Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments (Paper) Evaluating Behavioral Biometrics for Continuous Authentication (Paper)
Person Re-identification in 3D Space: A WiFi Vision-based Approach (Paper)
Mobile Security
XApp: Unauthorized Cross-App Resource Access on MAC OS X and iOS (Paper) Angriff auf Sparkassen TAN-App (Informationen, zweiter Angriff)
On App-based Matrix Code Authentication in Online Banking (Paper, News)
HTTP Strict Transport Security (HSTS, News1, News2, Attack) HTTP Public Key Pinning (HPKP) CA & Pinning list administration in browsers like Firefox, Chrome, Safari, and Internet Explorer (Mozilla, News) DigiNotar Attack (News)
Web of Trust Services (Website, News1, News2, iX 01/17:54, Web of Trust) [Experiments] Privacy and Web Robots (c't 2017/13–168, c't 2017/12–170) [Experiments]
How To Prove Yourself: Practical Solutions to Identification and Signature Problems (Paper) Publicly Verifiable Non-Interactive Zero-Knowledge Proofs (Paper)
In order to improve performance and enhance the user experience for the visitors to our website, we use cookies and store anonymous usage data. For more information please read our privacy policy.