Logo der Universität Passau

Publikationen

Publikationen von Prof. Dr. Henrich C. Pöhls.

2025

Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices

H. C. Pöhls and L. Steffens, "Checking the Impact of Security Standardization - A Case Study on Bluetooth LE Pairing of Internet-of-Things Devices" in ICT Systems Security and Privacy Protection - 40th IFIP SEC Conference , Lili Nemec Zlatolas and Kai Rannenberg and Tatjana Welzer and Joaquin Garcia-Alfaro, Eds. Springer, 2025. pp. 49-63.

DOI: https://doi.org/10.1007/978-3-031-92886-4_4

ISBN: 978-3-031-92885-7

Datei: https://henrich.poehls.com/papers/2025_Poehls-Steffens_BLE-Pairing-Security-CaseStudy_IFIPSEC.pdf

Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes

H. C. Pöhls, F. Kügler, E. Geloczi and F. Klement, "Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT - An In-Depth STRIDE and LINDDUN Analysis of Smart Homes" , Future Internet , vol. 1, no. 1, pp. 77-138, 2025. MDPI.

DOI: https://doi.org/10.3390/fi17020077

Datei: https://www.mdpi.com/1999-5903/17/2/77/pdf

The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach

H. C. Pöhls, D. Eckhardt, N. Feist, S. Pfeiffer, D. Herrmann and S. Katzenbeisser, "The Complexity of Cyber Security in Private and Professional Everyday Life -- An Ethnographic-Informatic Collaborative Approach" in Proceedings of the 27th International Conference on Human-Computer Interaction (HCII 2025) , Moallem, A., Eds. Springer, 2025. pp. 105-124.

DOI: https://doi.org/10.1007/978-3-031-92833-8_7

ISBN: 978-3-031-92832-1

Datei: https://henrich.poehls.com/papers/2025_Poehls-et-al_CyberSecurity-in-Everyday-Life_HCIint.pdf

2024

Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme

D. Eckhardt, F. Freiling, D. Herrmann, S. Katzenbeisser and H. C. Pöhls, "Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme" in Sicherheit 2024 , Gesellschaft für Informatik e.V., 2024, pp. 107-118.

Weblink: https://doi.org/10.18420/sicherheit2024_007

Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments

E. Geloczi, H. C. Pöhls, F. Klement, J. Posegga and S. Katzenbeisser, "Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments" in Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) , 2024.

DOI: https://doi.org/10.1145/3689943.3695040

Datei: https://henrich.poehls.com/papers/2024_GelozciPoehlsKlementPoseggaKatzenbeisser_Unveiling_the_Shadows_WPES.pdf

Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks.

N. Rakotondravony, H. C. Pöhls, J. Pfeifer and L. Harrison, "Viz4NetSec: Visualizing Dynamic Network Security Configurations of Everyday Interconnected Objects in Home Networks." in 26th International Conference on Human-Computer Interaction (HCII 2024) , Springer, 2024.

Weblink: https://www.springer.com/series/16277/books

2023

Ein Werkzeug für eine gemeinsame KI-Terminologie

G. Runze, M. Haimerl, M. Hauer, T. Holoyad, O. Obert, H. C. Pöhls, R. Tagiew and J. Ziehn, Ein Werkzeug für eine gemeinsame KI-Terminologie. .... SIGS DATACOM GmbH, 05 2023.

Weblink: https://www.imbus.de/downloads?no_cache=1&tx_abdownloads_pi1%5Baction%5D=getviewclickeddownload&tx_abdownloads_pi1%5Bcatids%5D=107&tx_abdownloads_pi1%5Buid%5D=1061&cHash=4a3aa33d9023463a56894cb2104e3f4a

Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems

H. C. Pöhls, "Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems" , 09 2023. Springer, https://henrich.poehls.com/papers/2023_poehls_abstract-ai-architecture_STM.pdf .

2021

TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT

K. Spielvogel, H. C. Pöhls and J. Posegga, "TLS Beyond the Broker: Enforcing Fine-grained Security and Trust in Publish/Subscribe Environments for IoT" in Proc. of 17th International Workshop on Security and Trust Management (STM2021) , Springer, 092021. pp. 145-162.

Weblink: https://link.springer.com/chapter/10.1007/978-3-030-91859-0_8

2020

Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection

H. C. Pöhls and N. Tiana Lilie Rakotondravony, "Dynamic Consent: Physical switches and feedback to adjust consent to IoT data collection" in Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT 2020) held in conjunsction with the 22nd International Conference on Human Computer Interaction (HCII 2020) , Springer, 072020.

Datei: https://henrich.poehls.com/papers/2020_PoehlsRakotondravony_HCII2020_DynamicConsent-Physical-%20switches-and-feedback-to-adjust-consent.pdf

Fully Invisible Protean Signatures Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Fully Invisible Protean Signatures Schemes" , IET Information Security , vol. 14, pp. 266-285, 05 2020. IET, https://doi.org/10.1049/iet-ifs.2019.0141 .

Datei: http://henrich.poehls.com/papers/2019_KrennPoehlsSamleinSlamanig_FullyInvisibleProteanSignatures_IET-IFS-2019-0141.pdf

Pattern-driven Security, Privacy, Dependability and Interoperability in IoT

N. Petroulakis, K. Fysarakis, H. C. Pöhls, V. Kulkarni, G. Spanoudakis, A. Bröring, M. Papoutsakis, M. Michalodimitrakis and S. Ioannidis, "Pattern-driven Security, Privacy, Dependability and Interoperability in IoT" in Security Risk Management for the Internet of Things: Technologies and Techniques for IoT Security, Privacy and Data Protection , now publishers inc., 2020, pp. 121-142.

Datei: http://henrich.poehls.com/papers/2020_Pattern-driven-Security-Privacy-Dependability-and-Interoperability-in-IoT_978-1-68083-683-7_ch7.pdf

Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications

F. Klement, H. C. Pöhls and K. Spielvogel, "Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications" in Global Internet of Things Summit (GIoTS) , 072020.

Datei: http://henrich.poehls.com/papers/2020_KlementPoehlsSpielvogel_GIOTS20_Privacy-preserving-local-monitoring-and-evaluation-of-IoT-network-traffic.pdf

2019

What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net" , Journal of Reliable Intelligent Environments (JRIE) , vol. 5, no. 1, pp. 41-64, 04 2019. https://doi.org/10.1007/s40860-019-00075-0 .

Datei: http://henrich.poehls.com/papers/2019_StaudemeyerPoehlsWojcik_BoostIOTPrivacy_JRIE.pdf

2018

C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality

L. Sell, H. C. Pöhls and T. Lorünser, "C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality" in Proceedings of the 10th International Conference on Cloud Computing Technology and Science (CLOUDCOM 2018) , IEEE, 2018.

Datei: http://henrich.poehls.com/papers/2018_SellPoehlsLoruenser_CostOfSecretSharedCloudStorage_IEEE-CloudCom.pdf

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications" in Progress in Cryptology (AFRICACRYPT 2018) , Springer, 2018. pp. 11--32.

DOI: https://doi.org/10.1007/978-3-319-89339-6_2

ISBN: 978-3-319-89339-6

Datei: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_TrapdoorChamHash_AFRICACRYPT2018_full.pdf

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

T. Lorünser, H. C. Pöhls, L. Sell and T. Länger, "CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle" in Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018) , New York, NY, USA: ACM, 2018. pp. 4:1--4:9.

DOI: https://doi.org/10.1145/3230833.3233765

ISBN: 978-1-4503-6448-5

Datei: http://henrich.poehls.com/papers/2018_LoruenserPoehlsSellLaenger_CrypSDLC_ARES2018_preprint.pdf

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

H. C. Pöhls, "Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures", University of Passau, 2018.

Datei: https://opus4.kobv.de/opus4-uni-passau/files/582/Poehls_Thesis_Final.pdf

Protean Signature Schemes

S. Krenn, H. C. Pöhls, K. Samelin and D. Slamanig, "Protean Signature Schemes" in Proc. of the 17th conference on Cryptology and Network Security (CANS 2018) , Springer, 2018. pp. 256--276.

DOI: https://doi.org/10.1007/978-3-030-00434-7_13

Datei: http://henrich.poehls.com/papers/2018_KrennPoehlsSamelinSlamanig_SanitizableAndDeleteableSignature_CANS-full.pdf

The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication

R. C. Staudemeyer, H. C. Pöhls and M. Wójcik, "The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication" in {Proc. of The 7th workshop on IoT-SoS: Internet of Things Smart Objects and Services (WOWMOM SOS-IOT 2018)} , IEEE, 2018.

Datei: http://henrich.poehls.com/papers/2018_Staudemeyer-Poehls-Wojcik_road2privacy_preprint.pdf

Ich bin damit einverstanden, dass beim Abspielen des Videos eine Verbindung zum Server von Vimeo hergestellt wird und dabei personenbezogenen Daten (z.B. Ihre IP-Adresse) übermittelt werden.
Ich bin damit einverstanden, dass beim Abspielen des Videos eine Verbindung zum Server von YouTube hergestellt wird und dabei personenbezogenen Daten (z.B. Ihre IP-Adresse) übermittelt werden.
Video anzeigen