Research article in proceedings (conference)
Boehm, F., & Böhme, R. (2014). Improving Informed Consent for Consumers in E-Commerce — An Interdisciplinary Perspective. In Proceedings of the Privacy Law Scholars Conference (PLCS), Washington, DC.
More details BibTeX Full text
@inproceedings{BoehmB2014ImprovingInformed,
author = {Franziska Boehm and Rainer Böhme},
title = {Improving Informed Consent for Consumers in E-Commerce --- An Interdisciplinary Perspective},
booktitle = {Proceedings of the Privacy Law Scholars Conference (PLCS)},
year = {2014},
address = {Washington, DC},
url = {http://www.law.berkeley.edu/plsc.htm},
note = {Publication status: Published}
}
Boehm, P. (2014). Bitcoin: A First Legal Analysis — with references to German and US-American Law. In Proceedings of the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 2014, Barbados.
More details BibTeX Full text DOI
@inproceedings{Boehm2014BitcoinAFirst,
author = {Pesch Boehm},
title = {Bitcoin: A First Legal Analysis --- with references to German and US-American Law},
booktitle = {Proceedings of the 1$^{st}$ Workshop on Bitcoin Research in Assocation with Financial Crypto 2014},
year = {2014},
address = {Barbados},
doi = {10.1007/978-3-662-44774-1_4},
url = {http://link.springer.com/chapter/10.1007%2F978-3-662-44774-1_4#page-1},
note = {Publication status: Published}
}
Carnein, M., Schöttle, P., & Böhme, R. (2014). Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes. In Unterweger, A., Uhl, A., Katzenbeisser, S., Kwitt, R., & Piva, A. (Eds.), Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14) (pp. 97–108). New York, NY, USA: ACM.
More details BibTeX DOI
@inproceedings{CarneinSB2014Predictable,
author = {Matthias Carnein and Pascal Schöttle and Rainer Böhme},
title = {Predictable Rain? Steganalysis of Public-key Steganography Using Wet Paper Codes},
booktitle = {Proceedings of the 2$^{nd}$ ACM Workshop on Information Hiding and Multimedia Security (IH & MMSec '14)},
pages = {97--108},
editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva},
year = {2014},
publisher = {ACM},
address = {New York, NY, USA},
isbn = {978-1-4503-2647-6},
doi = {10.1145/2600918.2600942},
note = {Publication status: Published}
}
Fechner, N., & Kirchner, M. (2014). The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings. In Proceedings of the 8th International Conference on IT Security Incident Management & IT Forensics (IMF), Münster, 3–13.
More details BibTeX Full text DOI
@inproceedings{FechnerK2014TheHumming,
author = {Niklas Fechner and Matthias Kirchner},
title = {The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings},
booktitle = {Proceedings of the 8$^{th}$ International Conference on IT Security Incident Management & IT Forensics (IMF)},
pages = {3--13},
year = {2014},
publisher = {IEEE},
address = {Münster},
doi = {10.1109/IMF.2014.14},
url = {http://www.is.uni-muenster.de/security/publications/FK2014_ENF-mobile-devices.pdf},
note = {Publication status: Published}
}
Kirchner, M., & Böhme, R. (2014). Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Florence, Italy, 4010–4014.
More details BibTeX Full text DOI
@inproceedings{KirchnerB2014Steganalysis,
author = {Matthias Kirchner and Rainer Böhme},
title = {Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers},
booktitle = {Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
pages = {4010--4014},
year = {2014},
publisher = {IEEE},
address = {Florence, Italy},
doi = {10.1109/ICASSP.2014.6854349},
url = {http://www.is.uni-muenster.de/security/publications/KB2014_WS-CFA.pdf},
note = {Publication status: Published}
}
Korff, S., & Böhme, R. (2014). Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), Menlo Park, CA, USA.
More details BibTeX Full text
@inproceedings{KorffB2014TooMuchChoice,
author = {Stefan Korff and Rainer Böhme},
title = {Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation},
booktitle = {Proceedings of the Symposium on Usable Privacy and Security (SOUPS)},
year = {2014},
address = {Menlo Park, CA, USA},
url = {https://www.usenix.org/system/files/soups14-paper-korff.pdf},
note = {Publication status: Published}
}
Luhn, S., Bruns, I., & Böhme, R. (2014). Consumer Participation in Online Contracts — Exploring Cross-Out Clauses. In Proceedings of the GI Sicherheit 2014, Wien, Österreich, 255–270.
More details BibTeX
@inproceedings{LuhnBB2014ConsumerParticipation,
author = {S Luhn and I Bruns and R Böhme},
title = {Consumer Participation in Online Contracts --- Exploring Cross-Out Clauses},
booktitle = {Proceedings of the GI Sicherheit 2014},
pages = {255--270},
editor = {S Katzenbeisser and V Lotz and E Weippl},
year = {2014},
address = {Wien, Österreich},
note = {Publication status: Published}
}
Möser, M., Böhme, R., & Breuker, D. (2014). Towards Risk Scoring of Bitcoin Transactions. In Proceedings of the 1st Workshop on Bitcoin Research in Assocation with Financial Crypto 14, Barbados, 1–16.
More details BibTeX
@inproceedings{MoeserBB2014TowardsRisk,
author = {Malte Möser and Rainer Böhme and Dominic Breuker},
title = {Towards Risk Scoring of Bitcoin Transactions},
booktitle = {Proceedings of the 1$^{st}$ Workshop on Bitcoin Research in Assocation with Financial Crypto 14},
pages = {1--16},
year = {2014},
address = {Barbados},
note = {Publication status: Published}
}
Quiring, E., & Schöttle, P. (2014). On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks. In Proceedings of the Information Hiding and Multimedia Security Workshop, Salzburg, Austria, 41–48.
More details BibTeX
@inproceedings{QuiringS2014OnTheCombination,
author = {Erwin Quiring and Pascal Schöttle},
title = {On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks},
booktitle = {IH&MMSec 14 Proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop},
pages = {41--48},
year = {2014},
publisher = {ACM},
address = {Salzburg, Austria},
note = {Publication status: Published}
}
Riek, M., Böhme, R., & Moore, T. (2014). Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users. In Proceedings of the 13th Workshop on the Economics of Information Security (WEIS), The Pennsylvania State University, State College, Pennsylvania. (accepted / in press (not yet published))
More details BibTeX Full text
@inproceedings{RiekBM2014Understanding,
author = {Markus Riek and Rainer Böhme and Tyler Moore},
title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of European Internet Users},
booktitle = {Proceedings of the 13$^{th}$ Workshop on the Economics of Information Security (WEIS)},
year = {2014},
address = {The Pennsylvania State University, State College, Pennsylvania},
url = {http://weis2014.econinfosec.org/papers/RiekBoehmeMoore-WEIS2014.pdf},
note = {Publication status: accepted / in press (not yet published)}
}