Ulrike Meyer

Orcid: 0000-0002-2569-1042

Affiliations:
  • RWTH Aachen University, Germany


According to our database1, Ulrike Meyer authored at least 95 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem.
CoRR, 2023

Behind the Screens: The Security & Privacy Advice Landscape of Children in Grades 5 & 6.
Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research, 2023

False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Privacy-Preserving Fully Online Matching with Deadlines.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Exploring and Evaluating Different Game Mechanics for Anti-Phishing Learning Games.
Int. J. Serious Games, 2022

Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version).
IACR Cryptol. ePrint Arch., 2022

Secure Maximum Weight Matching Approximation on General Graphs (Full Version).
IACR Cryptol. ePrint Arch., 2022

A Pipeline for DNS-Based Software Fingerprinting.
CoRR, 2022

Secure Maximum Weight Matching Approximation on General Graphs.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Accurate Real-Time Labeling of Application Traffic.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails.
Proceedings of the Games and Learning Alliance: 11th International Conference, 2022

Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games.
Proceedings of the 14th International Conference on Computer Supported Education, 2022

Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Detecting Unknown DGAs without Context Information.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection.
CoRR, 2021

A Modular Architecture for Personalized Learning Content in Anti-Phishing Learning Games.
Proceedings of the Software Engineering 2021 Satellite Events, Braunschweig/Virtual, Germany, February 22, 2021

Towards Privacy-Preserving Classification-as-a-Service for DGA Detection.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

Exploring Different Game Mechanics for Anti-phishing Learning Games.
Proceedings of the Games and Learning Alliance - 10th International Conference, 2021

The More, the Better: A Study on Collaborative Machine Learning for DGA Detection.
Proceedings of the CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, 2021

Towards Secure Evaluation of Online Functionalities.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

First Step Towards EXPLAINable DGA Multiclass Classification.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
A Privacy-Preserving Protocol for the Kidney Exchange Problem.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

Towards Personalized Game-Based Learning in Anti-Phishing Education.
Proceedings of the 20th IEEE International Conference on Advanced Learning Technologies, 2020

No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Analyzing the real-world applicability of DGA classifiers.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Privacy - Preserving Multi-Party Conditional Random Selection.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2018
FANCI : Feature-based Automated NXDomain Classification and Intelligence.
Proceedings of the 27th USENIX Security Symposium, 2018

Privacy-Preserving Subgraph Checking.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Privacy-Preserving Trade Chain Detection.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques.
J. Comput. Secur., 2017

Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries.
IACR Cryptol. ePrint Arch., 2017

Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Towards Privacy-Preserving Multi-party Bartering.
Proceedings of the Financial Cryptography and Data Security, 2017

Beyond Lockdown: Towards Reliable e-Assessment.
Proceedings of the Bildungsräume 2017: DeLFI 2017, 2017

Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Applying highly space efficient blacklisting to mobile malware.
Log. J. IGPL, 2016

Privacy-preserving two-party bartering secure against active adversaries.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

B. A. T. M. A. N. Handover Extension for Routing Nodes in Infrastructure WMNs.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Information Hiding in the RSA Modulus.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Anomaly-based Mobile Malware Detection: System Calls as Source for Features.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Classification of Short Messages Initiated by Mobile Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Multi-operator wireless mesh networks secured by an all-encompassing security architecture.
Int. J. Inf. Sec., 2015

Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Privacy-preserving conditional random selection.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Covert remote syscall communication at kernel level: A SPOOKY backdoor.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

2014
Highly Space Efficient Blacklisting.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A secure two-party bartering protocol using privacy-preserving interval operations.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version).
IACR Cryptol. ePrint Arch., 2013

Secure and efficient handover protocols for WMNs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Secure roaming and infrastructure sharing for multi-operator WMNs.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption.
Proceedings of the Network and System Security - 7th International Conference, 2013

IP agnostic real-time traffic filtering and host identification using TCP timestamps.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Experiences from security research using a Wireless Mesh Network testbed.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks.
Proceedings of the Information Security, 16th International Conference, 2013

HealthNet: A System for Mobile and Wearable Health Information Management.
Proceedings of the 3rd International Workshop on Information Management for Mobile Applications, 2013

SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Design and implementation of privacy-preserving reconciliation protocols.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

A versatile code execution isolation framework with security first.
Proceedings of the CCSW'13, 2013

Privacy-Preserving Reconciliation Protocols: From Theory to Practice.
Proceedings of the Number Theory and Cryptography, 2013

2012
FSASD: A framework for establishing security associations for sequentially deployed WMN.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Messing with Android's Permission Model.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode.
Proceedings of the 11th IEEE International Conference on Trust, 2012

CaPTIF: Comprehensive Performance TestIng Framework.
Proceedings of the Testing Software and Systems, 2012

GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.
Proceedings of the Information Security - 15th International Conference, 2012

Introducing SOR: SSH-based Onion Routing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version).
IACR Cryptol. ePrint Arch., 2011

Security and privacy for WLAN roaming with per-connection tariff negotiation.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Diameter Proxy Mobile IPv6: Mobile Access Gateway and Local Mobility Anchor Interaction with Diameter Server.
RFC, February, 2010

New Advances on Privacy-Preserving Policy Reconciliation.
IACR Cryptol. ePrint Arch., 2010

Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing.
Comput. Commun., 2010

Security and privacy for mobile electronic health monitoring and recording systems.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Wireless Mesh Network security: State of affairs.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Generating oscillatory bursts from a network of regular spiking neurons without inhibition.
J. Comput. Neurosci., 2009

SecSyWiSe: A secure time synchronization scheme in wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Distributed delays stabilize neural feedback systems.
Biol. Cybern., 2008

2007
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Distributed Privacy-Preserving Policy Reconciliation.
Proceedings of IEEE International Conference on Communications, 2007

2006
Implementation and Performance Evaluation of EAP-TLS-KS.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

2004
A man-in-the-middle attack on UMTS.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks.
Proceedings of the IEEE 15th International Symposium on Personal, 2004


  Loading...