Publications

  1. Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy?. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019.
    PDF DOI Link Abstract HCP19ifipsecBibtex
  2. Hamm, P.; Harborth, D. and Pape, S.: A Systematic Analysis of User Evaluations in Security Research. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019), 2019, to appear.
    DOI Link Abstract HHP19iwsmrBibtex
  3. Harborth, D. and Pape, S.: How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor. In 52st Hawaii International Conference on System Sciences (HICSS) 2019, pages 4851-4860, 2019.
    PDF DOI Link Abstract HP19hicssBibtex
  4. Hatamian, M.; Pape, S. and Rannenberg, K.: ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 165-179, 2019.
    PDF DOI Link Abstract HPR19ifipsecBibtex
  5. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
    PDF DOI Link Abstract PR19monetBibtex
  6. Schmid, M.; Akarkach, K. and Pape, S.: Comparison of different aggregated information security control maturities from AHP ranked companies (Extended abstract). In Preproceedings of IFIP Summer School on Privacy and Identity Management - Data for Better Living: AI and Privacy 2019 (IFIPSC2019), 2019, to appear.
    Abstract SAP19secBibtex
  7. Schmid, M. and Pape, S.: A structured comparison of the corporate information security. In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 223-237, 2019.
    PDF DOI Link Abstract SP19ifipsecBibtex
  8. Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game. In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
    PDF DOI Link Abstract ABP18trustbusBibtex
  9. Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  10. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  11. Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  12. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDF Slides DOI Link Abstract HBGPR18sicherheitBibtex
  13. Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  14. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDF Link Abstract HP18amcisBibtex
  15. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF Slides DOI Link Abstract HP18ifipsecBibtex
  16. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct.
    PDF DOI Link Abstract HP18ssrn_cfipBibtex
  17. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire.
    PDF DOI Link Abstract HP18ssrn_utautBibtex
  18. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    PDF LinkBibtex
  19. Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
    PDF Link Abstract PPRSST18trBibtex
  20. Pape, S. and Rannenberg, K.: Cyber-Gefahren auf dem Radar. In ManagementKompass: Unternehmen schützen -- Risiken minimieren, November (03): pages 9-12, 2018.
    LinkBibtex
  21. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDF Slides DOI Link Abstract PTBGLR18sicherheitBibtex
  22. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF Slides DOI Link Abstract PTKSP18ifipsecBibtex
  23. Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
    PDF Abstract SSPRR18haisaBibtex
  24. Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
    PDF Slides Link Abstract BFGP17CreaREBibtex
  25. Beckers, K.; Schosser, D.; Pape, S. and Schaab, P.: A Structured Comparison of Social Engineering Intelligence Gathering Tools. In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see http://link.springer.com/10.1007/978-3-319-64483-7_16.
    PDF Slides DOI Link Abstract BSPS17trustbusBibtex
  26. Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers.
    PDF Link Abstract DILPPRSS17trBibtex
  27. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht.
    PDF Link Abstract DLPPRSS17trBibtex
  28. Harborth, D.; Herrmann, D.; Köpsell, S.; Pape, S.; Roth, C.; Federrath, H.; Kesdogan, D. and Rannenberg, K.: Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
    PDF Link Abstract HHKPRFKR17anonBibtex
  29. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDF DOI Link Abstract HP17ifipscBibtex
  30. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract). In Preproceedings of IFIP Summer School on Privacy and Identity Management - the Smart World Revolution 2017 (IFIPSC2017), 2017.
    PDF Abstract HP17ifipsc_eaBibtex
  31. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017, Acceptance rate: (17)/99 = 17.2 %.
    PDF DOI Link Abstract HP17ismarBibtex
  32. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
    DOI Link Abstract SBP17icsBibtex
  33. Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie. In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
    PDF Link Abstract SHBP17aepfBibtex
  34. Pape, S.: Technische Bedingungen wirksamer Verschlüsselung. In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
    LinkBibtex
  35. Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
    PDF DOI Abstract BP16reBibtex
  36. Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering. In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
    PDF Poster Link Abstract BPF16bhciBibtex
  37. Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
    PDF Poster Abstract DHKLPPRST16mkwiBibtex
  38. Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract DLPS16haisaBibtex
  39. Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J.: STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
    PDF Slides DOI Link Abstract PFBJ16icseseetBibtex
  40. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract SBP16haisaBibtex
  41. Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.: On Gender Specific Perception of Data Sharing in Japan. In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 150-160, 2016, Acceptance rate: 27/139 = 20.9%.
    PDF Slides DOI Link Abstract TKPNBTR16ifipsecBibtex
  42. Tesfay, W. B.; Serna, J. and Pape, S.: Challenges in Detecting Privacy Revealing Information in Unstructured Text. In Workshop on Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2016 at the International Semantic Web Conference (ISWC) 2016, Kobe, Japan, 2016.
    PDF Link Abstract TSP16privonBibtex
  43. Pape, S.; Serna-Olvera, J. and Tesfay, W.: Why Open Data May Threaten Your Privacy. In Workshop on Privacy and Inference, co-located with KI, 2015.
    PDF Slides Abstract PST15prinfBibtex
  44. Pape, S.: Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
    DOI Link Abstract pape14authenticationBibtex
  45. Pape, S.: Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
    PDF Slides DOI Abstract pape14fcBibtex
  46. Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
    PDF DOI Abstract BMPPD13ic2eBibtex
  47. Pape, S.: The Challenge of Authentication in Insecure Environments.
    Bibtex
  48. Ochoa, M.; Pape, S.; Ruhroth, T.; Sprick, B.; Stenzel, K. and Sudbrock, H.: Report on the RS3 Topic Workshop "Security Properties in Software Engineering".
    PDF Link Abstract OPRSSS12TRRS3Bibtex
  49. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDF DOI Link Abstract PSW12teijournalBibtex
  50. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions.
    PDF Link Abstract PSW10TRBibtex
  51. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    Poster LinkBibtex
  52. Wolf, C.; Pape, S. and Porada, L.: Leitfaden zur Gründung von GI - Studierendengruppen (GI-SG).
    LinkBibtex
  53. Greveler, U.; Laskov, P. and Pape, S.: Vorwort der Workshop-Leitung.
    Bibtex
  54. Pape, S.: A Survey on Non-transferable Anonymous Credentials. In The Future of Identity in the Information Society, pages 107-118, Springer Boston, Brno, Czech Republic, IFIP Advances in Information and Communication Technology 298, 2009.
    PDF DOI Abstract pape09fidisBibtex
  55. Pape, S.: Some Observations on Reusing One-Time Pads within Dice Codings (abstract). , Berlin.
    Bibtex
  56. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
    PDF DOI Abstract PB08fidisBibtex
  57. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem. Vdm Verlag Dr. Müller, 2008.
    Link Abstract pape08ajtai-dworkBibtex
  58. Pape, S.: Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract).
    LinkBibtex
  59. Pape, S.: A Survey on Untransferable Anonymous Credentials (extended abstract). In Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Brno, 2008.
    Abstract pape08fidispreBibtex
  60. Pape, S.: Embedding Biometric Information into Anonymous Credentials.
    Abstract pape08petconBibtex
  61. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy (extended Abstract). In Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Karlstad, 2007.
    Abstract PB07fidispreBibtex
  62. Pape, S.; Dietz, L. and Tandler, P.: Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops. In Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04, 2004.
    PDF Abstract PDT04pervasiveBibtex
  63. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
    PDF Abstract pape04thesisBibtex

Invited Talks

05/2019 PET Users’ Information Privacy Concerns, Kolloquium at Karlstad University, Karlstad, Sweden
10/2018 Social Engineering, Arbeitskreis Payment Fraud des Verbandes der Chemischen Industrie (VCI), Frankfurt
10/2018 Privacy Policies von IoT-Geräten, CAST-Workshop: Anonymes Shopping im Internet: SIOC - Selbstdatenschutz im Online-Commerce, Darmstadt
06/2018 Risk Assessment von Smartphone Apps im Unternehmenskontext, GFFT-Technology Race IT-Security, Essen
05/2018 Stand zur IT-Sicherheit deutscher Stromnetzbetreiber, VDI-Fachtagung IT-Sicherheit für kritische Infrastrukturen, Neuss
02/2018 Social Engineering: Introduction, Tools and Counteracting Training Strategies, NECS Winter School 2018, Trento, Italy
02/2018 Status zur IT-Sicherheit deutscher Stromnetzbetreiber, 43. Sitzung DKE/AK952.0.15 DKE-ETG-ITG Informationssicherheit in der Netz- und Stationsleittechnik, Frankfurt
12/2017 Serious Gaming: Wie das Kartenspiel HATCH für mehr Sicherheit sorgt, VDMA-Informationstag Cybersecurity & Informationssicherheit, Frankfurt
02/2017 1702_Pape_CAST_HATCH.pdf HATCH: Hack And Trick Capricious Humans – A Serious Game on Social Engineering, CAST-Workshop "Usable Security", Darmstadt
11/2016 1611_Pape_DGRI.pdf Technische Bedingungen wirksamer Verschlüsselung,Deutsche Gesellschaft für Recht und Informatik e.V., DGRI Jahrestagung 2016: 40 Jahre DGRI!, Frankfurt
03/2016 1603_Pape+Wagner_AGAD_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge, 7. ERFA-Runde Datenschutz und IT-Sicherheit, Arbeitgeberverband Großhandel, Außenhandel, Dienstleistungen e.V., Dortmund
03/2016 1603_Pape_ASEW_Social_Engineering.pdf IT-Sicherheit spielend lernen: Ein Lernspiel zu Social Engineering, ASEW Arbeitskreis IT-Sicherheit , Cologne
11/2015 1511_Wagner+Pape_DAFTA_Sicherheit_IoT.pdf IT-Sicherheit (und Datenschutz) im Internet der Dinge (mit F. Wagner), 39. Datenschutzfachtagung (DAFTA), Cologne
02/2015   The Difficulty of Selecting a Secure Cloud Provider, Invited Talk, Goethe University Frankfurt, Frankfurt
08/2005 0508-slides-pape-ajtai_dwork+regev.pdf Gitterbasierte Kryptosysteme: Ajtai-Dwork und Regev, Invited Talk, HGI/RUB Bochum

Conference and Workshop Talks

09/2018 HP18sec-slides.pdf JonDonym Users' Information Privacy Concerns., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
09/2018 PTKSP18sec-slides.pdf Assessing Privacy Policies of Internet of Things Services., ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland
04/2018 PTBGLR18sicherheit-slides.pdf Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext., Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
04/2018 PTBGLR18sicherheit-slides.pdf Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping, Sicherheit 2018, 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), Konstanz, Germany
10/2017 HATCH – eine Juristische Bewertung: Hürden beim Einsatz von Serious Games zu Social Engineering (with D. Kipker), ITS|KRITIS Jahreskongress 2017, Berlin, Germany
08/2017 1708_Pape_Trustbus.pdf A Structured Comparison of Social Engineering Intelligence Gathering Tools, Trust, Privacy and Security in Digital Business (TrustBus 2017), Lyon, France
03/2017   Privacy Hacking / SE with QR-Codes, m-chair workshop, internal research workshop, Frankfurt
03/2017 1703_P_Vorstellung_GI-FG-PET.pdf Vorstellung der GI Fachgruppe Privacy Enhancing Technologies (PET), Workshop der Fachgruppen SECMGT und PET: EU-DSGVO - "Wie sicher ist der neue Datenschutz?", Frankfurt, Germany
03/2017 Offer for participation: Privacy Hacking / SE with QR-Codes, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
03/2017 Why Open Data May Threaten Your Privacy, 6th Privacy Enhancing Techniques Convention (PET-CON 2017.1) , Frankfurt, Germany
02/2017 1702_BFGP_Creativity_Techniques.pdf Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment (with E. Groen), CreaRE: Sixth International Workshop on Creativity in Requirements Engineering, Essen, Germany
09/2016   Relation of Mood and Social Engineering, m-chair workshop, internal research workshop, Frankfurt
06/2016 1606_Pape_ITSKRITIS_Social_Engineering.pdf Workshop: HATCH -- Ein Lernspiel zu Social Engineering, 2. Jahreskonferenz des Förderschwerpunkts "IT-Sicherheit für Kritische Infrastrukturen" (ITS KRITIS), Bremen, Germany
05/2016 PFBJ16icse-slides.pdf STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper, 38th International Conference on Software Engineering (ICSE 2016), Austin, TX, USA
04/2016 SIOC16moppa-slides.pdf Selbstdatenschutz im Online-Commerce (SIOC), Projektvorstellung, MoPPa Workshop, Darmstadt
03/2016   Interpreting Self-Assessments of Cloud Service Providers, m-chair workshop, internal research workshop, Frankfurt
09/2015 1509_PST_PRINF-slides.pdf Why Open Data May Threaten Your Privacy, Workshop on Privacy and Inference (PRINF), co-located with KI, Dresden
09/2015   A Serious Game on Social Engineering, m-chair workshop, internal research workshop, Oberelsbach
12/2014   Comparison of Cloud Provider Security, Socio-Technical Security Metrics (Dagstuhl Seminar 14491), Dagstuhl
03/2014 1309-slides-introduction_workshop.pdf Sample or Random Security – A Security Model for Segment-Based Visual Encryption, Financial Cryptography and Data Security 2014, Barbados
09/2013 1309-slides-introduction_workshop.pdf Begrüssung und Einführung in den Workshop , "Der Mensch im Fokus: Möglichkeiten der Selbstkontrolle von Datenschutz und Datensicherheit durch den Anwender", Informatik 2013, Koblenz
09/2013   The Challenge of Authentication in Insecure Environments , Disputation, Kassel
03/2013 /1303_BMPPD_cloud-battlefield.pdf Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers , 24. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Reusing keys in visual cryptography, 22. Kolleg Sicherheit, Forschungsseminar, Dortmund
03/2012   Sample or Random Security, LS14 Workshop, internal Research Workshop, Essen
10/2011   UMLsec: Secure Links Revisited, LS14 Workshop, internal Research Workshop, Essen
03/2011   Human Decipherable Encryption, LS14 Workshop, internal Research Workshop, Essen
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, PET-CON 2009.1, Dresden
03/2009 0903-slides-pape-dice_coding_otp.pdf Some Observations on Reusing One-Time Pads within Dice Codings, 10. Kryptotag, Berlin
09/2008 0809-slides-pape-a_survey_on_untransferable_anonymous_credentials.pdf A Survey on Untransferable Anonymous Credentials, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Brno
07/2008 0807-slides-pape-templateless.pdf Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials, 2. Kryptowochenende, Tabarz
02/2008   Embedding Biometric Information into Anonymous Credentials, PET-CON 2008.1, Aachen
08/2007   Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy, The Future of Identity in the Information Society, 3rd international Summer School, organized by IFIP WG 9.2, 9.6/11.7, 11.6 and FIDIS Network of Excellence, Karlstad
04/2004   Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops, Workshop "Gaming Applications in Pervasive Computing Environments", PERVASIVE 2004, the 2nd International Conference on Pervasive Computing, Wien