Research article in proceedings (conference)
Böhme, R. (2013). Internet Protocol Adoption: Learning from Bitcoin. In Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT), Cambridge, UK.
More details BibTeX
@inproceedings{Boehme2013InternetProtocol,
author = {Rainer Böhme},
title = {Internet Protocol Adoption: Learning from Bitcoin},
booktitle = {Proceedings of the IAB Workshop on Internet Technology Adoption and Transition (ITAT)},
editor = {Architecture Board Internet},
year = {2013},
address = {Cambridge, UK},
note = {Publication status: Published}
}
Bruns, I., & Luhn, S. (2013). Verbraucherschutz durch Mitentscheidung bei Online-Verträgen. In Proceedings of the Law as a Service (LaaS) — Recht im Internet- und Cloud-Zeitalter, Tagungsband Herbstakademie 2013, Berlin, 859–874.
More details BibTeX
@inproceedings{BrunsL2013Verbraucherschutz,
author = {Ina Bruns and Sebastian Luhn},
title = {Verbraucherschutz durch Mitentscheidung bei Online-Verträgen},
booktitle = {Proceedings of the Law as a Service (LaaS) --- Recht im Internet- und Cloud-Zeitalter, Tagungsband Herbstakademie 2013},
pages = {859--874},
volume = {2},
year = {2013},
address = {Berlin},
note = {Publication status: Published}
}
Ker, A. D., Bas, P., Böhme, R., Cogranne, R., Craver, S., Filler, T., Fridrich, J., & Pevny, T. (2013). Moving steganography and steganalysis from the laboratory into the real world. In Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, 45–58.
More details BibTeX DOI
@inproceedings{KerBBCCFFP2013MovingSteganography,
author = {Andrew D. Ker and Patrick Bas and Rainer Böhme and Remi Cogranne and Scott Craver and Tomas Filler and Jessica Fridrich and Tomas Pevny},
title = {Moving steganography and steganalysis from the laboratory into the real world},
booktitle = {Proceedings of the 1$^{st}$ ACM Workshop on Information Hiding and Multimedia Security},
pages = {45--58},
year = {2013},
publisher = {ACM Press},
address = {New York},
doi = {10.1145/2482513.2482965},
note = {Publication status: Published}
}
Kirchner, M., Winkler, P., & Farid, H. (2013). Impeding Forgers at Photo Inception. In Proceedings of the Media Watermarking, Security, and Forensics 2013, San Francisco, CA.
More details BibTeX Full text DOI
@inproceedings{KirchnerWF2013ImpedingForgers,
author = {Matthias Kirchner and Peter Winkler and Hany Farid},
title = {Impeding Forgers at Photo Inception},
booktitle = {Proceedings of the Media Watermarking, Security, and Forensics 2013},
series = {Proceedings of SPIE},
volume = {8665},
editor = {M. Adnan Alattar and D. Nasir Memon and D. Chad Heitzenrater},
year = {2013},
publisher = {SPIE},
address = {Bellingham, WA},
doi = {10.1117/12.2008412},
url = {http://www.cs.dartmouth.edu/farid/downloads/publications/spie13.pdf},
note = {Publication status: Published}
}
Korff, S. (2013). PETs in Your Home — How Smart is That?. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS), Newcastle, UK.
More details BibTeX
@inproceedings{Korff2013PETsInYour,
author = {Stefan Korff},
title = {PETs in Your Home --- How Smart is That?},
booktitle = {Proceedings of the Workshop on Home Usable Privacy and Security (HUPS)},
year = {2013},
address = {Newcastle, UK},
note = {Publication status: Published}
}
Lai, S., & Böhme, R. (2013). Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, 3028–3032.
More details BibTeX DOI
@inproceedings{LaiB2013BlockConvergence,
author = {ShiYue Lai and Rainer Böhme},
title = {Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection.},
booktitle = {Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013},
pages = {3028--3032},
year = {2013},
publisher = {IEEE},
address = {Vancouver, BC, Canada},
issn = {1520-6149},
doi = {10.1109/ICASSP.2013.6638214},
note = {Publication status: Published}
}
Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., & Böhme, R. (2013). Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, Egham, Großbritannien, 273–290.
More details BibTeX Full text DOI
@inproceedings{LaszkaJSGB2013ManagingThe,
author = {A. Laszka and B. Johnson and P. Schöttle and J. Grossklags and R. Böhme},
title = {Managing the weakest link: A game-theoretic approach for the mitigation of insider threats},
booktitle = {Proceedings of the 18$^{th}$ European Symposium on Research in Computer Security, ESORICS 2013},
pages = {273--290},
series = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
volume = {null},
year = {2013},
address = {Egham, Großbritannien},
isbn = {9783642402029},
issn = {1611-3349},
doi = {10.1007/978-3-642-40203-6_16},
url = {http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=84884766446},
note = {Publication status: Published}
}
Möser, M., Böhme, R., & Breuker, D. (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013), San Francisco, USA.
More details BibTeX
@inproceedings{MoeserBB2013AnInquiryInto,
author = {Malte Möser and Rainer Böhme and Dominic Breuker},
title = {An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem},
booktitle = {Proceedings of the APWG eCrime Researchers Summit (ECRIME 2013)},
year = {2013},
address = {San Francisco, USA},
note = {Publication status: Published}
}
Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., & Boehme, R. (2013). A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding. In Proceedings of the 21th European Signal Processing Conference (EUSIPCO), 2013, Marrakech, Morocco. (online first)
More details BibTeX
@inproceedings{SchoettleLJGB2013AGameTheoretic,
author = {Pascal Schöttle and Aron Laszka and Benjamin Johnson and Jens Grossklags and Rainer Boehme},
title = {A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding},
booktitle = {Proceedings of the 21$^{th}$ European Signal Processing Conference (EUSIPCO), 2013},
year = {2013},
address = {Marrakech, Morocco},
note = {Publication status: online first}
}