Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 310 | 2015 |
SoK: secure messaging N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith 2015 IEEE Symposium on Security and Privacy, 232-249, 2015 | 308 | 2015 |
Rethinking SSL development in an appified world S Fahl, M Harbach, H Perl, M Koetter, M Smith Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 241 | 2013 |
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 102 | 2019 |
Why Eve and Mallory (also) love webmasters: A study on the root causes of SSL misconfigurations S Fahl, Y Acar, H Perl, M Smith Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 76 | 2014 |
Hey, nsa: Stay away from my market! future proofing app markets against powerful attackers S Fahl, S Dechand, H Perl, F Fischer, J Smrcek, M Smith proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 65 | 2014 |
Poster: an implementation of the fully homomorphic Smart-Vercauteren crypto-system H Perl, M Brenner, M Smith Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 50 | 2011 |
You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores H Perl, S Fahl, M Smith Financial Cryptography, 2014 | 48 | 2014 |
How practical is homomorphically encrypted program execution? an implementation and performance evaluation M Brenner, H Perl, M Smith 2012 ieee 11th international conference on trust, security and privacy in …, 2012 | 34 | 2012 |
Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography H Perl, Y Mohammed, M Brenner, M Smith 2012 IEEE 8th International Conference on E-Science, 1-8, 2012 | 32 | 2012 |
Practical Applications of Homomorphic Encryption. M Brenner, H Perl, M Smith SECRYPT, 5-14, 2012 | 27 | 2012 |
Privacy/performance trade-off in private search on bio-medical data H Perl, Y Mohammed, M Brenner, M Smith Future Generation Computer Systems 36, 441-452, 2014 | 18 | 2014 |
VCCFinder H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 3 | 2015 |
Security and Data Analysis H Perl Universitäts-und Landesbibliothek Bonn, 2017 | | 2017 |
Hey, NSA S Fahl, S Dechand, H Perl, F Fischer, J Smrcek, M Smith Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | | 2014 |
An Evaluation System For SSL Validation Schemes H Perl, S Fahl, M Smith | | |