Zum Hauptinhalt springen

Showing 1–5 of 5 results for author: Schiffner, S

Searching in archive cs. Search in all archives.
.
  1. Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App

    Authors: Henrik Graßhoff, Florian Adamsky, Stefan Schiffner

    Abstract: Contact Tracing Apps (CTAs) have been developed to contain the coronavirus disease 19 (COVID-19) spread. By design, such apps invade their users' privacy by recording data about their health, contacts, and partially location. Many CTAs frequently broadcast pseudorandom numbers via Bluetooth to detect encounters. These numbers are changed regularly to prevent individual smartphones from being trivi… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: accepted for publication at TRUSTBUS

  2. arXiv:2201.00546  [pdf, other

    cs.CY cs.SI

    SMART: a Technology Readiness Methodology in the Frame of the NIS Directive

    Authors: Archana Kumari, Stefan Schiffner, Sandra Schmitz

    Abstract: An ever shorter technology lifecycle engendered the need for assessing new technologies w.r.t. their market readiness. Knowing the Technology readiness level (TRL) of a given target technology proved to be useful to mitigate risks such as cost overrun, product roll out delays, or early launch failures. Originally developed for space programmes by NASA, TRL became a de facto standard among technolo… ▽ More

    Submitted 3 January, 2022; originally announced January 2022.

    Comments: 1 figure

  3. arXiv:2111.02825  [pdf

    cs.AI cs.CY

    Whistleblower protection in the digital age -- why 'anonymous' is not enough. From technology to a wider view of governance

    Authors: Bettina Berendt, Stefan Schiffner

    Abstract: When technology enters applications and processes with a long tradition of controversial societal debate, multi-faceted new ethical and legal questions arise. This paper focusses on the process of whistleblowing, an activity with large impacts on democracy and business. Computer science can, for the first time in history, provide for truly anonymous communication. We investigate this in relation t… ▽ More

    Submitted 27 February, 2023; v1 submitted 4 November, 2021; originally announced November 2021.

    Comments: 16 pages, 1 figure

    Journal ref: International Review of Information Ethics, 31(1), 2022, https://informationethics.ca/index.php/irie/article/view/479/440

  4. arXiv:1812.05638  [pdf, other

    cs.CR

    On Privacy Notions in Anonymous Communication

    Authors: Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard Jorswieck, Thorsten Strufe

    Abstract: Many anonymous communication networks (ACNs) with different privacy goals have been developed. However, there are no accepted formal definitions of privacy and ACNs often define their goals and adversary models ad hoc. However, for the understanding and comparison of different flavors of privacy, a common foundation is needed. In this paper, we introduce an analysis framework for ACNs that capture… ▽ More

    Submitted 16 January, 2019; v1 submitted 13 December, 2018; originally announced December 2018.

  5. Privacy and Data Protection by Design - from policy to engineering

    Authors: George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner

    Abstract: Privacy and data protection constitute core values of individuals and of democratic societies. There have been decades of debate on how those values -and legal obligations- can be embedded into systems, preferably from the very beginning of the design process. One important element in this endeavour are technical mechanisms, known as privacy-enhancing technologies (PETs). Their effectiveness has… ▽ More

    Submitted 10 April, 2015; v1 submitted 12 January, 2015; originally announced January 2015.

    Comments: 79 pages in European Union Agency for Network and Information Security (ENISA) report, December 2014, ISBN 978-92-9204-108-3

    MSC Class: 94A60 ACM Class: K.4.1; D.4.6; H.2.0