Secure communication based on ambient audio D Schurmann, S Sigg IEEE Transactions on Mobile Computing 12 (2), 358-370, 2013 | 189 | 2013 |
An Empirical Study of Textual Key-Fingerprint Representations S Dechand, D Schürmann, K Busse, Y Acar, S Fahl, M Smith | 72* | |
BANDANA—Body area network device-to-device authentication using natural gAit D Schürmann, A Brüsch, S Sigg, L Wolf 2017 IEEE International Conference on Pervasive Computing and Communications …, 2017 | 60 | 2017 |
Security properties of gait for mobile device pairing A Bruesch, N Nguyen, D Schürmann, S Sigg, L Wolf IEEE Transactions on Mobile Computing 19 (3), 697-710, 2019 | 47 | 2019 |
Trustworthy parking communities: Helping your neighbor to find a space J Timpner, D Schürmann, L Wolf IEEE Transactions on Dependable and Secure Computing 13 (1), 120-132, 2015 | 35 | 2015 |
Pintext: A framework for secure communication based on context S Sigg, D Schuermann, Y Ji Mobile and Ubiquitous Systems: Computing, Networking, and Services, 314-325, 2012 | 26 | 2012 |
Cooperative charging in residential areas D Schürmann, J Timpner, L Wolf IEEE Transactions on Intelligent Transportation Systems 18 (4), 834-846, 2016 | 24 | 2016 |
Forward secure delay-tolerant networking S Rüsch, D Schürmann, R Kapitza, L Wolf Proceedings of the 12th Workshop on Challenged Networks, 7-12, 2017 | 18 | 2017 |
Secure smartphone-based registration and key deployment for vehicle-to-cloud communications J Timpner, D Schürmann, L Wolf Proceedings of the 2013 ACM workshop on Security, privacy & dependability …, 2013 | 14 | 2013 |
Moves like jagger: Exploiting variations in instantaneous gait for spontaneous device pairing D Schürmann, A Brüsch, N Nguyen, S Sigg, L Wolf Pervasive and Mobile Computing 47, 1-12, 2018 | 10 | 2018 |
Utilizing hardware aes encryption for wsns F Büsching, A Figur, D Schürmann, L Wolf CONFERENCE PAPER, 2013 | 7 | 2013 |
Openkeychain: an architecture for cryptography with smart cards and nfc rings on android D Schürmann, S Dechand, L Wolf Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2017 | 6 | 2017 |
Xep-0373: Openpgp for XMPP F Schmaus, D Schürmann, V Breitmoser Breitmoser," Xep-0373: Openpgp for XMPP, 2016 | 6 | 2016 |
Wiretapping end-to-end encrypted VoIP calls: real-world attacks on ZRTP D Schürmann, F Kabus, G Hildermeier, L Wolf Proceedings on Privacy Enhancing Technologies, 2017 | 5 | 2017 |
Demo of BANDANA-body area network device-to-device authentication using natural gAit N Nguyen, A BrÜsch, D SchÜrmann, S Sigg, L Wolf 2018 IEEE International Conference on Pervasive Computing and Communications …, 2018 | 3 | 2018 |
μDTNSec: a security layer for disruption-tolerant networks on microcontrollers D Schürmann, G von Zengen, M Priedigkeit, L Wolf 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 1-7, 2017 | 3 | 2017 |
Authenticated resource management in delay-tolerant networks using proxy signatures D Schürmann, J Ott, L Wolf 2013 10th Annual Conference on Wireless On-demand Network Systems and …, 2013 | 3 | 2013 |
RAIM: redundant array of independent motes D Schürmann, F Büsching, S Willenborg, L Wolf 2017 International Conference on Networked Systems (NetSys), 1-8, 2017 | 2 | 2017 |
μDTNSec: a security layer with lightweight certificates for Disruption-Tolerant Networks on microcontrollers D Schürmann, G von Zengen, M Priedigkeit, S Willenborg, L Wolf Annals of Telecommunications 73, 589-600, 2018 | 1 | 2018 |
Poster: Handsfree ZRTP-A Novel Key Agreement for RTP, Protected by Voice Commitments D Schürmann, S Sigg Symposium On Usable Privacy and Security (SOUPS), 2013 | 1 | 2013 |