default search action
Volker Roth 0002
Person information
- affiliation: FU Berlin, Germany
- affiliation: Fraunhofer IGD, Darmstadt, Germany
Other persons with the same name
- Volker Roth 0001 — University of Basel, Switzerland (and 1 more)
- Volker Roth 0003 — Philipps University of Marburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Benjamin Güldenring, Volker Roth:
Protecting Onion Service Users Against Phishing. CoRR abs/2408.07787 (2024) - 2022
- [c42]Christian Stransky, Oliver Wiese, Volker Roth, Yasemin Acar, Sascha Fahl:
27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University. SP 2022: 860-875 - 2021
- [c41]Artemij Voskobojnikov, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, Konstantin Beznosov:
The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets. CHI 2021: 642:1-642:14
2010 – 2019
- 2018
- [c40]Oliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth:
I Need this Back, Later!: An Exploration of Practical Secret Sharing. ACSAC 2018: 478-489 - [c39]Steve Dierker, Volker Roth:
Can Software Licenses Contribute to Cyberarms Control? NSPW 2018: 41-51 - [c38]Oliver Wiese, Joscha Lausch, Jakob Bode, Volker Roth:
Beware the downgrading of secure electronic mail. STAST 2018: 1:1-1:9 - [c37]Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco:
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks. WOOT @ USENIX Security Symposium 2018 - [i4]Jan-Ole Malchow, Benjamin Güldenring, Volker Roth:
New Directions for Trust in the Certificate Authority Ecosystem. CoRR abs/1801.00933 (2018) - 2016
- [c36]Jan-Ole Malchow, Benjamin Güldenring, Volker Roth:
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties. CCS 2016: 1796-1798 - [c35]Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth:
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. CCS 2016: 1823-1825 - [c34]Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth:
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection. Internet Measurement Conference 2016: 421-427 - [c33]Oliver Wiese, Volker Roth:
See you next time: a model for modern shoulder surfers. MobileHCI 2016: 453-464 - [i3]Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth:
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection. CoRR abs/1605.05856 (2016) - 2015
- [j6]Charles Petrie, Volker Roth:
How Badly Do You Want Privacy? IEEE Internet Comput. 19(2): 92-94 (2015) - [c32]Jan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, Volker Roth:
PLC Guard: A practical defense against attacks on cyber-physical systems. CNS 2015: 326-334 - [c31]Johannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth:
Internet-facing PLCs as a network backdoor. CNS 2015: 524-532 - [c30]Jan-Ole Malchow, Volker Roth:
CryptID - distributed identity management infrastructure. CNS 2015: 735-736 - [c29]Benjamin Güldenring, Volker Roth, Lars Ries:
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. NDSS 2015 - [c28]Kristian Beilke, Volker Roth:
A Safe Update Mechanism for Smart Cards. POST 2015: 239-258 - 2013
- [c27]Benjamin Güldenring, Volker Roth:
TouchCtrl: fine-grained access control for collaborative environments. CCS 2013: 1453-1456 - [c26]Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. Financial Cryptography 2013: 354-361 - [i2]Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. CoRR abs/1301.6263 (2013) - 2012
- [c25]Kristian Beilke, Volker Roth:
FlexCOS: An Open Smartcard Platform for Research and Education. NSS 2012: 277-290 - 2010
- [c24]Volker Roth, Philipp Schmidt, Benjamin Güldenring:
The IR ring: authenticating users' touches on a multi-touch display. UIST 2010: 259-262
2000 – 2009
- 2009
- [c23]Volker Roth, Thea Turner:
Bezel swipe: conflict-free scrolling and multiple selection on mobile touch screen devices. CHI 2009: 1523-1526 - 2008
- [c22]Sherman S. M. Chow, Volker Roth, Eleanor Gilbert Rieffel:
General Certificateless Encryption and Timed-Release Encryption. SCN 2008: 126-143 - [c21]Volker Roth, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner:
Simple and effective defense against evil twin access points. WISEC 2008: 220-235 - [i1]Sherman S. M. Chow, Volker Roth, Eleanor Gilbert Rieffel:
General Certificateless Encryption and Timed-Release Encryption. IACR Cryptol. ePrint Arch. 2008: 23 (2008) - 2006
- [j5]Walter Binder, Volker Roth:
Security Risks in Java-based Mobile Code Systems. Scalable Comput. Pract. Exp. 7(4) (2006) - [j4]Volker Roth, Jan Peters, Ulrich Pinsdorf:
A Distributed Content-Based Search Engine Based on Mobile Code and Web Service Technology. Scalable Comput. Pract. Exp. 7(4) (2006) - 2005
- [j3]Volker Roth, Tobias Straub, Kai Richter:
Security and usability engineering with particular attention to electronic mail. Int. J. Hum. Comput. Stud. 63(1-2): 51-73 (2005) - [c20]Klaus Boehm, Volker Roth, James Kelley:
Enhancing Situation Awareness in Real Time Geospatial Visualization. AMCIS 2005: 234 - [c19]Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, Ion Stoica:
Reliable broadcast in unknown fixed-identity networks. PODC 2005: 342-351 - [c18]Volker Roth, Ulrich Pinsdorf, Jan Peters:
A distributed content-based search engine based on mobile code. SAC 2005: 66-73 - 2004
- [c17]Volker Roth, Kai Richter, Rene Freidinger:
A PIN-entry method resilient against shoulder surfing. CCS 2004: 236-245 - [c16]Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. ICICS 2004: 343-357 - [c15]Volker Roth:
Obstacles to the Adoption of Mobile Agents. Mobile Data Management 2004: 296-297 - [c14]Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, Randy H. Katz:
Listen and Whisper: Security Mechanisms for BGP (Awarded Best Student Paper!). NSDI 2004: 127-140 - 2002
- [c13]Volker Roth, Peter Braun, Wilhelm R. Rossak:
Conference Session and Workshop on Performance, Interoperability, and Applications of Mobile Agent Systems. ECBS 2002: 226- - [c12]Ulrich Pinsdorf, Volker Roth:
Mobile Agent Interoperability Patterns and Practice. ECBS 2002: 238-244 - [c11]Volker Roth:
Empowering Mobile Software Agents. Mobile Agents 2002: 47-63 - [c10]Walter Binder, Volker Roth:
Secure mobile agent systems using Java: where are we heading?. SAC 2002: 115-119 - [c9]Volker Roth, Michael Arnold:
Improved key management for digital watermark monitoring. Security and Watermarking of Multimedia Contents 2002: 652-658 - 2001
- [c8]Volker Roth, Vania Conan:
Encrypting Java Archives and Its Application to Mobile Agent Security. AgentLink 2001: 229-239 - [c7]Volker Roth, Mehrdad Jalali-Sohi:
Concepts and Architecture of a Security-Centric Mobile Agent Server. ISADS 2001: 435-446 - [c6]Volker Roth:
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. Mobile Agents 2001: 1-14 - [c5]Volker Roth, Jan Peters:
A Scalable and Secure Global Tracking Service for Mobile Agents. Mobile Agents 2001: 169-181 - [c4]Volker Roth:
Programming Satan's Agents. SEMAS 2001: 124-139
1990 – 1999
- 1999
- [j2]Volker Roth:
Content-based retrieval from digital video. Image Vis. Comput. 17(7): 531-540 (1999) - [c3]Volker Roth:
Mutual Protection of Co-operating Agents. Secure Internet Programming 1999: 275-285 - [c2]Volker Roth:
Panel: Content-Based Image Indexing and Retrieval with Mobile Agents. ASA/MA 1999: 260-261 - 1998
- [j1]Volker Roth, Mehrdad Jalali-Sohi:
Access control and key management for mobile agents. Comput. Graph. 22(4): 457-461 (1998) - [c1]Volker Roth:
Secure Recording of Itineraries through Co-operating Agents. ECOOP Workshops 1998: 297-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint