H. C. Pöhls and L. Steffens, "Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices" in ICT Systems Security and Privacy Protection - 40th IFIP SEC Conference , Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro, Eds. Springer, 2025. pp. 49-63.
DOI: https://doi.org/10.1007/978-3-031-92886-4_4
ISBN: 978-3-031-92885-7
File: https://henrich.poehls.com/papers/2025_Poehls-Steffens_BLE-Pairing-Security-CaseStudy_IFIPSEC.pdf
E. Geloczi, N. Mexis, B. Holler, H. C. P\"ohls and S. Katzenbeisser, "IoTCat: A Multidimensional Approach to Categorize IoT Devices in order to Identify a Delegate for Cybersecurity Functions" in Proceedings of the Workshop AIoTS at the Applied Cryptography and Network Security (ACNS) , Springer, 2025.
H. C. Pöhls, F. Kügler, E. Geloczi and F. Klement, "Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes" , Future Internet , vol. 1, no. 1, pp. 77-138, 2025. MDPI.
H. C. Pöhls, D. Eckhardt, N. Feist, S. Pfeiffer, D. Herrmann and S. Katzenbeisser, "The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach" in Proceedings of the 27th International Conference on Human-Computer Interaction (HCII 2025) , Moallem, A., Eds. Springer, 2025. pp. 105-124.
DOI: https://doi.org/10.1007/978-3-031-92833-8_7
ISBN: 978-3-031-92832-1
File: https://henrich.poehls.com/papers/2025_Poehls-et-al_CyberSecurity-in-Everyday-Life_HCIint.pdf
T. Farasat and J. Posegga, "Machine Learning Techniques for Python Source Code Vulnerability Detection" , 2024. https://arxiv.org/abs/2404.09537 .
H. C. Pöhls, S. Gebauer, F. Scharnböck, K. Spielvogel and J. Posegga, "MQfilTTr: Strengthening Smart Home Privacy through MQTT Traffic Manipulation." in In Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024) , Springer, 2024.
D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" in Sicherheit 2024 , Gesellschaft für Informatik e.V., 2024, pp. 107-118.
E. Geloczi, H. C. Pöhls, F. Klement, J. Posegga and S. Katzenbeisser, "Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments" in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) , 2024.
N. Rakotondravony, H. C. Pöhls, J. Pfeifer and L. Harrison, "Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks." in 26th International Conference on Human-Computer Interaction (HCII 2024) , Springer, 2024.
P. Eichhammer and H. P. Reiser, "A Self-forming Community Approach for Intrusion Detection in Heterogeneous Networks" in Nordic Conference on Secure IT Systems , 2023.
M. Shirali, T. Tefke and R. C. Staudemeyer, "A Survey on Anonymous Communication Systems with a Focus on Dining Cryptographers Networks" , EEE Access, 11 , vol. 18631-18659, 2023. https://doi.org/10.1109/ACCESS.2023.3242870 .
G. Runze, M. Haimerl, M. Hauer, T. Holoyad, O. Obert, H. C. Pöhls, R. Tagiew and J. Ziehn, Ein Werkzeug für eine gemeinsame KI-Terminologie. .... SIGS DATACOM GmbH, 05 2023.
T. Farasat, M. A. Rathore, A. Khan, J. Kim and J. Posegga, "Machine Learning-based BGP Traffic Prediction" in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) , 2023. pp. 1925-1934.
Weblink: 10.1109/TrustCom60117.2023.00262
T. Farasat, M. A. Rathore, Z. Asim, A. Khan, J. Kim and J. Posegga, "Poster: SmartX BGP BVT: A First Real-Time BGP Blackholing Visibility Tool" , Association for Computing Machinery, 2023. pp. 710–711.
Ruben Rios, Joachim Posegga, Eds., Security and Trust Management : Lecture Notes in Computer Science, September 28, 2023, The Hague, The Netherlands. Springer Cham, 2023.
D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" , Fakultät für Informatik und Mathematik, Universität Passau, 2023.
Weblink: https://doi.org/10.15475/sidial.2023
H. C. Pöhls, "Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems" , 09 2023. Springer, https://henrich.poehls.com/papers/2023_poehls_abstract-ai-architecture_STM.pdf .
P. Eichhammer and H. P. Reiser, "Utilizing Similarity for Improved Intrusion Detection: Autonomous Community Formation for Practical Heterogeneity Management" , IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC) , pp. 247-249, 2023. https://api.semanticscholar.org/CorpusID:266486246 .
S. Krenn and J. Traoré, "Achieving privacy and authenticity through advanced digital signature mechanisms" in ISO SC 27 Journal Vol. 1 (3) , ISO/IEC, 2022, pp. 20-27.
F. Klement and S. Katzenbeisser, "Change your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic" , pp. 19-25, Nov. 2022. IEEE, https://ieeexplore.ieee.org/document/9966902 .
R. Adler et al., Deutsche Normungsroadmap Künstliche Intelligenz (Ausgabe 2). .... 2nd DIN / DKE, 2022.
F. Klement and S. Katzenbeisser, "Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security" , pp. 143-164, 2022. Springer, https://doi.org/10.1007/978-3-031-21311-3_7 .
S. Volpert, P. Eichhammer, F. Held, T. Huffert, H. P. Reiser and J. Domaschka, "The view on systems monitoring and its requirements from future Cloud-to-Thing applications and infrastructures" , Future Generation Computer Systems , vol. 141, pp. 243-257, 2022. https://api.semanticscholar.org/CorpusID:253874712 .
C. Berger, P. Eichhammer, H. P. Reiser, J. Domaschka, F. J. Hauck and G. Habiger, "A Survey on Resilience in the IoT" , ACM Computing Surveys (CSUR) , vol. 54, pp. 1-39, 2021. https://api.semanticscholar.org/CorpusID:237577309 .
K. Spielvogel, H. C. Pöhls and J. Posegga, "TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT" in Proc. of 17th International Workshop on Security and Trust Management (STM2021) , Springer, 092021. pp. 145-162.
Weblink: https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8
F. Menges, T. Latzo, M. Vielberth, S. Soboloa, A. Puchta, H. P. Reiser and G. Pernul, "Towards GDPR-compliant data processing in modern SIEM systems" , Computers & Security , vol. 103, 04 2021. Elsevier, https://doi.org/10.1016/j.cose.2020.102165 .
J. D. Parra Rodriguez, "Computational Resource Abuse in Web Applications", 01 2020.
File: https://opus4.kobv.de/opus4-uni-passau/files/770/diss-parra-rodriguez.pdf
H. C. Pöhls and N. Tiana Lilie Rakotondravony, "Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection" in Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2020) held in conjunsction with the 22nd International Conference on Human Computer Interaction (HCII 2020) , Springer, 072020.
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Fully Invisible Protean Signatures Schemes" , IET Information Security , vol. 14, pp. 266-285, 05 2020. IET, https://doi.org/10.1049/iet-ifs.2019.0141 .
N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis and S. Ioannidis, "Pattern-driven Security, Privacy, Dependability and Interoperability in IoT" in Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection , now publishers inc., 2020, pp. 121-142.
F. Klement, H. C. Pöhls and K. Spielvogel, "Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications" in Global Internet of Things Summit (GIoTS) , 072020.
J. D. Parra Rodriguez, "A Generic Lightweight and Scalable Access Control Framework for IoT Gateways" in Information Security Theory and Practice , Springer, 2019. pp. 207-222.
R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net" , Journal of Reliable Intelligent Environments (JRIE) , vol. 5, no. 1, pp. 41-64, 04 2019. https://doi.org/10.1007/s40860-019-00075-0 .
File: http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf
N. Mäurer and A. Bilzhause, "A Cybersecurity Architecture for the L-band Digital Aeronautical Communications System (LDACS)" in 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC) , 2018. pp. 1-10.
L. Sell, H. C. Pöhls and T. Lorünser, "C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality" in Proceedings of the 10th International Conference on Cloud Computing Technology and Science (CLOUDCOM 2018) , IEEE, 2018.
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications" in Progress in Cryptology (AFRICACRYPT 2018) , Springer, 2018. pp. 11--32.
DOI: https://doi.org/10.1007/978-3-319-89339-6_2
ISBN: 978-3-319-89339-6
T. Lorünser, H. C. Pöhls, L. Sell and T. Länger, "CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle" in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) , New York, NY, USA: ACM, 2018. pp. 4:1--4:9.
DOI: https://doi.org/10.1145/3230833.3233765
ISBN: 978-1-4503-6448-5
File: http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf
J. D. Parra Rodriguez and J. Posegga, "CSP \& Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?" in Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy , New York, NY, USA: ACM, 2018. pp. 170--172.
ISBN: 978-1-4503-5632-9
H. C. Pöhls, "Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures", University of Passau, 2018.
File: https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf
J. D. Parra Rodriguez and J. Posegga, "Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and Distribution" in Proc. of 14th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM) , 2018.
File: https://web.sec.uni-passau.de/papers/preprint-securecomm2018.pdf
N. Mäurer and A. Bilzhause, "Paving the way for an it security architecture for LDACS: A datalink security threat and risk analysis" in 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS) , 2018. pp. 1A2-1-1A2-11.
S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Protean Signature Schemes" in Proc. of the 17th conference on Cryptology and Network Security (CANS 2018) , Springer, 2018. pp. 256--276.
J. D. Parra Rodriguez and J. Posegga, "RAPID: Resource and API-Based Detection Against In-Browser Miners" in ACSAC 2018: Proceedings of the 34th Annual Computer Security Applications Conference , New York, NY, USA: ACM, 2018.
DOI: https://doi.org/10.1145/3274694.3274735
ISBN: 978-1-4503-6569-7/18/12
File: https://web.sec.uni-passau.de/papers/acsac2018-parra.pdf
R. Soza, C. Kiraly and J. D. Parra Rodriguez, "Short Paper: Offloading Execution from Edge to Cloud: a Dynamic Node-RED Based Approach" in {IEEE} 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018, Cyprus, December 10-13, 2018 , 2018.
File: https://web.sec.uni-passau.de/papers/cloudcomm18-soza-preprint.pdf
R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication" in {Proc. of The 7th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2018)} , IEEE, 2018.
File: http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf
J. D. Parra Rodriguez, E. Brehm and J. Posegga, "When Your Browser Becomes the Paper Boy" in ICT Systems Security and Privacy Protection , Janczewski, Lech Jan and Kutylowski, Miroslaw, Eds. Cham: Springer International Publishing, 2018. pp. 94--107.
ISBN: 978-3-319-99828-2
File: https://web.sec.uni-passau.de/papers/parra-ifisec-preprint18.pdf
J. Camenisch, D. Derler, S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures" in Proc. of 20th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017) , IACR, 2017. pp. 152--182.
DOI: https://eprint.iacr.org/2017/011
File: http://henrich.poehls.com/papers/2017_CDKPSS_chamhash_with_ephemeral_trapdoors_PKC-eprint.pdf
A. Bilzhause, B. Belgacem, M. Mostafa and T. Gräupl, "Datalink security in the L-band digital aeronautical communications system (LDACS) for air traffic management" , IEEE Aerospace and Electronic Systems Magazine , vol. 32, no. 11, pp. 22-33, 2017.
Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions. .... 1st Springer International Publishing, 2017.
DOI: http://link.springer.com/book/10.1007/978-3-319-44924-1
File: http://link.springer.com/content/pdf/bfm%3A978-3-319-44924-1%2F1.pdf
H. C. Pöhls and T. Länger, "Einsetzbare Kryptografie für die Cloud" , Zeitschrift für Datenrecht und Informationssicherheit (digma) , vol. 17, no. 1, pp. 78--81, 2017. Schulthess Juristische Medien.