Publications

  1. Goeke, L.; Quintanar, A.; Beckers, K. and Pape, S.: PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks. In Computer Security - ESORICS 2019 International Workshops, MSTEC 2018, Luxemburg, September 26-27, 2019, Revised Selected Papers, 2019, (to appear).
    Abstract GQBP19mstecBibtex
  2. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy?. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDF DOI Link Abstract HCP19ifipsecBibtex
  3. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research. In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.
    PDF DOI Link Abstract HHP19iwsmrBibtex
  4. Harborth, D. and Pape, S.: How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor. In 52nd Hawaii International Conference on System Sciences (HICSS) 2019, pages 4851-4860, 2019.
    PDF DOI Link Abstract HP19hicssBibtex
  5. Harborth, D. and Pape, S.: How Privacy Concerns, Trust and Risk Beliefs and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor. In The DATA BASE for Advances in Information Systems, 2019.
    Abstract HP19sigmisdbBibtex
  6. Hatamian, M.; Pape, S. and Rannenberg, K.: ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 165-179, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDF DOI Link Abstract HPR19ifipsecBibtex
  7. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
    PDF DOI Link Abstract PR19monetBibtex
  8. Schmid, M.; Akarkach, K. and Pape, S.: Comparison of different aggregated information security control maturities from AHP ranked companies (Extended abstract). In Preproceedings of IFIP Summer School on Privacy and Identity Management - Data for Better Living: AI and Privacy 2019 (IFIPSC2019), 2019, to appear.
    Abstract SAP19secBibtex
  9. Schmid, M. and Pape, S.: A structured comparison of the corporate information security. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 223-237, 2019, Acceptance rate: 26 / 142 = 18.3%.
    PDF DOI Link Abstract SP19ifipsecBibtex
  10. Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game. In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
    PDF DOI Link Abstract ABP18trustbusBibtex
  11. Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  12. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  13. Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  14. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDF Slides DOI Link Abstract HBGPR18sicherheitBibtex
  15. Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  16. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDF Link Abstract HP18amcisBibtex
  17. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF Slides DOI Link Abstract HP18ifipsecBibtex
  18. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct.
    PDF DOI Link Abstract HP18ssrn_cfipBibtex
  19. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire.
    PDF DOI Link Abstract HP18ssrn_utautBibtex
  20. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  21. Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
    PDF Link Abstract PPRSST18trBibtex
  22. Pape, S. and Rannenberg, K.: Cyber-Gefahren auf dem Radar. In ManagementKompass: Unternehmen schützen -- Risiken minimieren, November (03): pages 9-12, 2018.
    LinkBibtex
  23. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDF Slides DOI Link Abstract PTBGLR18sicherheitBibtex
  24. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF Slides DOI Link Abstract PTKSP18ifipsecBibtex
  25. Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
    PDF Abstract SSPRR18haisaBibtex
  26. Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
    PDF Slides Link Abstract BFGP17CreaREBibtex
  27. Beckers, K.; Schosser, D.; Pape, S. and Schaab, P.: A Structured Comparison of Social Engineering Intelligence Gathering Tools. In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see http://link.springer.com/10.1007/978-3-319-64483-7_16.
    PDF Slides DOI Link Abstract BSPS17trustbusBibtex
  28. Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers.
    PDF Link Abstract DILPPRSS17trBibtex
  29. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
    PDF Link Abstract DLPPRSS17trBibtex
  30. Harborth, D.; Herrmann, D.; Köpsell, S.; Pape, S.; Roth, C.; Federrath, H.; Kesdogan, D. and Rannenberg, K.: Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
    PDF Link Abstract HHKPRFKR17anonBibtex
  31. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDF DOI Link Abstract HP17ifipscBibtex
  32. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract). In Preproceedings of IFIP Summer School on Privacy and Identity Management - the Smart World Revolution 2017 (IFIPSC2017), 2017.
    PDF Abstract HP17ifipsc_eaBibtex
  33. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDF DOI Link Abstract HP17ismarBibtex
  34. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
    DOI Link Abstract SBP17icsBibtex
  35. Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie. In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
    PDF Link Abstract SHBP17aepfBibtex
  36. Pape, S.: Technische Bedingungen wirksamer Verschlüsselung. In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
    LinkBibtex
  37. Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
    PDF DOI Abstract BP16reBibtex
  38. Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering. In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
    PDF Poster Link Abstract BPF16bhciBibtex
  39. Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
    PDF Poster Abstract DHKLPPRST16mkwiBibtex
  40. Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract DLPS16haisaBibtex
  41. Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J.: STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
    PDF Slides DOI Link Abstract PFBJ16icseseetBibtex
  42. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract SBP16haisaBibtex
  43. Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.: On Gender Specific Perception of Data Sharing in Japan. In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 150-160, 2016, Acceptance rate: 27/139 = 20.9%.
    PDF Slides DOI Link Abstract TKPNBTR16ifipsecBibtex
  44. Tesfay, W. B.; Serna, J. and Pape, S.: Challenges in Detecting Privacy Revealing Information in Unstructured Text. In Workshop on Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2016 at the International Semantic Web Conference (ISWC) 2016, Kobe, Japan, 2016.
    PDF Link Abstract TSP16privonBibtex
  45. Pape, S.; Serna-Olvera, J. and Tesfay, W.: Why Open Data May Threaten Your Privacy. In Workshop on Privacy and Inference, co-located with KI, 2015.
    PDF Slides Abstract PST15prinfBibtex
  46. Pape, S.: Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
    DOI Link Abstract pape14authenticationBibtex
  47. Pape, S.: Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
    PDF Slides DOI Abstract pape14fcBibtex
  48. Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
    PDF DOI Abstract BMPPD13ic2eBibtex
  49. Pape, S.: The Challenge of Authentication in Insecure Environments.
    Bibtex
  50. Ochoa, M.; Pape, S.; Ruhroth, T.; Sprick, B.; Stenzel, K. and Sudbrock, H.: Report on the RS3 Topic Workshop "Security Properties in Software Engineering".
    PDF Link Abstract OPRSSS12TRRS3Bibtex
  51. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDF DOI Link Abstract PSW12teijournalBibtex
  52. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions.
    PDF Link Abstract PSW10TRBibtex
  53. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    Poster LinkBibtex
  54. Wolf, C.; Pape, S. and Porada, L.: Leitfaden zur Gründung von GI - Studierendengruppen (GI-SG).
    LinkBibtex
  55. Greveler, U.; Laskov, P. and Pape, S.: Vorwort der Workshop-Leitung.
    Bibtex
  56. Pape, S.: A Survey on Non-transferable Anonymous Credentials. In The Future of Identity in the Information Society, pages 107-118, Springer Boston, Brno, Czech Republic, IFIP Advances in Information and Communication Technology 298, 2009.
    PDF DOI Abstract pape09fidisBibtex
  57. Pape, S.: Some Observations on Reusing One-Time Pads within Dice Codings (abstract). , Berlin.
    Bibtex
  58. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
    PDF DOI Abstract PB08fidisBibtex
  59. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem. Vdm Verlag Dr. Müller, 2008.
    Link Abstract pape08ajtai-dworkBibtex
  60. Pape, S.: Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract).
    LinkBibtex
  61. Pape, S.: A Survey on Untransferable Anonymous Credentials (extended abstract). In Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Brno, 2008.
    Abstract pape08fidispreBibtex
  62. Pape, S.: Embedding Biometric Information into Anonymous Credentials.
    Abstract pape08petconBibtex
  63. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy (extended Abstract). In Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Karlstad, 2007.
    Abstract PB07fidispreBibtex
  64. Pape, S.; Dietz, L. and Tandler, P.: Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops. In Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04, 2004.
    PDF Abstract PDT04pervasiveBibtex
  65. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
    PDF Abstract pape04thesisBibtex

Invited Talks

05/2019 PET Users’ Information Privacy Concerns, Kolloquium at Karlstad University, Karlstad, Sweden
10/2018 Social Engineering, Arbeitskreis Payment Fraud des Verbandes der Chemischen Industrie (VCI), Frankfurt
10/2018 Privacy Policies von IoT-Geräten, CAST-Workshop: Anonymes Shopping im Internet: SIOC - Selbstdatenschutz im Online-Commerce, Darmstadt
06/2018 Risk Assessment von Smartphone Apps im Unternehmenskontext, GFFT-Technology Race IT-Security, Essen
05/2018 Stand zur IT-Sicherheit deutscher Stromnetzbetreiber, VDI-Fachtagung IT-Sicherheit für kritische Infrastrukturen, Neuss
02/2018 Social Engineering: Introduction, Tools and Counteracting Training Strategies, NECS Winter School 2018, Trento, Italy
02/2018 Status zur IT-Sicherheit deutscher Stromnetzbetreiber, 43. Sitzung DKE/AK952.0.15 DKE-ETG-ITG Informationssicherheit in der Netz- und Stationsleittechnik, Frankfurt
12/2017 Serious Gaming: Wie das Kartenspiel HATCH für mehr Sicherheit sorgt, VDMA-Informationstag Cybersecurity & Informationssicherheit, Frankfurt
02/2017 1702_Pape_CAST_HATCH.pdf HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering, CAST-Workshop "Usable Security", Darmstadt
11/2016 1611_Pape_DGRI.pdf Technische Bedingungen wirksamer Verschlüsselung,Deutsche Gesellschaft für Recht und Informatik e.V., DGRI Jahrestagung 2016: 40 Jahre DGRI!, Frankfurt
03/2016 1603_Pape+Wagner_AGAD_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge, 7. ERFA-Runde Datenschutz und IT-Sicherheit, Arbeitgeberverband Großhandel, Außenhandel, Dienstleistungen e.V., Dortmund
03/2016 1603_Pape_ASEW_Social_Engineering.pdf IT-Sicherheit spielend lernen: Ein Lernspiel zu Social Engineering, ASEW Arbeitskreis IT-Sicherheit , Cologne
11/2015 1511_Wagner+Pape_DAFTA_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge (mit F. Wagner), 39. Datenschutzfachtagung (DAFTA), Cologne
02/2015   The Difficulty of Selecting a Secure Cloud Provider, Invited Talk, Goethe University Frankfurt, Frankfurt
08/2005 0508-slides-pape-ajtai_dwork+regev.pdf Gitterbasierte Kryptosysteme: Ajtai-Dwork und Regev, Invited Talk, HGI/RUB Bochum

Conference and Workshop Talks

09/2018 HP18sec-slides.pdf JonDonym Users' Information Privacy Concerns., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
09/2018 PTKSP18sec-slides.pdf Assessing Privacy Policies of Internet of Things Services., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
04/2018 PTBGLR18sicherheit-slides.pdf Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext., Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
04/2018 PTBGLR18sicherheit-slides.pdf Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping, Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
10/2017 HATCH – eine Juristische Bewertung: Hürden beim Einsatz von Serious Games zu Social Engineering (with D. Kipker), ITS|KRITIS Jahreskongress 2017, Berlin, Germany
08/2017 1708_Pape_Trustbus.pdf A Structured Comparison of Social Engineering Intelligence Gathering Tools, Trust, Privacy and Security in Digital Business (TrustBus 2017), Lyon, France
03/2017   Privacy Hacking / SE with QR-Codes, m-chair workshop, internal research workshop, Frankfurt
03/2017 1703_P_Vorstellung_GI-FG-PET.pdf Vorstellung der GI Fachgruppe Privacy Enhancing Technologies (PET), Workshop der Fachgruppen SECMGT und PET: EU-DSGVO - "Wie sicher ist der neue Datenschutz?", Frankfurt, Germany
03/2017 Offer for participation: Privacy Hacking / SE with QR-Codes, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
03/2017 Why Open Data May Threaten Your Privacy, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
02/2017 1702_BFGP_Creativity_Techniques.pdf Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment (with E. Groen), CreaRE: Sixth International Workshop on Creativity in Requirements Engineering, Essen, Germany
09/2016   Relation of Mood and Social Engineering, m-chair workshop, internal research workshop, Frankfurt
06/2016 1606_Pape_ITSKRITIS_Social_Engineering.pdf Workshop: HATCH -- Ein Lernspiel zu Social Engineering, 2. Jahreskonferenz des Förderschwerpunkts "IT-Sicherheit für Kritische Infrastrukturen" (ITS KRITIS), Bremen, Germany
05/2016 PFBJ16icse-slides.pdf STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper, 38th International Conference on Software Engineering (ICSE 2016), Austin, TX, USA
04/2016 SIOC16moppa-slides.pdf Selbstdatenschutz im Online-Commerce (SIOC), Projektvorstellung, MoPPa Workshop, Darmstadt
03/2016   Interpreting Self-Assessments of Cloud Service Providers, m-chair workshop, internal research workshop, Frankfurt
09/2015 1509_PST_PRINF-slides.pdf Why Open Data May Threaten Your Privacy, Workshop on Privacy and Inference (PRINF), co-located with KI, Dresden
09/2015   A Serious Game on Social Engineering, m-chair workshop, internal research workshop, Oberelsbach
12/2014   Comparison of Cloud Provider Security, Socio-Technical Security Metrics (Dagstuhl Seminar 14491), Dagstuhl
03/2014 1309-slides-introduction_workshop.pdf Sample or Random Security – A Security Model for Segment-Based Visual Encryption, Financial Cryptography and Data Security 2014, Barbados
09/2013 1309-slides-introduction_workshop.pdf Begrüssung und Einführung in den Workshop , "Der Mensch im Fokus: Möglichkeiten der Selbstkontrolle von Datenschutz und Datensicherheit durch den Anwender", Informatik 2013, Koblenz
09/2013   The Challenge of Authentication in Insecure Environments , Disputation, Kassel
03/2013 /1303_BMPPD_cloud-battlefield.pdf Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers , 24. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Reusing keys in visual cryptography, 22. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Sample or Random Security, LS14 Workshop, internal Research Workshop, Essen
10/2011   UMLsec: Secure Links Revisited, LS14 Workshop, internal Research Workshop, Essen
03/2011   Human Decipherable Encryption, LS14 Workshop, internal Research Workshop, Essen
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, PET-CON 2009.1, Dresden
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, 10. Kryptotag, Berlin
09/2008 0809-slides-pape-a_survey_on_untransferable_anonymous_credentials.pdf A Survey on Untransferable Anonymous Credentials, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Brno
07/2008 0807-slides-pape-templateless.pdf Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials, 2. Kryptowochenende, Tabarz
02/2008   Embedding Biometric Information into Anonymous Credentials, PET-CON 2008.1, Aachen
08/2007   Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Karlstad
04/2004   Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops, Workshop "Gaming Applications in Pervasive Computing Environments", PERVASIVE 2004, the 2nd International Conference on Pervasive Computing, Wien