Rainer Böhme
Orcid: 0000-0003-4518-6227Affiliations:
- University of Münster, Germany
According to our database1,
Rainer Böhme
authored at least 165 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
Commun. ACM, March, 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
2022
More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner].
IEEE Signal Process. Mag., 2022
Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you.
ACM Queue, 2022
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis.
Proceedings of the 30th European Signal Processing Conference, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Who are the arbitrageurs? Empirical evidence from Bitcoin traders in the Mt. Gox exchange platform.
CoRR, 2021
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
Proceedings of the 29th European Conference on Information Systems, 2021
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition.
EURASIP J. Inf. Secur., 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Teaching Digital Signal Processing With a Challenge on Image Forensics [SP Education].
IEEE Signal Process. Mag., 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
2018
ACM Trans. Internet Techn., 2018
ACM Trans. Internet Techn., 2018
The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†.
J. Cybersecur., 2018
Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen.
Proceedings of the Sicherheit 2018, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 26th European Signal Processing Conference, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Datenschutz und Datensicherheit, 2017
J. Cybersecur., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior.
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
J. Cybersecur., 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study.
Proceedings of the International Conference on Information Systems, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
2015
Trans. Data Hiding Multim. Secur., 2015
Proceedings of the Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Die Automatisierung von Compliance in Cloud-Umgebungen (ACCU).
Proceedings of the 45. Jahrestagung der Gesellschaft für Informatik, Informatik, Energie und Umwelt, INFORMATIK 2015, Cottbus, Germany, September 28, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015
2014
ACM Trans. Internet Techn., 2014
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
"Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers.
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Proceedings of the Web and Internet Economics - 9th International Conference, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection.
Proceedings of the IEEE International Conference on Acoustics, 2013
A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
Proceedings of the Economics of Information Security and Privacy, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
2011
Proceedings of the 10. Internationale Tagung Wirtschaftsinformatik, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Information Security and Cryptography, Springer, ISBN: 978-3-642-14312-0, 2010
J. Digit. Forensic Pract., 2010
it Inf. Technol., 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the Intelligent Information Privacy Management, 2010
2009
PhD thesis, 2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Computational Forensics, Third International Workshop, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Conformity or Diversity: Social Implications of Transparency in Personal Data Processing.
Proceedings of the Managing Information Risk and the Economics of Security, 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Datenschutz und Datensicherheit, 2008
Conformity or Diversity: Social Implications of Transparency in Personal Data Processing.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models.
Proceedings of the Future of Identity in the Information Society, 2008
2007
Wirtschaftsinf., 2007
On the Security of "A Steganographic Scheme for Secure Communications Based on the Chaos and the Euler Theorem".
IEEE Trans. Multim., 2007
On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good?
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
Proceedings of the 15th International Conference on Multimedia 2007, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
2005
Multim. Syst., 2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
Proceedings of the Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30, 2005
2004
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?".
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004
Proceedings of the Computer Security, 2004