AG Sichere Identität

Below is a list of publications of AG Sichere Identität. For a short list of recent publications and selected publications, please refer to this page.

See also: BibTeX AG-SI

In Conference Proceedings

  1. Oliver Wiese and Volker Roth.
    See you next time: a model for modern shoulder surfers.
    In Proc. International Conference on Human-Computer Interaction with Moble Devices and Services (MobileHCI), pages 453--464, New York, USA, 2016.
  2. Johannes Klick, Stephan Lau, Matthias Wählisch, and Volker Roth.
    Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection.
    In Proc. ACM Internet Measurement Conference (IMC). ACM, 2016.
  3. Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, and Volker Roth.
    PLC Guard: A practical defense against attacks on cyber-physical systems.
    In Proc. IEEE Conference on Communications And Network Security (CNS), Florence, Italy, September 2015.
  4. Benjamin Güldenring, Volker Roth, and Lars Ries.
    Knock Yourself Out: Secure authentication with short re-usable passwords.
    In Proc. Network and Distributed System Security Symposium (NDSS). The Internet Society, 2015.
  5. Kristian Beilke and Volker Roth.
    A safe update mechanism for smart cards.
    In Proc. 4th Int'l Conference on Principles of Security and Trust (POST), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS), pages 239--258, London, UK, April 2015.
  6. Volker Roth, Benjamin Güldenring, Eleanor Rieffel, Sven Dietrich, and Lars Ries.
    A secure submission system for online whistleblowing platforms.
    In Proc. Financial Cryptography and Data Security, number 7859 in LNCS, pages 354--361, April 2013.
  7. Kristian Beilke and Volker Roth.
    FlexCOS: An open smartcard platform for research and education.
    In Proc. 6th Int'l Conference on Network and System Security, pages 277--290, Wuyishan, Fujian, China, November 2012.
  8. Volker Roth, Philipp Schmidt, and Benjamin Güldenring.
    The IR Ring: Authenticating users' touches on a multi-touch display.
    In Proc. UIST, 2010.
  9. Volker Roth and Thea Turner.
    Bezel swipe: Conflict-free scrolling and multiple selection on mobile touch screen devices.
    In Proc. CHI, pages 1523--1526, 2009.
  10. Volker Roth, Wolfgang Polak, Eleanor Rieffel, and Thea Turner.
    Simple and effective defenses against evil twin access points.
    In Proc. ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, USA, March 2008.
  11. Sherman S. Chow, Volker Roth, and Eleanor Rieffel.
    General certificateless encryption and timed-release encryption.
    In Proc. 6th Int'l Conference on Security and Cryptography for Networks (SCN), pages 126--143, Berlin, Heidelberg, 2008. Springer-Verlag.
  12. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, and Ion Stoica.
    Reliable broadcast in unknown fixed-identity networks.
    In Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pages 342--351, New York, NY, USA, 2005.
  13. Volker Roth, Ulrich Pinsdorf, and Jan Peters.
    A distributed content-based search engine based on mobile code.
    In Proc. ACM Symposium on Applied Computing (SAC), pages 66--73, New York, NY, USA, March 2005.
  14. Volker Roth, Kai Richter, and Rene Freidinger.
    A PIN entry method resilient against shoulder surfing.
    In Proc. ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, October 2004.
  15. Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, and Randy Katz.
    Listen and Whisper -- Security mechanisms for BGP.
    In Proc. Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, March 2004. USENIX/ACM.
  16. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth, and John Hynd.
    Macro-level attention to mobile agent security: Introducing the mobile agent secure hub infrastructure concept.
    In J. Lopez, S. Qing, and E. Okamoto, editors, Proc. Sixth International Conference on Information and Communications Security (ICICS), number 3269 in Lecture Notes in Computer Science. Springer Verlag, October 2004.
  17. Volker Roth.
    Empowering mobile software agents.
    In N. Suri, editor, Proc. 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47--63. Spinger Verlag, October 2002.
    ISBN 3-540-0085-2.
  18. Ulrich Pinsdorf and Volker Roth.
    Mobile agent interoperability patterns and practice.
    In Proc. 9th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, Lund, Sweden, April 2002.
  19. Walter Binder and Volker Roth.
    Secure mobile agent systems using Java -- where are we heading?
    In Proc. ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS), Madrid, Spain, March 2002. ACM.
  20. Volker Roth and Michael Arnold.
    Improved key management for digital watermark monitoring.
    In Proc. SPIE, San Jose, CA, USA, January 2002.
  21. Volker Roth.
    On the robustness of some cryptographic protocols for mobile agent protection.
    In Proc. Mobile Agents, volume 2240 of Lecture Notes in Computer Science. Springer Verlag, December 2001.
  22. Volker Roth and Jan Peters.
    A scalable and secure global tracking service for mobile agents.
    In Proc. Mobile Agents, volume 2240 of Lecture Notes in Computer Science. Springer Verlag, December 2001.
  23. Volker Roth and Mehrdad Jalali.
    Concepts and architecture of a security-centric mobile agent server.
    In Proc. Fifth International Symposium on Autonomous Decentralized Systems (ISADS), pages 435--442, Dallas, Texas, U.S.A., March 2001. IEEE Computer Society.
    ISBN 0-7695-1065-5.
  24. Volker Roth.
    Über die Bedeutung eines statischen Kernes für die Sicherheit Mobiler Software-Agenten.
    In Kommunikationssicherheit im Zeichen des Internet, DuD Fachbeiträge, pages 227--234. Vieweg-Verlag, March 2001.
  25. Volker Roth, Mehrdad Jalali, Roger Hartmann, and Christophe Roland.
    An application of mobile agents as personal assistants in electronic commerce.
    In Jeffrey Bradshaw and Geoff Arnold, editors, Proc. 5th Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM), pages 121--132, Manchester, UK, April 2000.
    ISBN 1-902426-07-X.
  26. Volker Roth.
    Content--based image indexing and retrieval with mobile agents.
    In Proc. First International Symposium on Agent Systems and Applications, and Third International Symposium on Mobile Agents (ASA/MA), pages 260--261, Palm Springs, CA, USA, 1999.

In Journals

  1. Volker Roth, Jan Peters, and Ulrich Pinsdorf.
    A distributed content-based search engine based on mobile code and web service technology.
    Scalable Computing: Practice and Experience, 7(4):101--117, December 2006.
    ISSN 1895-1767.
  2. Walter Binder and Volker Roth.
    Security risks in Java-based mobile code systems.
    Scalable Computing: Practice and Experience, 7(4):1--11, December 2006.
    ISSN 1895-1767.
  3. Volker Roth and Kai Richter.
    How to fend off shoulder surfers.
    Journal of Banking and Finance, 30(6):1727--1751, June 2006.
    Article in Press, doi:10.1016/j.jbankfin.2005.09.010. Submitted November 2005.
  4. Volker Roth, Tobias Straub, and Kai Richter.
    Security and usability engineering with particular attention to electronic mail.
    International Journal of Human-Computer Studies, 63:51--73, July 2005.
    Special Issue HCI research in privacy and security.
  5. Volker Roth.
    Content--based retrieval from digital video.
    Image and Vision Computing, special issue on Content-Based Image Indexing and Retrieval, 17(7):531--540, May 1999.
    ISSN 0262-8856.
  6. Volker Roth and Mehrdad Jalali.
    Access control and key management for mobile agents.
    Computers & Graphics, Special Issue on Data Security in Image Communication and Networks, 22(4):457--461, 1998.

In Peer-Reviewed Workshops

  1. Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, and Volker Roth.
    Internet-facing PLCs as a network backdoor.
    In Proc. IEEE CNS Workshop on Security and Privacy in Cybermatics, Florence, Italy, September 2015.
  2. Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, and Volker Roth.
    Internet-facing PLCs - a new Back Orifice.
    In Black Hat USA, Las Vegas, USA, August 2015.
  3. Oliver Wiese and Volker Roth.
    Pitfalls of shoulder surfing studies.
    In Proc. NDSS Workshop on Usable Security (USEC). Internet Society, February 2015.
  4. Jan-Ole Malchow.
    distpaste -- dein browser gehört zu meinem pastebin! möglichkeiten und risiken von HMTL 5.
    In Proc. 20th DFN Workshop Sicherheit in vernetzten Systemen, Hamburg, February 2013.
    ISBN 9783848257454.
  5. Volker Roth.
    Programming Satan's agents.
    In Klaus Fischer and Dieter Hutter, editors, Proc 1st International Workshop on Secure Mobile Multi-Agent Systems (SEMAS 2001), volume 63 of Electronic Notes in Theoretical Computer Science. Elsevier Science Publishers, 2002.
    ISBN 0444512268.
  6. Volker Roth.
    Scalable and secure global name services for mobile agents.
    In 6th ECOOP Workshop on Mobile Object Systems: Operating System Support, Security and Programming Languages, Sophia Antipolis, France, June 2000.
  7. Volker Roth.
    Distributed image indexing and retrieval with mobile agents.
    In IEE European Workshop on Distributed Imaging, number 1999/109 in IEE Electronics & Communications, pages 14/1--14/5, Savoy Place, London, WC2R 0BL, UK, November 1999. IEE.
    ISSN 0963-3308.
  8. Volker Roth.
    Secure recording of itineraries through cooperating agents.
    In Proc. 4th ECOOP Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pages 147--154, Brussels, Belgium, July 1998. INRIA, Domaine de Voluceau, Rocquencourt, B.P. 105, 78153 Le Chesnay Cedex (France), D\'epot l\'egal 010598/150.

In Magazines, Posters, Invited Articles

  1. Charles Petrie and Volker Roth.
    How badly do you want privacy?
    IEEE Internet Computing, 19(2):92--94, 2015.
  2. Benjamin Güldenring and Volker Roth.
    TouchCtrl: fine-grained access control for collaborative environments.
    In Proc. CCS, pages 1453--1456, November 2013.
  3. Scott Carter, Francine Chen, Patrick Chiu, and Volker Roth.
    Little screen, big document.
    IEEE Spectrum, January 2011.
    [link]
  4. Travis Deyle and Volker Roth.
    Accessible authentication via tactile PIN entry.
    Computer Graphics Topics, 18:24--26, April 2006.
  5. Travis Deyle and Volker Roth.
    Low-cost hardware-based marker tracking.
    Computer Graphics Topics, 18:27--28, April 2006.
  6. Volker Roth.
    Security meets usability: Entering one's PIN in a public space.
    Computer Graphics Topics, 17(4):24--25, 2005.
  7. Volker Roth.
    Obstacles to the adoption of mobile agents.
    In Proc. IEEE Int'l Conference on Mobile Data Management, Berkeley, CA, January 2004. IEEE, ACM SIGMOBILE, ACM SIGMOD.
    Invited panel session.
  8. Volker Roth.
    Java Security Architecture and Extensions.
    Dr. Dobbs Journal, 2002(335), April 2002.
  9. Volker Roth.
    Mobile Agenten Sicherheit.
    Funkschau, 2000(6):48--50, 2000.
  10. Christoph Busch, Volker Roth, and Ralph Meister.
    Perspectives on electronic commerce with mobile agents.
    In S. Rodinov and M. Vinogradov, editors, Proc. 11th Amaldi Conference on Problems of Global Security, pages 89--101, Moscow, Russia, November 1998. Russian Academy of Sciences, Nauka Publishers, 1999.
    ISBN 5-02-022594-0, Invited paper.

Edited Works

  1. L. Miguel Encarnacao and Volker Roth, editors.
    Digital Security Technologies, number 3 in Computer Graphics Topics, Fraunhofer Str. 5, 64283 Darmstadt, Germany, 2006. INI-GraphicsNet, Prof. Dr. Jose L. Encarnacao.
    ISSN 0936-2770. SIGGRAPH Issue.
  2. L. Miguel Encarnacao, Volker Roth, and Joachim Rix, editors.
    User-Centered Visualization and Interface Design, number 4 in Computer Graphics TOPICS, Fraunhofer Str. 5, 64283 Darmstadt, Germany, 2005. INI-GraphicsNet, Prof. Dr. Jose L. Encarnacao.
    ISSN 0936-2770. SIGGRAPH Issue.
  3. Volker Roth, editor.
    Mobile Agents, number 2 in Informatik Forum, TU Wien, Treitlstraße 3, A-1040 Wien, 2002. Forschungsgesellschaft für Informatik.

In Collections

  1. Volker Roth and Philipp Schmidt.
    Pseudonymity and anonymity.
    In Handbook of eID Security: Concepts, Practical Experiences, Technologies, chapter 3, pages 31--44. Publicis Publishing, December 2010.
  2. Jan Peters, Ulrich Pinsdorf, and Volker Roth.
    Sicherheitsaspekte mobiler agenten.
    In Sicherheit und Rechtsverbindlichkeit mobiler Agenten, DuD Fachbeiträge, chapter 3, pages 21--39. Deutscher Universitäts-Verlag, 2007.
  3. Volker Roth.
    Agententechnologie.
    In Sicherheit und Rechtsverbindlichkeit mobiler Agenten, DuD Fachbeiträge, chapter 6, pages 73--89. Deutscher Universitäts-Verlag, 2007.
  4. Kai Richter and Volker Roth.
    Encyclopedia of Human Computer Interaction, chapter Human-Computer Interaction and Security, pages 287--294.
    Information Science Publishing, Idea Group, Inc., USA, December 2005.
  5. Volker Roth.
    Sichere verteilte Indexierung und Suche von digitalen Bildern.
    Forschen und Wissen. GCA-Verlag, Herdecke, Germany, June 2001.
    ISBN 3-89863-051-X.
  6. Volker Roth and Vania Conan.
    Encrypting Java Archives and its application to mobile agent security.
    In Frank Dignum and Carles Sierra, editors, Agent Mediated Electronic Commerce: A European Perspective, volume 1991 of Lecture Notes in Artifical Intelligence, pages 232--244. Springer Verlag, Berlin, 2001.
  7. Volker Roth.
    Mutual protection of co--operating agents.
    In Jan Vitek and Christian Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of Lecture Notes in Computer Science, pages 275--285. Springer-Verlag Inc., New York, NY, USA, 1999.

Patents and Patent Applications

  1. Volker Roth.
    Text-reading support on handheld devices and devices with small displays.
    United States Patent US8217947 B2, Fuji Xerox Co., Ltd., July 2012.
  2. Volker Roth, Laurent Denoue, Qiong Liu, and Scott Carter.
    Systems and methods for interacting with mobile devices using external displays.
    United States Patent US8866699 B2, Fuji Xerox Co., Ltd., October 2014.
  3. Volker Roth.
    Multiple selection on devices with many gestures.
    United States Patent US8924892 B2, Fuji Xerox Co., Ltd., December 2014.
  4. Bee Liew, Trista Chen, and Volker Roth.
    Graphical system and method for user authentication.
    United States Patent US8086745 B2, Fuji Xerox Co., Ltd., December 2011.
  5. Volker Roth and Thea Turner.
    Progress indicators to encourage more secure behaviors.
    United States Patent US8156342 B2, Fuji Xerox Co., Ltd., April 2012.
  6. Volker Roth, Wolfgang Polak, and Eleanor Rieffel.
    System and method for human assisted secure information exchange.
    United States Patent US8429405 B2, Fuji Xerox Co., Ltd., April 2013.
  7. Volker Roth and Althea Turner.
    Finger occlusion avoidance on touch display devices.
    United States Patent Application US20110043453 A1, Fuji Xerox Co., Ltd., August 2009.
  8. Scott Carter, Maribeth Beck, and Volker Roth.
    System and method for automatically controlling avatar actions using mobile sensors.
    United States Patent Application US20090265642 A1, Fuji Xerox Co., Ltd., April 2008.

Technical Reports

  1. Volker Roth, Wolfgang Polak, and Eleanor Rieffel.
    A ring to rule them all, secure and usable pairing with a human sampling function.
    Technical Report FXPAL-TR-06-015, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, February 2007.
  2. Volker Roth, Wolfgang Polak, Eleanor Rieffel, and Thea Turner.
    Simple and effective defenses against evil twin access points.
    Technical Report FXPAL-TR-07-011, FX Palo Alto Laboratory, Inc., 3400 Hillview Ave, Building 4, Palo Alto, CA 94304, September 2007.

Papers Projects Theses People Offices AG-SI CS FUB Imprint