Publications

Typing passwords with voice recognition --or-- How to authenticate to Google Glass

2014 - Daniel Bailey, Markus Dürmuth, Chris­tof Paar

Adventures in Authentication: WAY Workshop. 2014. [PDF]

Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns

2013 - Sebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz

ACM Conference on Computer and Communications Security (CCS), Berlin, November 2013 [PDF]

Useful Password Hashing: How to Waste Computing Cycles with Style

2013 - Markus Dürmuth

Proceedings of the 2013 New security paradigms workshop (NSPW) Pages 31-40 ACM, 2013 [PDF]

Achieving anonymity against major face recognition algorithms

2013 - Benedikt Driessen, Markus Dürmuth

Proceedings Communications and Multimedia Security (CMS 2013), LNCS 8099, Springer, 2013. [PDF]

Adaptive password-strength meters from Markov models

2012 - Claude Castelluccia, Markus Dürmuth, Daniele Perito

Proceedings 19th Network & Distributed System Security Symposium (NDSS 12). Internet Society, 2012. [PDF]

Timed revocation of user data: Long expiration times from existing infrastructure

2012 - Sirke Reimann , Markus Dürmuth

Proceedings Workshop on Privacy in the Electronic Society (WPES), 2012.

Deniable encryption with negligible detection probability: An interactive construction

2011 - Markus Dürmuth, David Mandell Freeman

Proceedings Advances in Cryptology (EUROCRYPT 11), Springer, 2011

Acoustic Side-Channel Attacks on Printers

2010 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder

Proceedings USENIX Security Symposium, 2010.

Speaker Recognition in Encrypted Voice Streams

2010 - Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf

Proceedings European Symposium on Research in Computer Security (ESORICS), 2010. (Preliminary version appeared in the Grande Region Security and Reliability Day, Saarbrücken, 2010.)

A Provably Secure and Efficient Countermeasure against Timing Attacks

2009 - Boris Köpf, Markus Dürmuth

Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF), 2009.
Page: