Research Topics
Human Factors
- Bracamonte, V.; Pape, S. and Löbner, S.: Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.
In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023, to appear.
Citations:
- Hamm, P.; Pape, S. and Rannenberg, K.: The Influence of Privacy Concerns on Cryptocurrency Acceptance.
In ICT Systems Security and Privacy Protection - 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14-16, 2023, Proceedings, 2023, to appear.
Citations:
- Bracamonte, V.; Pape, S. and Löbner, S.: Comparing the Effect of Privacy and Non-privacy Social Media Photo Tools on Factors of Privacy Concern.
In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, pages 669-676, 2023.
Citations:
- Harborth, D.; Pape, S. and McKenzie, L.: Why Individuals Do (Not) Use Contact Tracing Apps: A Health Belief Model Perspective on the German Corona-Warn-App.
In Healthcare, 11 (4), 2023.
Citations:
- Sadeghi, A.; Pape, S. and Harborth, D.: The impact of individuals' social environments on contact tracing app use: Survey Study.
In JMIR Human Factors, to appear, 2023.
Citations:
- Chaudhary, S.; Kompara, M.; Pape, S. and Gkioulos, V.: Properties for Cybersecurity Awareness Posters' Design and Quality Assessment.
In ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pages 79:1-79:8, 2022, ETACS 2022.
Citations:
- Tronnier, F.; Pape, S.; Löbner, S. and Rannenberg, K.: A Discussion on Ethical Cybersecurity Issues in Digital Service Chains.
In Cybersecurity of Digital Service Chains - Challenges, Methodologies, and Tools, pages 222-256, Springer, Lecture Notes in Computer Science 13300, 2022.
Citations: 2
(Google Scholar);
- Chaudhary, S.; Pape, S.; Kompara, M.; Kavallieratos, G. and Gkioulos, V.: Guidelines for Enhancement of Societal Security Awareness.
Technical Report Deliverable 3.19, CyberSec4Europe, 2022.
Citations:
- Schmitz, C.; Schmid, M.; Harborth, D. and Pape, S.: Maturity Level Assessments of Information Security Controls: An Empirical Analysis of Practitioners' Assessment Capabilities.
In Computers & Security, 108, 2021.
Citations: 13
(Google Scholar); 2
(Open Citations);
- Harborth, D.; Pape, S. and Rannenberg, K.: Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym (Poster).
In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
Citations:
- Pape, S.: Challenges for Designing Serious Games on Security and Privacy Awareness.
In Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pages 3-16, Springer, IFIP Advances in Information and Communication Technology 644, 2021.
Citations: 1
(Open Citations);
Social Engineering 
- Pape, S. and Kipker, D-K.: Case Study: Checking a Serious Security-Awareness Game for its Legal Adequacy.
In Datenschutz und Datensicherheit, 45 (5): 310-314, 2021.
Citations: 1
(Google Scholar); 1
(Open Citations);
- Hazilov, V. and Pape, S.: Systematic Scenario Creation for Serious Security-Awareness Games.
In Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers, Springer International Publishing, Cham, LNCS 12580, 2020.
Citations: 5
(Google Scholar); 2
(Open Citations);
- Pape, S.; Goeke, L.; Quintanar, A. and Beckers, K.: Conceptualization of a CyberSecurity Awareness Quiz.
In Computer Security - ESORICS 2020 International Workshops MSTEC, pages 61-76, Springer International Publishing, Cham, LNCS 12512, 2020.
Citations: 11
(Google Scholar); 3
(Open Citations);
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Goeke, L.; Quintanar, A.; Beckers, K. and Pape, S.: PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
In Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 156-171, Springer International Publishing, Cham, LNCS 11981, 2019.
Citations: 13
(Google Scholar); 4
(Open Citations);
- Beckers, K.; Goeke, L.; Pape, S. and Bravos, G.: THREAT-ARREST THREAT serious games v1.
Technical Report Deliverable 4.2, Threat-Arrest, 2019.
Citations:
- Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game.
In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
Citations: 20
(Google Scholar); 7
(Researchgate); 6
(Open Citations);
- Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
Citations: 3
(Google Scholar); 4
(Researchgate);
- Beckers, K.; Schosser, D.; Pape, S. and Schaab, P.: A Structured Comparison of Social Engineering Intelligence Gathering Tools.
In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see https://link.springer.com/10.1007/978-3-319-64483-7_16.
Citations: 7
(Google Scholar); 3
(Researchgate); 4
(Open Citations);
- Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies.
In Information and Computer Security, 25 (2): 206-222, 2017.
Citations: 51
(Google Scholar); 25
(Researchgate); 21
(Open Citations);
- Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie.
In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
Citations:
- Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements.
In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
Citations: 97
(Google Scholar); 49
(Researchgate); 42
(Open Citations);
- Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering.
In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
Citations: 25
(Google Scholar); 25
(Researchgate);
- Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology.
In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Citations: 17
(Google Scholar); 7
(Researchgate);
Serious Games & Gamification 
- Fysarakis, K.; Lekidis, A.; Mavroeidis, V.; Lampropoulos, K.; Lyberopoulos, G.; Vidal, I. G-M.; Casals, J. C. T. i; Luna, E. R.; Sancho, A. A. M.; Mavrelos, A.; Tsantekidis, M.; Pape, S.; Chatzopoulou, A.; Nanou, C.; Drivas, G.; Photiou, V.; Spanoudakis, G. and Koufopavlou, O.: PHOENI2X - A European Cyber Resilience Framework With Artificial Intelligence-Assisted Orchestration Automation For Business Continuity, Incident Response & Information Exchange.
In IEEE CSR, 2023.
Citations:
- Chaudhary, S.; Pape, S.; Kompara, M.; Kavallieratos, G. and Gkioulos, V.: Guidelines for Enhancement of Societal Security Awareness.
Technical Report Deliverable 3.19, CyberSec4Europe, 2022.
Citations:
- Hatzivasilis, G.; Ioannidis, S.; Smyrlis, M.; Spanoudakis, G.; Frati, F.; Braghin, C.; Damiani, E.; Koshutanski, H.; Tsakirakis, G.; Hildebrandt, T.; Goeke, L.; Pape, S.; Blinder, O.; Vinov, M.; Leftheriotis, G.; Kunc, M.; Oikonomou, F.; Magilo, G.; Petrarolo, V.; Chieti, A. and Bordianu, R.: The THREAT-ARREST cyber ranges platform.
In IEEE International Conference on Cyber Security and Resilience (CSR), IEEE, 2021.
Citations: 5
(Google Scholar); 2
(Open Citations);
- Pape, S.; Klauer, A. and Rebler, M.: Leech: Let's Expose Evidently bad data Collecting Habits - Towards a Serious Game on Understanding Privacy Policies (Poster).
In 17th Symposium on Usable Privacy and Security (SOUPS 2021), 2021.
Citations:
- Pape, S.: Challenges for Designing Serious Games on Security and Privacy Awareness.
In Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers, pages 3-16, Springer, IFIP Advances in Information and Communication Technology 644, 2021.
Citations: 1
(Open Citations);
- Pape, S.; Goeke, L.; Quintanar, A. and Beckers, K.: Conceptualization of a CyberSecurity Awareness Quiz.
In Computer Security - ESORICS 2020 International Workshops MSTEC, pages 61-76, Springer International Publishing, Cham, LNCS 12512, 2020.
Citations: 11
(Google Scholar); 3
(Open Citations);
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Goeke, L.; Quintanar, A.; Beckers, K. and Pape, S.: PROTECT - An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks.
In Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 156-171, Springer International Publishing, Cham, LNCS 11981, 2019.
Citations: 13
(Google Scholar); 4
(Open Citations);
- Beckers, K.; Goeke, L.; Pape, S. and Bravos, G.: THREAT-ARREST THREAT serious games v1.
Technical Report Deliverable 4.2, Threat-Arrest, 2019.
Citations:
- Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game.
In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
Citations: 20
(Google Scholar); 7
(Researchgate); 6
(Open Citations);
- Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment.
In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
Citations: 3
(Google Scholar); 4
(Researchgate);
- Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie.
In Tagung der Sektion ``Empirische Bildungsforschung'' -- Educational Research and Governance (AEPF 2017), 2017.
Citations:
- Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements.
In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
Citations: 97
(Google Scholar); 49
(Researchgate); 42
(Open Citations);
- Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering.
In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
Citations: 25
(Google Scholar); 25
(Researchgate);
Privacy Enhancing Technologies 
- Bracamonte, V.; Pape, S. and Löbner, S.: Comparing the Effect of Privacy and Non-privacy Social Media Photo Tools on Factors of Privacy Concern.
In Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, pages 669-676, 2023.
Citations:
- Syed-Winkler, S.; Pape, S. and Sabouri, A.: A Data Protection-Oriented System Model Enforcing Purpose Limitation for Connected Mobility.
In CSCS '22: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, December 8th, 2022, ACM, 2022.
Citations:
- Löbner, S.; Tronnier, F.; Pape, S. and Rannenberg, K.: Comparison of De-Identification Techniques for Privacy Preserving Data Analysis in Vehicular Data Sharing.
In CSCS '21: ACM Computer Science in Cars Symposium, Ingolstadt, Germany, November 30th, 2021, pages 7:1-7:11, ACM, 2021.
Citations: 9
(Google Scholar);
- Rannenberg, K.; Pape, S.; Tronnier, F. and Löbner, S.: Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector.
Technical Report, Goethe University Frankfurt, 2021.
Citations: 4
(Google Scholar); 1
(Open Citations);
- Pape, S.; Harborth, D. and Kröger, J. L.: Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App.
In ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, pages 256-269, Springer, IFIP Advances in Information and Communication Technology 625, 2021.
Citations: 7
(Google Scholar); 4
(Open Citations);
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Harborth, D.; Pape, S. and Rannenberg, K.: Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym.
In Proceedings on Privacy Enhancing Technologies (PoPETs), 2020 (2): 111-128, 2020.
Citations: 31
(Google Scholar); 13
(Open Citations);
- Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Jondonym.
IEEE Dataport, 2020.
Citations:
- Harborth, D. and Pape, S.: Dataset on Actual Users of the Privacy-Enhancing Technology Tor.
IEEE Dataport, 2020.
Citations:
- Harborth, D. and Pape, S.: How Privacy Concerns, Trust and Risk Beliefs and Privacy Literacy Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor.
In ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 51 (1): 51-69, 2020.
Citations: 20
(Google Scholar); 5
(Open Citations);
- Harborth, D.; Cai, X. and Pape, S.: Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonym?.
In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 253-267, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 10
(Google Scholar); 4
(Open Citations);
- Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture.
In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 24 (3): 925-933, 2019.
Citations: 41
(Google Scholar); 31
(Researchgate); 23
(Open Citations);
- Harborth, D. and Pape, S.: How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor.
In 52nd Hawaii International Conference on System Sciences (HICSS) 2019, pages 4851-4860, 2019, Acceptance rate: 48%.
Citations: 20
(Google Scholar); 11
(Researchgate);
- Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext.
In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
Citations: 5
(Google Scholar); 2
(Researchgate); 1
(Open Citations);
- Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust.
In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
Citations: 13
(Google Scholar); 12
(Researchgate);
- Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns.
In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
Citations: 14
(Google Scholar); 6
(Researchgate); 8
(Open Citations);
- Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping.
In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
Citations: 1
(Google Scholar); 2
(Researchgate);
- Harborth, D.; Herrmann, D.; Köpsell, S.; Pape, S.; Roth, C.; Federrath, H.; Kesdogan, D. and Rannenberg, K.: Integrating Privacy-Enhancing Technologies into the Internet Infrastructure.
Technical Report, Cornell University, arXiv, 2017.
Citations: 4
(Google Scholar); 2
(Researchgate);
- Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany.
In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
Citations: 13
(Google Scholar); 5
(Researchgate); 5
(Open Citations);
Modeling & Measuring
Security Management
- Schmitz, C.; Sekulla, A. and Pape, S.: Asset-centric analysis and visualisation of attack trees.
In Graphical Models for Security - 7th International Workshop, GraMSec@CSF 2020, Boston, MA, USA, Virtual Conference, June 22, 2020, Revised Selected Papers, pages 45-64, Springer, LNCS 12419, 2020.
Citations: 4
(Google Scholar); 1
(Open Citations);
- Pape, S.: Requirements Engineering and Tool-Support for Security and Privacy.
.
Citations: 1
(Google Scholar);
- Pape, S.; Paci, F.; Juerjens, J. and Massacci, F.: Selecting a Secure Cloud Provider: An Empirical Study and Multi Criteria Approach.
In Information, 11 (5), 2020.
Citations: 5
(Google Scholar); 1
(Open Citations);
- Pape, S.; Schmitz, C.; Kipker, D-K. and Sekula, A.: On the use of Information Security Management Systems by German Energy Providers.
In Presented at the Fourteenth IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, 2020.
Citations:
- Schmitz, C. and Pape, S.: LiSRA: Lightweight Security Risk Assessment for Decision Support in Information Security.
In Computers & Security, 90, 2020.
Citations: 36
(Google Scholar); 14
(Researchgate); 19
(Open Citations);
- Pape, S. and Stankovic, J.: An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security.
In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers, pages 287-306, Springer International Publishing, Cham, LNCS 11980, 2019.
Citations: 2
(Google Scholar);
- Schmid, M. and Pape, S.: Aggregating Corporate Information Security Maturity Levels of Different Assets.
In Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers, pages 376-392, Springer Boston, IFIP Advances in Information and Communication Technology , 2019.
Citations: 1
(Google Scholar);
- Hatamian, M.; Pape, S. and Rannenberg, K.: ESARA: A Framework for Enterprise Smartphone Apps Risk Assessment.
In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 165-179, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 2
(Google Scholar); 3
(Researchgate); 2
(Open Citations);
- Schmid, M. and Pape, S.: A structured comparison of the corporate information security.
In ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings, pages 223-237, 2019, Acceptance rate: 26 / 142 = 18.3%.
Citations: 7
(Google Scholar); 2
(Open Citations);
- Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE).
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 2
(Google Scholar); 1
(Researchgate);
- Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
Citations: 1
(Researchgate);
- Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen.
In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
Citations:
- Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments.
In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
Citations: 6
(Google Scholar); 1
(Researchgate);
- Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger.
In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
Citations:
- Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions.
In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
Citations: 4
(Google Scholar); 3
(Researchgate);
Applied Cryptography
- Pape, S.: Technische Bedingungen wirksamer Verschlüsselung.
In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
Citations:
- Pape, S.: Sample or Random Security - A Security Model for Segment-Based Visual Cryptography.
In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
Citations: 2
(Google Scholar); 2
(Researchgate);
- Pape, S.: Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise.
Springer Vieweg, Research , 2014.
Citations: 9
(Google Scholar); 3
(Open Citations);
- Pape, S.: The Challenge of Authentication in Insecure Environments.
.
Citations:
- Pape, S.: Some Observations on Reusing One-Time Pads within Dice Codings (abstract).
Technical Report, in Tagungsband zum 10. Kryptotag, Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft für Informatik, 2009.
Citations:
- Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem.
Vdm Verlag Dr. Müller, 2008.
Citations:
- Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy.
In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
Citations: 1
(Google Scholar);
- Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy (extended Abstract).
, 2007.
Citations:
- Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem.
.
Citations: