AG Sichere Identität

Below is a selection of publications of AG Sichere Identität. For a full list of, please refer to this page.

See also: BibTeX

Recent Publications

  1. Oliver Wiese and Volker Roth.
    See you next time: a model for modern shoulder surfers.
    In Proc. International Conference on Human-Computer Interaction with Moble Devices and Services (MobileHCI), pages 453--464, New York, USA, 2016.
    Received best paper award!
  2. Johannes Klick, Stephan Lau, Matthias Wählisch, and Volker Roth.
    Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection.
    In Proc. ACM Internet Measurement Conference (IMC). ACM, 2016.
  3. Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs and Volker Roth.
    PLC Guard: A practical defense against attacks on cyber-physical systems.
    In Proc. IEEE Conference on Communications And Network Security (CNS), Florence, Italy, September 2015.
  4. Benjamin Güldenring, Volker Roth and Lars Ries.
    Knock Yourself Out: Secure authentication with short re-usable passwords.
    In Proc. Network and Distributed System Security Symposium (NDSS). The Internet Society, 2015.
  5. Kristian Beilke and Volker Roth.
    A safe update mechanism for smart cards.
    In Proc. 4th Int'l Conference on Principles of Security and Trust (POST), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS), pages 239--258, London, UK, April 2015.
  6. Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow and Volker Roth.
    Internet-facing PLCs as a network backdoor.
    In Proc. IEEE CNS Workshop on Security and Privacy in Cybermatics, Florence, Italy, September 2015.
  7. Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow and Volker Roth.
    Internet-facing PLCs -- a new Back Orifice.
    In Black Hat USA, Las Vegas, USA, August 2015.
  8. Oliver Wiese and Volker Roth.
    Pitfalls of shoulder surfing studies.
    In Proc. NDSS Workshop on Usable Security (USEC). Internet Society, February 2015.
  9. Charles Petrie and Volker Roth.
    How badly do you want privacy?
    IEEE Internet Computing, 19(2):92--94, 2015.

Selected Publications

  1. Benjamin Güldenring, Volker Roth and Lars Ries.
    Knock Yourself Out: Secure authentication with short re-usable passwords.
    In Proc. Network and Distributed System Security Symposium (NDSS). The Internet Society, 2015.
  2. Volker Roth, Benjamin Güldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries.
    A secure submission system for online whistleblowing platforms.
    In Proc. Financial Cryptography and Data Security, number 7859 in LNCS, pages 354--361, April 2013.
  3. Volker Roth, Philipp Schmidt and Benjamin Güldenring.
    The IR Ring: Authenticating users' touches on a multi-touch display.
    In Proc. UIST, 2010.
  4. Volker Roth and Thea Turner.
    Bezel swipe: Conflict-free scrolling and multiple selection on mobile touch screen devices.
    In Proc. CHI, pages 1523--1526, 2009.
  5. Volker Roth, Wolfgang Polak, Eleanor Rieffel and Thea Turner.
    Simple and effective defenses against evil twin access points.
    In Proc. ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, USA, March 2008.
  6. Volker Roth, Tobias Straub and Kai Richter.
    Security and usability engineering with particular attention to electronic mail.
    International Journal of Human-Computer Studies, 63:51--73, July 2005.
    Special Issue HCI research in privacy and security.
  7. Volker Roth, Kai Richter and Rene Freidinger.
    A PIN entry method resilient against shoulder surfing.
    In Proc. ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 2004.
  8. Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker and Randy Katz.
    Listen and Whisper -- Security mechanisms for BGP.
    In Proc. Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004. USENIX/ACM.

Papers Projects Theses People Offices AG-SI CS FUB Imprint