Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Maass, Max"'
Autor:
Maass, Max Jakob
Modern life relies on the internet for everything from communicating and shopping to banking and seeking medical advice. However, this growth of internet-based services also leads to a higher risk of security and privacy issues. Finding and remediati
Externí odkaz:
https://tuprints.ulb.tu-darmstadt.de/19190/1/Dissertation%20Max%20Maass%20Improving%20Online%20Privacy.pdf
Publikováno v:
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 5, No. 4, Article 157, December 2021
Wearables that constantly collect various sensor data of their users increase the chances for inferences of unintentional and sensitive information such as passwords typed on a physical keyboard. We take a thorough look at the potential of using elec
Externí odkaz:
http://arxiv.org/abs/2112.02382
Researchers help operators of vulnerable and non-compliant internet services by individually notifying them about security and privacy issues uncovered in their research. To improve efficiency and effectiveness of such efforts, dedicated notification
Externí odkaz:
http://arxiv.org/abs/2106.08029
In the era of large-scale internet scanning, misconfigured websites are a frequent cause of data leaks and security incidents. Previous research has investigated sending automated email notifications to operators of insecure or compromised websites,
Externí odkaz:
http://arxiv.org/abs/2106.08024
Autor:
Maass, Max, Stöver, Alina, Pridöhl, Henning, Bretthauer, Sebastian, Herrmann, Dominik, Hollick, Matthias, Spiecker, Indra
Misconfigurations and outdated software are a major cause of compromised websites and data leaks. Past research has proposed and evaluated sending automated security notifications to the operators of misconfigured websites, but encountered issues wit
Externí odkaz:
http://arxiv.org/abs/2011.06260
Near-Field Communication (NFC) is being used in a variety of security-critical applications, from access control to payment systems. However, NFC protocol analysis typically requires expensive or conspicuous dedicated hardware, or is severely limited
Externí odkaz:
http://arxiv.org/abs/2008.03913
Autor:
Stute, Milan, Maass, Max, Schons, Tom, Kaufhold, Marc-André, Reuter, Christian, Hollick, Matthias
Publikováno v:
International Journal of Disaster Risk Reduction, Volume 47, August 2020, 101598
Due to the increase in natural disasters in the past years, Disaster Response Organizations (DROs) are faced with the challenge of coping with more and larger operations. Currently appointed Information and Communications Technology (ICT) used for co
Externí odkaz:
http://arxiv.org/abs/2005.04910
Publikováno v:
ACM GetMobile, Vol. 23 Issue 2 (June 2019), p. 16-21
Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the cha
Externí odkaz:
http://arxiv.org/abs/1911.07486
Publikováno v:
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 3, No. 1, Article 10, March 2019
The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as
Externí odkaz:
http://arxiv.org/abs/1901.07255
Today, online privacy is the domain of regulatory measures and privacy-enhancing technologies. Transparency in the form of external and public assessments has been proposed for improving privacy and security because it exposes otherwise hidden defici
Externí odkaz:
http://arxiv.org/abs/1811.12775