Forschungsartikel (Buchbeitrag)
Böhme, R., & Grossklags, J. (2013). Trading Agent Kills Market Information: Evidence from Online Social Lending. In Chen, Y., & Immorlica, N. (Eds.), Web and Internet Economics, 9th International Conference, WINE 2013, Cambridge, MA, USA (pp. 68–81). Lecture Notes in Computer Science: Vol. 8289. Berlin Heidelberg: Springer.
Mehr Details BibTeX
@incollection{BoehmeG2013TradingAgent,
author = {Rainer Böhme and Jens Grossklags},
title = {Trading Agent Kills Market Information: Evidence from Online Social Lending},
booktitle = {Web and Internet Economics, 9$^{th}$ International Conference, WINE 2013, Cambridge, MA, USA},
pages = {68--81},
series = {Lecture Notes in Computer Science},
volume = {8289},
editor = {Yiling Chen and Nicole Immorlica},
year = {2013},
publisher = {Springer},
address = {Berlin Heidelberg},
note = {Publication status: Published}
}
Böhme, R., & Kirchner, M. (2013). Counter-Forensics: Attacking Image Forensics. In Sencar, H. T., & Memon, N. D. (Eds.), Digital Image Forensics: There is More to a Picture Than Meets the Eye (pp. 327–366). New York: Springer.
Mehr Details BibTeX Gesamter Text DOI
@incollection{BoehmeK2013CounterForensics,
author = {Rainer Böhme and Matthias Kirchner},
title = {Counter-Forensics: Attacking Image Forensics},
booktitle = {Digital Image Forensics: There is More to a Picture Than Meets the Eye},
pages = {327--366},
editor = {Husrev T. Sencar and Nasir D. Memon},
year = {2013},
publisher = {Springer},
address = {New York},
doi = {10.1007/978-1-4614-0757-7_12},
url = {http://www.wi.uni-muenster.de/security/publications/BK2012_Counter_Forensics_preprint.pdf},
note = {Publication status: Published}
}
Johnson, B., Schöttle, P., Laszka, A., Grossklags, J., & Böhme, R. (2013). Bitspotting: Detecting Optimal Adaptive Steganography. In Shi, Y. Q., Kim, H.-J., & Pérez-González, F. (Eds.), Digital Forensics and Watermaking (pp. 1–15). Lecture Notes in Computer Science. Berlin Heidelberg: Springer. (online first)
Mehr Details BibTeX
@incollection{JohnsonSLGB2013Bitspotting,
author = {Benjamin Johnson and Pascal Schöttle and Aron Laszka and Jens Grossklags and Rainer Böhme},
title = {Bitspotting: Detecting Optimal Adaptive Steganography},
booktitle = {Digital Forensics and Watermaking},
pages = {1--15},
series = {Lecture Notes in Computer Science},
editor = { Yun Q. Shi and Hyoung-Joong Kim and Fernando Pérez-González},
year = {2013},
publisher = {Springer},
address = {Berlin Heidelberg},
note = {Publication status: online first}
}
Schöttle, P., & Böhme, R. (2013). Die totale Transparenz. In Dabrowski, M., Wolf, J., & Abmeier, K. (Eds.), Ethische Herausforderungen im Web 2.0 (pp. 1–23). Schöningh. (online first)
Mehr Details BibTeX
@incollection{SchoettleB2013DieTotaleTransparenz,
author = {Pascal Schöttle and Rainer Böhme},
title = {Die totale Transparenz},
booktitle = {Ethische Herausforderungen im Web 2.0},
pages = {1--23},
editor = {Martin Dabrowski and Judith Wolf and Karlies Abmeier},
year = {2013},
publisher = {Schöningh},
note = {Publication status: online first}
}
Forschungsartikel in Sammelband (Konferenz)
Böhme, R. (2013). Internet Protocol Adoption: Learning from Bitcoin. In Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK.
Mehr Details BibTeX
@inproceedings{Boehme2013InternetProtocol,
author = {Rainer Böhme},
title = {Internet Protocol Adoption: Learning from Bitcoin},
booktitle = {Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT)},
editor = {Architecture Board Internet},
year = {2013},
address = {Cambridge, UK},
note = {Publication status: Published}
}
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevny, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 45–58.
Mehr Details BibTeX DOI
@inproceedings{KerBBCCFFP2013MovingSteganography,
author = {Andrew D. Ker and Patrick Bas and Rainer Böhme and Remi Cogranne and Scott Craver and Tomas Filler and Jessica Fridrich and Tomas Pevny},
title = {Moving steganography and steganalysis from the laboratory into the real world},
booktitle = {Proceedings of the 1$^{st}$ ACM Workshop on Information Hiding and Multimedia Security},
pages = {45--58},
year = {2013},
publisher = {ACM Press},
address = {New York},
doi = {10.1145/2482513.2482965},
note = {Publication status: Published}
}
Lai, S., & Böhme, R. (2013). Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 3028–3032.
Mehr Details BibTeX DOI
@inproceedings{LaiB2013BlockConvergence,
author = {ShiYue Lai and Rainer Böhme},
title = {Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection.},
booktitle = {Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013},
pages = {3028--3032},
year = {2013},
publisher = {IEEE},
address = {Vancouver, BC, Canada},
issn = {1520-6149},
doi = {10.1109/ICASSP.2013.6638214},
note = {Publication status: Published}
}
Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2013). Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien, 273–290.
Mehr Details BibTeX Gesamter Text DOI
@inproceedings{LaszkaJSGB2013ManagingThe,
author = {A. Laszka and B. Johnson and P. Schöttle and J. Grossklags and R. Böhme},
title = {Managing the weakest link: A game-theoretic approach for the mitigation of insider threats},
booktitle = {Proceedings of the 18$^{th}$ European Symposium on Research in Computer Security, ESORICS 2013},
pages = {273--290},
series = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {null},
year = {2013},
address = {Egham, Großbritannien},
isbn = {9783642402029},
issn = {1611-3349},
doi = {10.1007/978-3-642-40203-6_16},
url = {http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=84884766446},
note = {Publication status: Published}
}
Möser, M., Böhme, R., & Breuker, D. (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013), San Francisco, USA.
Mehr Details BibTeX
@inproceedings{MoeserBB2013AnInquiryInto,
author = {Malte Möser and Rainer Böhme and Dominic Breuker},
title = {An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem},
booktitle = {Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013)},
year = {2013},
address = {San Francisco, USA},
note = {Publication status: Published}
}
Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., & Boehme, R. (2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. In Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. (online first)
Mehr Details BibTeX
@inproceedings{SchoettleLJGB2013AGameTheoretic,
author = {Pascal Schöttle and Aron Laszka and Benjamin Johnson and Jens Grossklags and Rainer Boehme},
title = {A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding},
booktitle = {Proceedings of the 21$^{th}$ European Signal Processing Conference (EUSIPCO), 2013},
year = {2013},
address = {Marrakech, Morocco},
note = {Publication status: online first}
}