default search action
Marian Margraf
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Cezary Pilaszewicz, Lea R. Muth, Marian Margraf:
A black-box attack on fixed-unitary quantum encryption schemes. Discov. Comput. 27(1): 14 (2024) - [c19]Magdalena Bertram, Maximilian Richter, Marian Margraf:
Achieving Third-party Deniability in Signature-based Credential Systems. COMPSAC 2024: 2327-2333 - [c18]Khan Reaz, Thibaud Ardoin, Lea R. Muth, Marian Margraf, Gerhard Wunder, Mahsa Kholghi, Kai Jansen, Christian T. Zenger, Julian Schmidt, Enrico Köppe, Zoran Utkovski, Igor Bjelakovic, Mathis Schmieder, Olaf Dressel:
Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities. NetAISys@MobiSys 2024: 25-30 - [i10]Khan Reaz, Thibaud Ardoin, Lea R. Muth, Marian Margraf, Gerhard Wunder, Mahsa Kholghi, Kai Jansen, Christian T. Zenger, Julian Schmidt, Enrico Köppe, Zoran Utkovski, Igor Bjelakovic, Mathis Schmieder, Olaf Dressel:
Advancements in UWB: Paving the Way for Sovereign Data Networks in Healthcare Facilities. CoRR abs/2408.13124 (2024) - [i9]Cezary Pilaszewicz, Lea R. Muth, Marian Margraf:
A Black-box Attack on Fixed-Unitary Quantum Encryption Schemes. IACR Cryptol. ePrint Arch. 2024: 511 (2024) - [i8]Cezary Pilaszewicz, Marian Margraf:
HHL for tensor-decomposable matrices. IACR Cryptol. ePrint Arch. 2024: 1547 (2024) - 2023
- [j16]Tudor A. A. Soroceanu, Nicolas Buchmann, Marian Margraf:
On Multiple Encryption for Public-Key Cryptography. Cryptogr. 7(4): 49 (2023) - [c17]Maximilian Richter, Magdalena Bertram, Jasper Seidensticker, Marian Margraf:
Cryptographic Requirements of Verifiable Credentials for Digital Identification Documents. COMPSAC 2023: 1663-1668 - [c16]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-quantum Security for the Extended Access Control Protocol. SSR 2023: 22-52 - [i7]Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock:
Post-Quantum Security for the Extended Access Control Protocol. IACR Cryptol. ePrint Arch. 2023: 352 (2023) - [i6]Cezary Pilaszewicz, Marian Margraf:
On iterated punctured Grover. IACR Cryptol. ePrint Arch. 2023: 1114 (2023) - 2021
- [j15]Marian Margraf:
Systeme der Künstlichen Intelligenz. Datenschutz und Datensicherheit 45(7): 429 (2021) - [j14]Jannis Priesnitz, Christian Rathgeb, Nicolas Buchmann, Christoph Busch, Marian Margraf:
An overview of touchless 2D fingerprint recognition. EURASIP J. Image Video Process. 2021(1): 8 (2021) - [c15]Peter Sörries, Claudia Müller-Birn, Katrin Glinka, Franziska Boenisch, Marian Margraf, Sabine Sayegh-Jodehl, Matthias Rose:
Privacy Needs Reflection: Conceptional Design Rationales for Privacy-Preserving Explanation User Interfaces. MuC (Workshopband) 2021 - 2020
- [j13]Marian Margraf, Nicolas Buchmann:
Gewährleistung langfristiger Sicherheit für Breeder-Dokumente durch Biometrie und Blockchain-Technologie. Datenschutz und Datensicherheit 44(1): 32-37 (2020) - [j12]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 97-120 (2020) - [c14]Yi Tang, Donghang Wu, Yongzhi Cao, Marian Margraf:
The Shift PUF: Technique for Squaring the Machine Learning Complexity of Arbiter-based PUFs: Work-in-Progress. CASES 2020: 9-11
2010 – 2019
- 2019
- [j11]Marian Margraf:
IT-Sicherheit und Datenschutz: Nutzergerecht. Datenschutz und Datensicherheit 43(1): 1 (2019) - [j10]Tim Ohlendorf, Wolfgang Studier, Marian Margraf:
Digitale Identitäten auf dem Smartphone. Datenschutz und Datensicherheit 43(1): 17-22 (2019) - [j9]Nils Wisiol, Marian Margraf:
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs. J. Cryptogr. Eng. 9(3): 221-230 (2019) - [j8]Siwen Zhu, Yi Tang, Junxiang Zheng, Yongzhi Cao, Hanpin Wang, Yu Huang, Marian Margraf:
Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs. ACM Trans. Embed. Comput. Syst. 18(5): 42:1-42:25 (2019) - [c13]Pawel Drozdowski, Nicolas Buchmann, Christian Rathgeb, Marian Margraf, Christoph Busch:
On the Application of Homomorphic Encryption to Face Identification. BIOSIG 2019: 173-180 - [c12]Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin:
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance. CARDIS 2019: 40-54 - [c11]Tim Ohlendorf, Wolfgang Studier, Marian Margraf:
SLIDEDroid: A Secure Lightweight Identity for the Android Platform. Krypto-Tag 2019 - [i5]Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin:
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance. IACR Cryptol. ePrint Arch. 2019: 799 (2019) - [i4]Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. IACR Cryptol. ePrint Arch. 2019: 1473 (2019) - 2018
- [j7]Peter Thomassen, Jan Benninger, Marian Margraf:
Hijacking DNS Subdomains via Subzone Registration: A Case for Signed Zones. Open J. Web Technol. 5(1): 6-13 (2018) - [c10]Nils Wisiol, Marian Margraf:
Attacking RO-PUFs with Enhanced Challenge-Response Pairs. SEC 2018: 122-126 - [i3]Nils Wisiol, Marian Margraf:
Attacking RO-PUFs with Enhanced Challenge-Response Pairs. IACR Cryptol. ePrint Arch. 2018: 862 (2018) - 2017
- [j6]Marian Margraf:
Datenschutz und -sicherheit in einer zunehmend vernetzten Welt. Datenschutz und Datensicherheit 41(1): 21-23 (2017) - [c9]Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin:
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs. PROOFS 2017: 68-83 - [c8]Nicolas Buchmann, Christian Rathgeb, Harald Baier, Christoph Busch, Marian Margraf:
Enhancing Breeder Document Long-Term Security Using Blockchain Technology. COMPSAC (2) 2017: 744-748 - [i2]Florian Otterbein, Tim Ohlendorf, Marian Margraf:
The German eID as an Authentication Token on Android Devices. CoRR abs/1701.04013 (2017) - [i1]Nils Wisiol, Christoph Graebnitz, Marian Margraf, Manuel Oswald, Tudor A. A. Soroceanu, Benjamin Zengin:
Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs. IACR Cryptol. ePrint Arch. 2017: 932 (2017) - 2016
- [c7]Andreas Heinemann, Steffen Lange, Marian Margraf, Jörg Willomitzer:
Workshop: Nutzerzentrierte Sicherheit - NzS 2016. GI-Jahrestagung 2016: 485-486 - [c6]Sandra Kostic, Andreas Heinemann, Marian Margraf:
Usability-Untersuchung eines Papierprototypen für eine mobile Online-Ausweisfunktion des Personalausweises. GI-Jahrestagung 2016: 519-527 - [c5]Jörg Willomitzer, Andreas Heinemann, Marian Margraf:
Zur Benutzbarkeit der AusweisApp2. MuC (Workshopband) 2016 - [c4]Marian Margraf, Steffen Lange, Florian Otterbein:
Security Evaluation of Apple Pay at Point-of-Sale Terminals. NGMAST 2016: 115-120 - 2015
- [j5]Marian Margraf, Stefan Pfeiffer:
Benutzerzentrierte Entwicklung für das Internet der Dinge. Datenschutz und Datensicherheit 39(4): 246-249 (2015) - 2014
- [c3]Steffen Lange, Marian Margraf, Stefan T. Ruehl, Stephan A. W. Verclas:
On Valid and Optimal Deployments for Mixed-Tenancy Problems in SaaS-Applications. SERVICES 2014: 287-294 - 2010
- [j4]Jens Bender, Dennis Kügler, Marian Margraf, Ingo Naumann:
Das Sperrmanagement im neuen deutschen Personalausweis - Sperrmanagement ohne globale chipindividuelle Merkmale. Datenschutz und Datensicherheit 34(5): 295-298 (2010) - [j3]Jens Bender, Dennis Kügler, Marian Margraf, Ingo Naumann:
Kartenleser für den neuen deutschen personalausweis - Vor- und Nachteile unterschiedlicher Lesertypen. Datenschutz und Datensicherheit 34(11): 761-765 (2010) - [j2]Marian Margraf:
Der Ausweis für das Internet. Wirtschaftsinformatik Manag. 2(5): 14-19 (2010) - [c2]Marian Margraf:
The New German ID Card. ISSE 2010: 367-373
2000 – 2009
- 2008
- [b1]Klaus Jansen, Marian Margraf:
Approximative Algorithmen und Nichtapproximierbarkeit. De Gruyter Lehrbuch, de Gruyter 2008, ISBN 978-3-11-020316-5, pp. I-XV, 1-501 - [j1]Jens Bender, Dennis Kügler, Marian Margraf, Ingo Naumann:
Sicherheitsmechanismen für kontaktlose Chips im deutschen elektronischen Personalausweis - Ein Überblick über Sicherheitsmerkmale, Risiken und Gegenmaßnahmen. Datenschutz und Datensicherheit 32(3): 173-177 (2008) - 2007
- [c1]Georg Illies, Marian Margraf:
Attacks on the ESA-PSS-04-151 MAC Scheme. Selected Areas in Cryptography 2007: 296-310 - 2003
- [e1]Klaus Jansen, Marian Margraf, Monaldo Mastrolilli, José D. P. Rolim:
Experimental and Efficient Algorithms, Second International Workshop, WEA 2003, Ascona, Switzerland, May 26-28, 2003, Proceedings. Lecture Notes in Computer Science 2647, Springer 2003, ISBN 3-540-40205-5 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint