Erik Tews

Affiliations:
  • TU Darmstadt, Department of Computer Science


According to our database1, Erik Tews authored at least 31 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Ransomware Economics: A Two-Step Approach To Model Ransom Paid.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

2022
Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

2020
In-Depth Evaluation of Redirect Tracking and Link Usage.
Proc. Priv. Enhancing Technol., 2020

Lost and found: stopping bluetooth finders from leaking private information.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

2019
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impact.
Proceedings of the Computer Safety, Reliability, and Security, 2019

2018
Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
CoRR, 2018

2016
On the Privacy and Performance of Mobile Anonymous Microblogging.
IEEE Trans. Inf. Forensics Secur., 2016

Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

2014
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Quantitative Ansätze zur IT-Risikoanalyse.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

IT-Security in Railway Signalling Systems.
Proceedings of the ISSE 2014, 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

A privacy protection system for HbbTV in Smart TVs.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Efficiently Outsourcing Multiparty Computation Under Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2013

Security analysis of a widely deployed locking system.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
DECT security analysis.
PhD thesis, 2012

DECT Security Analysis.
IACR Cryptol. ePrint Arch., 2012

2011
Interactive decryption of DECT phone calls.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Breaking DVB-CSA.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

2010
Kann man mit DECT noch vertraulich telefonieren?
Datenschutz und Datensicherheit, 2010

FPGA Implementation of an Improved Attack against the DECT Standard Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Cryptanalysis of the DECT Standard Cipher.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Attacks on the DECT authentication mechanisms.
IACR Cryptol. ePrint Arch., 2009

2008
Practical attacks against WEP and WPA.
IACR Cryptol. ePrint Arch., 2008

Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Side Channels in the McEliece PKC.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

2007
Breaking 104 bit WEP in less than 60 seconds.
IACR Cryptol. ePrint Arch., 2007

Attacks on the WEP protocol.
IACR Cryptol. ePrint Arch., 2007

Security of Invertible Media Authentication Schemes Revisited.
Proceedings of the Information Hiding, 9th International Workshop, 2007


  Loading...