Volker Roth

Affiliations:
  • FU Berlin, Germany
  • Fraunhofer IGD, Darmstadt, Germany


According to our database1, Volker Roth authored at least 48 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2018
New Directions for Trust in the Certificate Authority Ecosystem.
CoRR, 2018

You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Beware the downgrading of secure electronic mail.
Proceedings of the STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, 2018

Can Software Licenses Contribute to Cyberarms Control?
Proceedings of the New Security Paradigms Workshop, 2018

I Need this Back, Later!: An Exploration of Practical Secret Sharing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2016
See you next time: a model for modern shoulder surfers.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2016

Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
How Badly Do You Want Privacy?
IEEE Internet Comput., 2015

A Safe Update Mechanism for Smart Cards.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

CryptID - distributed identity management infrastructure.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

PLC Guard: A practical defense against attacks on cyber-physical systems.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Internet-facing PLCs as a network backdoor.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
A Secure Submission System for Online Whistleblowing Platforms.
Proceedings of the Financial Cryptography and Data Security, 2013

TouchCtrl: fine-grained access control for collaborative environments.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
FlexCOS: An Open Smartcard Platform for Research and Education.
Proceedings of the Network and System Security - 6th International Conference, 2012

2010
The IR ring: authenticating users' touches on a multi-touch display.
Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, 2010

2009
Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
General Certificateless Encryption and Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2008

Simple and effective defense against evil twin access points.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2006
A Distributed Content-Based Search Engine Based on Mobile Code and Web Service Technology.
Scalable Comput. Pract. Exp., 2006

Security Risks in Java-based Mobile Code Systems.
Scalable Comput. Pract. Exp., 2006

2005
Security and usability engineering with particular attention to electronic mail.
Int. J. Hum. Comput. Stud., 2005

A distributed content-based search engine based on mobile code.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Reliable broadcast in unknown fixed-identity networks.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Enhancing Situation Awareness in Real Time Geospatial Visualization.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!).
Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), 2004

Obstacles to the Adoption of Mobile Agents.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

A PIN-entry method resilient against shoulder surfing.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2002
Improved key management for digital watermark monitoring.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Secure mobile agent systems using Java: where are we heading?.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Empowering Mobile Software Agents.
Proceedings of the Mobile Agents, 6th International Conference, 2002

Conference Session and Workshop on Performance, Interoperability, and Applications of Mobile Agent Systems.
Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), 2002

Mobile Agent Interoperability Patterns and Practice.
Proceedings of the 9th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2002), 2002

2001
Programming Satan's Agents.
Electron. Notes Theor. Comput. Sci., 2001

A Scalable and Secure Global Tracking Service for Mobile Agents.
Proceedings of the Mobile Agents, 5th International Conference, 2001

On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection.
Proceedings of the Mobile Agents, 5th International Conference, 2001

Concepts and Architecture of a Security-Centric Mobile Agent Server.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Encrypting Java Archives and Its Application to Mobile Agent Security.
Proceedings of the Agent Mediated Electronic Commerce, The European AgentLink Perspective., 2001

1999
Content-based retrieval from digital video.
Image Vis. Comput., 1999

Panel: Content-Based Image Indexing and Retrieval with Mobile Agents.
Proceedings of the 1st International Symposium on Agent Systems and Applications / 3rd International Symposium on Mobile Agents (ASA/MA '99), 1999

Mutual Protection of Co-operating Agents.
Proceedings of the Secure Internet Programming, 1999

1998
Access control and key management for mobile agents.
Comput. Graph., 1998

Secure Recording of Itineraries through Co-operating Agents.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998


  Loading...