
  title        = {The Belgian Electronic Identity Card (Overview)},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {298--301},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24786},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/CockWP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DiedrichKF06,
  author       = {Christian Diedrich and
                  Jan Krause and
                  Andreas Franke},
  editor       = {Jana Dittmann},
  title        = {{UML} based software development under safety constraints},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {361--368},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24795},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DiedrichKF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DimlerFNP06,
  author       = {Simone Dimler and
                  Hannes Federrath and
                  Thomas Nowey and
                  Klaus Pl{\"{o}}{\ss}l},
  editor       = {Jana Dittmann},
  title        = {Awareness f{\"{u}}r IT-Sicherheit und Datenschutz in der Hochschulausbildung
                  - Eine empirirsche Untersuchung},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {18--21},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24779},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DimlerFNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Ehrenberger06,
  author       = {Wolfgang D. Ehrenberger},
  editor       = {Jana Dittmann},
  title        = {Schichtenbetrachtung bei der Genehmigung von Software aufgrund von
                  Betriebserfahrung},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {369--372},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24796},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Ehrenberger06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/EsserF06,
  author       = {Hans{-}Georg E{\ss}er and
                  Felix C. Freiling},
  editor       = {Jana Dittmann},
  title        = {Kapazit{\"{a}}tsmessung eines verdeckten Zeitkanals {\"{u}}ber
                  {HTTP}},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {115--118},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24763},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/EsserF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FayST06,
  author       = {Bj{\"{o}}rn Fay and
                  J{\"{o}}rn Schweisgut and
                  Christian Tobias},
  editor       = {Jana Dittmann},
  title        = {Identit{\"{a}}tsbasierte Kryptografie - Hindernisse auf dem Weg
                  von der Theorie in die Praxis},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {317--328},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24789},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FayST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GajekSW06,
  author       = {Sebastian Gajek and
                  J{\"{o}}rg Schwenk and
                  Christoph Wegener},
  editor       = {Jana Dittmann},
  title        = {SSL-VA-Authentifizierung als Schutz von Phishing und Pharming},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {6--17},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24768},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GajekSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GaupmannSZE06,
  author       = {Andreas Gaupmann and
                  Christian Schausberger and
                  Ulrich Zehl and
                  J{\"{u}}rgen Ecker},
  editor       = {Jana Dittmann},
  title        = {Implementing Zero-Knowledge Authentication in OpenSSH},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {302--305},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24787},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GaupmannSZE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GebhardtIS06,
  author       = {Max Gebhardt and
                  Georg Illies and
                  Werner Schindler},
  editor       = {Jana Dittmann},
  title        = {A Note on the Practical Value of Single Hash Collisions for Special
                  File Formats},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {333--344},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24792},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GebhardtIS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Greveler06,
  author       = {Ulrich Greveler},
  editor       = {Jana Dittmann},
  title        = {Patentierung kryptographischer Verfahren, die an Hochschulen entwickelt
                  wurden},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {329--332},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24791},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Greveler06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Gross06,
  author       = {Stephan Gro{\ss}},
  editor       = {Jana Dittmann},
  title        = {Selbstsch{\"{u}}tzende mobile Systeme},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {103--106},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24760},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Gross06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GursesS06,
  author       = {Seda F. G{\"{u}}rses and
                  Thomas Santen},
  editor       = {Jana Dittmann},
  title        = {Contextualizing Security Goals: {A} Method for Multilateral Security
                  Requirements Elicitation},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {42--53},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24801},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GursesS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Holz06,
  author       = {Thorsten Holz},
  editor       = {Jana Dittmann},
  title        = {Learning More About Attack Patterns With Honeypots},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {30--41},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24800},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Holz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HuhnleinK06,
  author       = {Detlef H{\"{u}}hnlein and
                  Ulrike Korte},
  editor       = {Jana Dittmann},
  title        = {Rechtliche Rahmenbedingungen der elektronischen Rechnung},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {256--269},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24781},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HuhnleinK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kopsell06,
  author       = {Stefan K{\"{o}}psell},
  editor       = {Jana Dittmann},
  title        = {Vergleich der Verfahren zur Verhinderung von Replay-Angriffen der
                  Anonymisierungsdienste {AN.ON} und Tor},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {183--187},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24771},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kopsell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KossakowskiS06,
  author       = {Klaus{-}Peter Kossakowski and
                  J{\"{u}}rgen Sander},
  editor       = {Jana Dittmann},
  title        = {CarmentiS Auf dem Weg zu einem deutschen IT-Fr{\"{u}}hwarnsystem},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {22--25},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24790},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KossakowskiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Krabichler06,
  author       = {Thomas Krabichler},
  editor       = {Jana Dittmann},
  title        = {Das Problem der geringen Verbreitung qualifizierter elektronischer
                  Signaturen - Ursachen und L{\"{o}}sungsans{\"{a}}tze aus
                  Sicht der Wirtschaftswissenschaften},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {222--232},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24777},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Krabichler06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Kugler06,
  author       = {R{\"{u}}diger K{\"{u}}gler},
  editor       = {Jana Dittmann},
  title        = {Softwareschutz durch einen Hardware-Dongle},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {111--114},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24762},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Kugler06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Langweg06,
  author       = {Hanno Langweg},
  editor       = {Jana Dittmann},
  title        = {Malware Attacks on Electronic Signatures Revisited},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {244--255},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24780},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Langweg06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LassmannS06,
  author       = {Gunter La{\ss}mann and
                  Matthias Schwan},
  editor       = {Jana Dittmann},
  title        = {Vertrauensw{\"{u}}rdige Chipkartenbasierte Biometrische Authentifikation},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {66--77},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24803},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LassmannS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LuH06,
  author       = {Shourong Lu and
                  Wolfgang A. Halang},
  editor       = {Jana Dittmann},
  title        = {A {UML} Framework for Safety Mechanisms Based on {IEC} 61508},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {357--360},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24794},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LuH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Munch06,
  author       = {Isabel M{\"{u}}nch},
  editor       = {Jana Dittmann},
  title        = {Internationalisierung der IT-Grundschutz-Zertifizierung},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {1--5},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24757},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Munch06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Pimenidis06,
  author       = {Lexi Pimenidis},
  editor       = {Jana Dittmann},
  title        = {A Method for Degradation of Anonymity on Mix Systems for E-Mail and
                  Surfing the {WWW}},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {155--158},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24767},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Pimenidis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Saglietti06,
  author       = {Francesca Saglietti},
  editor       = {Jana Dittmann},
  title        = {Interaktion zwischen funktionaler Sicherheit und Datensicherheit},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {373--383},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24797},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Saglietti06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ScheidatWV06,
  author       = {Tobias Scheidat and
                  Franziska Wolf and
                  Claus Vielhauer},
  editor       = {Jana Dittmann},
  title        = {Analyse biometrischer Handschriftverifikation im Kontext von Metadaten},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {54--65},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24802},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ScheidatWV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SchmerlFM06,
  author       = {Sebastian Schmerl and
                  Ulrich Flegel and
                  Michael Meier},
  editor       = {Jana Dittmann},
  title        = {Vereinfachung der Signaturentwicklung durch Wiederverwendung},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {201--212},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24774},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SchmerlFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schweisgut06,
  author       = {J{\"{o}}rn Schweisgut},
  editor       = {Jana Dittmann},
  title        = {Effiziente elektronische Wahlen mit Observer},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {306--316},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24788},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schweisgut06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Stamer06,
  author       = {Heiko Stamer},
  editor       = {Jana Dittmann},
  title        = {Verifikation von Ping-Pong Protokollen in Zeit \emph{O}(\emph{n}\({}^{\mbox{2}}\))},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {283--293},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24784},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Stamer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/SteinebachZ06,
  author       = {Martin Steinebach and
                  Sascha Zmudzinski},
  editor       = {Jana Dittmann},
  title        = {Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {143--154},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24766},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/SteinebachZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StrackK06,
  author       = {Hermann Strack and
                  Christoph Karich},
  editor       = {Jana Dittmann},
  title        = {BeGovSAH - Begleitforschung zur Umsetzung des eGovernment-Aktionsplans
                  in Sachsen-Anhalt},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {213--217},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24775},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StrackK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Strang06,
  author       = {Thomas Strang},
  editor       = {Jana Dittmann},
  title        = {Geographische Authentifikation und Signatur},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {192--200},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24773},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Strang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/StraubHR06,
  author       = {Tobias Straub and
                  Manuel Hartl and
                  Markus Ruppert},
  editor       = {Jana Dittmann},
  title        = {Digitale Reisep{\"{a}}sse in Deutschland - Prozesse und Sicherheitsinfrastruktur},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {233--243},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24778},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/StraubHR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/UzunovaB06,
  author       = {Violeta Uzunova and
                  Arslan Br{\"{o}}mme},
  editor       = {Jana Dittmann},
  title        = {On Experiences with (In)direct Marking Techniques for Eye Features
                  within Evaluation of Irides Recognizing Biometric Authentication Systems},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {78--90},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24758},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/UzunovaB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/VogelDHK06,
  author       = {Thomas Vogel and
                  Jana Dittmann and
                  Reyk Hillert and
                  Christian Kr{\"{a}}tzer},
  editor       = {Jana Dittmann},
  title        = {Design und Evaluierung von Steganographie f{\"{u}}r Voice-over-IP},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {131--142},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24765},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/VogelDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/VolkamerRV06,
  author       = {Melanie Volkamer and
                  Walter Reinhard and
                  Roland Vogt},
  editor       = {Jana Dittmann},
  title        = {{FUSE} - ein Internetwahlsystem f{\"{u}}r zeitlich unbegrenzt
                  geheime Betriebswahlen},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {159--170},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24769},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/VolkamerRV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/VolkmerW06,
  author       = {Markus Volkmer and
                  Sebastian Wallner},
  editor       = {Jana Dittmann},
  title        = {Ein IP-Core Design f{\"{u}}r Schl{\"{u}}sselaustausch, Stromchiffre
                  und Identifikation auf ressourcenbeschr{\"{a}}nkten Ger{\"{a}}ten},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {294--297},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24785},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/VolkmerW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Jana Dittmann},
  title        = {Steganographie f{\"{u}}r den Amateurfunk},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {119--130},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24764},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WiesmaierRLHRB06,
  author       = {Alexander Wiesmaier and
                  Ulrich Rauchschwalbe and
                  Christoph Ludwig and
                  Birgit Henhapl and
                  Markus Ruppert and
                  Johannes Buchmann},
  editor       = {Jana Dittmann},
  title        = {Intrinsically Legal-For-Trade Objects by Digital Signatures},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {218--221},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24776},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WiesmaierRLHRB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZhouSB06,
  author       = {Xuebing Zhou and
                  Martin Schmucker and
                  Christopher L. Brown},
  editor       = {Jana Dittmann},
  title        = {Video Perceptual Hashing Using Interframe Similarity},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {107--110},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24761},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZhouSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2006,
  editor       = {Jana Dittmann},
  title        = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24756},
  isbn         = {3-88579-171-4},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AdelsbachG05,
  author       = {Andr{\'{e}} Adelsbach and
                  Ulrich Greveler},
  editor       = {Hannes Federrath},
  title        = {Satellite Communication without Privacy - Attacker's Paradise},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {257--268},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28380},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AdelsbachG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BelliB05,
  author       = {Fevzi Belli and
                  Christof J. Budnik},
  editor       = {Hannes Federrath},
  title        = {Test Cost Reduction for Interactive Systems},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {149--160},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28366},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BelliB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BenensonGK05,
  author       = {Zinaida Benenson and
                  Felix C. G{\"{a}}rtner and
                  Dogan Kesdogan},
  editor       = {Hannes Federrath},
  title        = {Secure Multi-Party Computation with Security Modules},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {41--52},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28394},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BenensonGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Berthold05,
  author       = {Oliver Berthold},
  editor       = {Hannes Federrath},
  title        = {Datenschutzgerechte RFID-Technologie},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {253--256},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28379},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Berthold05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Bohme05,
  author       = {Rainer B{\"{o}}hme},
  editor       = {Hannes Federrath},
  title        = {IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {27--40},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28383},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Bohme05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/BrucknerV05,
  author       = {Lars Br{\"{u}}ckner and
                  Marco Voss},
  editor       = {Hannes Federrath},
  title        = {SIdentity - Sichere und private Attribut{\"{u}}bermittlung an
                  Internet - Dienste per Mobiltelefon},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {269--272},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28381},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/BrucknerV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DaimerT05,
  author       = {Gottfried Daimer and
                  Till Teichmann},
  editor       = {Hannes Federrath},
  title        = {Elektronische Signatur - Eignung des biometrischen Merkmals "Fingerabdruck"
                  als m{\"{o}}glicher PIN-Ersatz},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {385--396},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28395},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DaimerT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DietzeHIR05,
  author       = {Lars Dietze and
                  Bernd Holznagel and
                  Luigi Lo Iacono and
                  Christoph Ruland},
  editor       = {Hannes Federrath},
  title        = {Qualifizierte Signatur im eletronischeen Messdatenaustausch},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {335--348},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28390},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DietzeHIR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/DittmannLSK05,
  author       = {Jana Dittmann and
                  Andreas Lang and
                  Martin Steinebach and
                  Stefan Katzenbeisser},
  editor       = {Hannes Federrath},
  title        = {{ECRYPT} - European Network of Excellence in Cryptology, Aspekte der
                  Sicherheit von Mediendaten},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {189--192},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28370},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/DittmannLSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Fischer-DieskauKSV05,
  author       = {Stefanie Fischer{-}Dieskau and
                  Thomas Kunz and
                  Andreas U. Schmidt and
                  Ursula Viebeg},
  editor       = {Hannes Federrath},
  title        = {Grundkonzepte rechtssicherer Transformation signierter Dokumente},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {401--412},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28397},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Fischer-DieskauKSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Flegel05,
  author       = {Ulrich Flegel},
  editor       = {Hannes Federrath},
  title        = {Evaluating the Design of an Audit Data Pseudonymizer Using Basic Building
                  Blocks for Anonymity},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {221--232},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28375},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Flegel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FrankeP05,
  author       = {Markus Franke and
                  Oliver Pfaff},
  editor       = {Hannes Federrath},
  title        = {SAMLized Kerberos},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {297--308},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28385},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FrankeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/FritschR05,
  author       = {Lothar Fritsch and
                  Heiko Rossnagel},
  editor       = {Hannes Federrath},
  title        = {Die Krise des Signaturmarktes: L{\"{o}}sungsans{\"{a}}tze
                  aus betriebswirtschaftlicher Sicht},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {315--326},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28387},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/FritschR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GolzeMW05,
  author       = {Sebastian Golze and
                  Gero M{\"{u}}hl and
                  Torben Weis},
  editor       = {Hannes Federrath},
  title        = {How to Configure Proof-of-Work Functions to Stop Spam},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {165--174},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28368},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GolzeMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrossLS05,
  author       = {Stephan Gro{\ss} and
                  Sabine Lein and
                  Sandra Steinbrecher},
  editor       = {Hannes Federrath},
  title        = {Ein mehrseitig sicheres Abrechnungsystem f{\"{u}}r Wireless {LAN}
                  Hotspots},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {249--252},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28378},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrossLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrunertR05,
  author       = {Ronald Grunert and
                  Frank Rustemeyer},
  editor       = {Hannes Federrath},
  title        = {Aufbau von qualifizierten Zertifizierungsdiensten f{\"{u}}r die
                  Deutsche Rentenverischerung},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {331--334},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28389},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrunertR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/HeckmannF05,
  author       = {Reinhold Heckmann and
                  Christian Ferdinand},
  editor       = {Hannes Federrath},
  title        = {Verifying Safety-Critical Properties of Embedded Software by Abstract
                  Interpretation},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {125--128},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28363},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/HeckmannF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Hillen05,
  author       = {Detlef Hillen},
  editor       = {Hannes Federrath},
  title        = {SigB{\"{u}}-API: Einheitliche kartenunabh{\"{a}}ngige {API}
                  f{\"{u}}r die Zugriffe auf die Siganturkarten des Signaturb{\"{u}}ndnisses},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {375--383},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28393},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Hillen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Huhnlein05,
  author       = {Detlef H{\"{u}}hnlein},
  editor       = {Hannes Federrath},
  title        = {Die CCES-Signature-API - Eine offene Programmierschnittstelle f{\"{u}}r
                  langfristig beweiskr{\"{a}}ftige elektronische Signaturen},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {361--374},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28392},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Huhnlein05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/JungSS05,
  author       = {Martin Jung and
                  Francesca Saglietti and
                  Verena Sauerborn},
  editor       = {Hannes Federrath},
  title        = {Beherrschung von Schnittstelleninkonsistenzen in komponentenbasierten
                  Softwaresystemen},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {101--112},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28404},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/JungSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KaratsiolisLW05,
  author       = {Evangelos G. Karatsiolis and
                  Marcus Lippert and
                  Alexander Wiesmaier},
  editor       = {Hannes Federrath},
  title        = {Planning for Directory Services in Public Key Infrastructures},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {349--360},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28391},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KaratsiolisLW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KatzenbeisserSV05,
  author       = {Stefan Katzenbeisser and
                  Christian Schallhart and
                  Helmut Veith},
  editor       = {Hannes Federrath},
  title        = {Malware Engineering},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {139--148},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28365},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KatzenbeisserSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KesdoganR05,
  author       = {Dogan Kesdogan and
                  Oliver Rattay},
  editor       = {Hannes Federrath},
  title        = {Sicherheitsbewertung von Anonymisierungsverfahren im World Wide Web},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {233--244},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28376},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KesdoganR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/KochP05,
  author       = {Manuel Koch and
                  Karl Pauls},
  editor       = {Hannes Federrath},
  title        = {Model-driven development of access control aspects},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {273--284},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28382},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/KochP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LaskovRSM05,
  author       = {Pavel Laskov and
                  Konrad Rieck and
                  Christin Sch{\"{a}}fer and
                  Klaus{-}Robert M{\"{u}}ller},
  editor       = {Hannes Federrath},
  title        = {Visualization of anomaly detection using prediction sensitivity},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {197--208},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28373},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LaskovRSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MeierS05,
  author       = {Michael Meier and
                  Sebastian Schmerl},
  editor       = {Hannes Federrath},
  title        = {Effiziente Analyseverfahren f{\"{u}}r Intrusion-Detection-Systeme},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {209--220},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28374},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MeierS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MrugallaM05,
  author       = {Christian Mrugalla and
                  S{\"{o}}nke Maseberg},
  editor       = {Hannes Federrath},
  title        = {IT-Grundschutz-basierendes Sicherheitskonzept f{\"{u}}r die Virtuelle
                  Poststelle des Bundes},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {11--14},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28361},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MrugallaM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MurmannR05,
  author       = {Tobias Murmann and
                  Heiko Rossnagel},
  editor       = {Hannes Federrath},
  title        = {Sicherheitsanalyse von Betriebssystemen f{\"{u}}r Mobile Endger{\"{a}}te},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {129--138},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28364},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MurmannR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/NoweyFKP05,
  author       = {Thomas Nowey and
                  Hannes Federrath and
                  Christian Klein and
                  Klaus Pl{\"{o}}{\ss}l},
  editor       = {Hannes Federrath},
  title        = {Ans{\"{a}}tze zur Evaluierung von Sicherheitsinvestitionen},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {15--26},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28372},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/NoweyFKP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Pimenidis05,
  author       = {Lexi Pimenidis},
  editor       = {Hannes Federrath},
  title        = {A Practical Approach to Tranparent und Usable Anonymity Networks},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {245--248},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28377},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Pimenidis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PlosslFN05,
  author       = {Klaus Pl{\"{o}}{\ss}l and
                  Hannes Federrath and
                  Thomas Nowey},
  editor       = {Hannes Federrath},
  title        = {Schutzm{\"{o}}glichkeiten gegen Phishing},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {161--164},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28367},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PlosslFN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/PriebeDMP05,
  author       = {Torsten Priebe and
                  Wolfgang Dobmeier and
                  Bj{\"{o}}rn Muschall and
                  G{\"{u}}nther Pernul},
  editor       = {Hannes Federrath},
  title        = {{ABAC} - Ein Referenzmodell f{\"{u}}r attributbasierte Zugriffskontrolle},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {285--296},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28384},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/PriebeDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ReicheltR05,
  author       = {Dirk Reichelt and
                  Franz Rothlauf},
  editor       = {Hannes Federrath},
  title        = {Verfahren zur Bestimmung der Zuverl{\"{a}}ssigkeit von Kommunikationsnetzwerken:
                  Eine Studie zu exakten und approximativen Verfahren},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {89--100},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28403},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ReicheltR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/RothmaierK05,
  author       = {Gerrit Rothmaier and
                  Heiko Krumm},
  editor       = {Hannes Federrath},
  title        = {Formale Modellierung und Analyse protokollbasierter Angriffe in {TCP/IP}
                  Netzwerken am Beispiel von {ARP} und {RIP}},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {77--88},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28402},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/RothmaierK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Santen05,
  author       = {Thomas Santen},
  editor       = {Hannes Federrath},
  title        = {Probabilistic Confidentiality Properties based on Indistinguishability},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {113--124},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28362},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Santen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Schreiber05,
  author       = {Susanne Schreiber},
  editor       = {Hannes Federrath},
  title        = {{\"{A}}nderungen im Hinblick auf die Beantragung qualifizierter
                  elektronischer Signaturen gem{\"{a}}{\ss} dem 1. Sig{\"{A}}ndG
                  - Eine kritische W{\"{u}}rdigung},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {327--330},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28388},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Schreiber05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/VielhauerDHW05,
  author       = {Claus Vielhauer and
                  Jana Dittmann and
                  Christian Helmholz and
                  Marten Wenzel},
  editor       = {Hannes Federrath},
  title        = {Multifaktorielle Benutzerauthentifizierung durch {PAM} und Fingerabdruck
                  f{\"{u}}r Linux Infrastrukturen},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {309--312},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28386},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/VielhauerDHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld05,
  author       = {Andreas Westfeld},
  editor       = {Hannes Federrath},
  title        = {Nutzung der Nachbarkorrelation f{\"{u}}r Steganalyse mit erh{\"{o}}hter
                  Zuverl{\"{a}}ssigkeit},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {53--64},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28400},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Wohner05,
  author       = {Thomas W{\"{o}}hner},
  editor       = {Hannes Federrath},
  title        = {Analyse und Bewertung von Kopierschutzverfahren f{\"{u}}r Audio-CDs},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {175--188},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28369},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Wohner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Hannes Federrath},
  title        = {Applications of Multivariate Quadratic Public Key Systems},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {413--424},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28398},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfWP05,
  author       = {Marko Wolf and
                  Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  editor       = {Hannes Federrath},
  title        = {Digital Rights Management Systeme {(DRMS)} als Enabling Technology
                  im Automobil},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {193--196},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28371},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WunderlichS05,
  author       = {Torsten Wunderlich and
                  Siegfried Staude},
  editor       = {Hannes Federrath},
  title        = {Online - Patenanmeldung},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {397--400},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28396},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WunderlichS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ZmudzinskiS05,
  author       = {Sascha Zmudzinski and
                  Martin Steinebach},
  editor       = {Hannes Federrath},
  title        = {Vertrauensw{\"{u}}rdigkeit von Audiodaten - Digitale Wasserzeichen
                  und Verifikation der semantischen Integrit{\"{a}}t},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {65--76},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28401},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ZmudzinskiS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2005,
  editor       = {Hannes Federrath},
  title        = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28360},
  isbn         = {3-88579-391-1},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}