ACM conferences have a mobile app
Right to be forgotten
2019 - Florian Farke, Jan Rensinghoff, Markus Dürmuth, Tobias GostomzykData protection and data security (2019) 43: 681 [Springer]
POSTER: "What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
2019 - Miranda Wei, Maximilian Golla, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa Redmiles, Blase UrUSENIX Symposium on Usable Privacy and Security 2019 (SOUPS '19). Santa Clara, CA, USA, August 11-13, 2019 [Full Version]
We Value Your Privacy - Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy
2019 - Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten HolzNetwork and Distributed System Security Symposium (NDSS 2019), San Diego, California, USA, February 2019 [GitHub] [PDF]
"What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
2018 - Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth, Elissa Redmiles, Blase UrACM Conference on Computer and Communications Security 2018 (CCS '18). Toronto, Canada, October 15-19, 2018 [Video] [News] [PDF] [Slides]
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
2018 - Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus Dürmuth, Earlence Fernandes, Blase UrUSENIX Security Symposium 2018 (SSYM '18). Baltimore, MD, USA, August 15-17, 2018 [Video] [News] [PDF] [Slides]
Bars, Badges, and High Scores: On the Impact of Password Strength Visualizations
2018 - Maximilian Golla, Björn Hahn, Karsten Meyer zu Selhausen, Henry Hosseini, Markus DürmuthWho are you?! Adventures in Authentication 2018 (WAY '18). Baltimore, MD, USA, August 12, 2018 [PDF] [Slides]
HAL — The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion
2018 - Marc Fyrbiak, Sebastian Wallat, Pawel Swierczynski, Max Hoffmann, Sebastian Hoppach, Mathias Wilhelm, Tobias Weidlich, Russell Tessier, Christof PaarIEEE Transactions on Dependable and Secure Computing (to appear)
Who are you? A Statistical Approach to Measuring User Authenticity
2016 - David Mandell Freeman, Sakshi Jain, Markus Dürmuth, Battista Biggio, Giorgio GiacintoThe Network and Distributed System Security Symposium 2016 (NDSS '16), San Diego, CA, USA, February 21-24, 2016 [PDF] [Slides]
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
2013 - Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalcin, Ralf ZimmermannComputer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012 [DOI] [BibTeX] [pdf] [bib]
Speaker Recognition in Encrypted Voice Streams
2010 - Michael Backes, Goran Doychev, Markus Dürmuth, Boris KöpfProceedings European Symposium on Research in Computer Security (ESORICS), 2010. (Preliminary version appeared in the Grande Region Security and Reliability Day, Saarbrücken, 2010.)
Conditional reactive simulatability
2006 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf KüstersProceedings of 11th European Symposium on Research in Computer Security (ESORICS '06), September 2006.
- What is an ergonomic approach
- Why did the Godhra riots take place
- Can IAS officers have pets?
- What are the multiples of 4
- Which plane would you fly before you died?
- How much construction waste is sent to landfill?
- What is signal linearization
- Where can I buy SMM services
- Is cholesterol high in Dosa or Poori
- What is the best lawn vacuum cleaner
- What causes a really smelly slime
- Should I take mechatronics at SRM
- Are children philosophical
- What are the criticisms of dualism
- How is starkist tuna cooked
- Writes Alex Trebek the Jeopardy questions
- How is idli done
- What is a subroutine
- What is the plasma in human blood
- What is Rootkhp APK
- Can IAS aspirants use social networks?
- Can a trombone soloist sit
- Where does the Christmas tradition come from?
- What does social construction mean
- What are the precautions against tapeworms
- What really happened in Interstellar
- What are your favorite winter memories
- Should I go to UW Madison?
- How do I find an online therapist
- Where can we get SEO projects from
- What fruit is not taken with milk
- How does OYO rent hotels
- Is technology a legal discipline