What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Rainer Böhme
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
"Why Would Money Protect me from Cyber Bullying?": A Mixed-Methods Study of Personal Cyber Insurance.
Rachiyta Jain
Temima Hrle
Margherita Marinetti
Adam Jenkins
Rainer Böhme
Daniel W. Woods
2024
journals/compsec
Economics of incident response panels in cyber insurance.
Daniel G. Arce
Daniel W. Woods
Rainer Böhme
2024
conf/uss
Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications.
Benedikt Lorch
Rainer Böhme
2024
conf/ih
Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis.
Martin Benes
Rainer Böhme
2023
conf/uss
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case.
Svetlana Abramova
Rainer Böhme
2023
conf/uss
Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys.
Daniel W. Woods
Rainer Böhme
Josephine Wolff
Daniel Schwarcz
2023
conf/fc
Detecting Privileged Parties on Ethereum.
Michael Fröwis
Rainer Böhme
2023
conf/soups
What can central bank digital currency designers learn from asking potential users?
Svetlana Abramova
Rainer Böhme
Helmut Elsinger
Helmut Stix
Martin Summer
2023
conf/ih
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics.
Nora Hofer
Rainer Böhme
2022
journals/compsec
The commodification of consent.
Daniel W. Woods
Rainer Böhme
2022
conf/fc
Not All Code are Create2 Equal.
Michael Fröwis
Rainer Böhme
2022
conf/ih
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results.
Martin Benes
Nora Hofer
Rainer Böhme
2021
journals/popets
Privacy Preference Signals: Past, Present and Future.
Maximilian Hils
Daniel W. Woods
Rainer Böhme
2021
conf/fc
Collaborative Deanonymization.
Patrik Keller
Martin Florian
Rainer Böhme
2021
conf/sp
SoK: Quantifying Cyber Risk.
Daniel W. Woods
Rainer Böhme
2021
conf/ih
iNNformant: Boundary Samples as Telltale Watermarks.
Alexander Schlögl
Tobias Kupek
Rainer Böhme
2020
journals/popets
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR.
Dominique Machuletz
Rainer Böhme
2020
conf/ccs
eNNclave: Offline Inference with Model Confidentiality.
Alexander Schlögl
Rainer Böhme
2020
conf/acns
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069.
Maximilian Hils
Rainer Böhme
2020
conf/ih
On the Difficulty of Hiding Keys in Neural Networks.
Tobias Kupek
Cecilia Pasquini
Rainer Böhme
2019
journals/tifs
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals.
Cecilia Pasquini
Rainer Böhme
2019
conf/fc
Detecting Token Systems on Ethereum.
Michael Fröwis
Andreas Fuchs
Rainer Böhme
2019
conf/esorics
The Operational Cost of Ethereum Airdrops.
Michael Fröwis
Rainer Böhme
2018
conf/fc
Pricing Anonymity.
Daniel G. Arce
Rainer Böhme
2017
conf/ccs
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Samaneh Tajalizadehkhoob
Tom van Goethem
Maciej Korczynski
Arman Noroozian
Rainer Böhme
Tyler Moore
Wouter Joosen
Michel van Eeten
2017
conf/sec
Decoy Password Vaults: At Least as Hard as Steganography?
Cecilia Pasquini
Pascal Schöttle
Rainer Böhme
2017
conf/fc
Mixing Coins of Different Quality: A Game-Theoretic Approach.
Svetlana Abramova
Pascal Schöttle
Rainer Böhme
2017
conf/ih
Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity.
Cecilia Pasquini
Rainer Böhme
2017
conf/eurosp
Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques.
Malte Möser
Rainer Böhme
2017
conf/esorics
In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum.
Michael Fröwis
Rainer Böhme
2016
journals/tifs
Game Theory and Adaptive Steganography.
Pascal Schöttle
Rainer Böhme
2016
conf/ccs
Back to the Roots: Information Sharing Economics and What We Can Learn for Security.
Rainer Böhme
2016
conf/ih
Forensics of High Quality and Nearly Identical JPEG Image Recompression.
Cecilia Pasquini
Pascal Schöttle
Rainer Böhme
Giulia Boato
Fernando Pérez-González
2015
conf/ccs
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls.
Stefan Laube
Rainer Böhme
2015
conf/fc
Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees.
Malte Möser
Rainer Böhme
2014
conf/fc
Towards Risk Scoring of Bitcoin Transactions.
Malte Möser
Rainer Böhme
Dominic Breuker
2014
conf/soups
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation.
Stefan Korff
Rainer Böhme
2014
conf/ih
Predictable rain?: steganalysis of public-key steganography using wet paper codes.
Matthias Carnein
Pascal Schöttle
Rainer Böhme
2013
conf/ih
Moving steganography and steganalysis from the laboratory into the real world.
Andrew D. Ker
Patrick Bas
Rainer Böhme
Rémi Cogranne
Scott Craver
Tomás Filler
Jessica J. Fridrich
Tomás Pevný
2013
conf/esorics
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Aron Laszka
Benjamin Johnson
Pascal Schöttle
Jens Grossklags
Rainer Böhme
2012
conf/fc
Security Audits Revisited.
Rainer Böhme
2012
conf/ih
A Game-Theoretic Approach to Content-Adaptive Steganography.
Pascal Schöttle
Rainer Böhme
2011
conf/fc
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data.
Rainer Böhme
Stefanie Pötzsch
2011
conf/nspw
The security cost of cheap user interaction.
Rainer Böhme
Jens Grossklags
2011
conf/ih
Countering Counter-Forensics: The Case of JPEG Compression.
Shiyue Lai
Rainer Böhme
2010
conf/iwsec
Security Metrics and Security Investment Models.
Rainer Böhme
2009
conf/ih
An Epistemological Approach to Steganography.
Rainer Böhme
2008
journals/tifs
Hiding Traces of Resampling in Digital Images.
Matthias Kirchner
Rainer Böhme
2008
conf/ih
Weighted Stego-Image Steganalysis for JPEG Covers.
Rainer Böhme
2007
conf/ih
Tamper Hiding: Defeating Image Forensics.
Matthias Kirchner
Rainer Böhme
2005
conf/ih
Assessment of Steganalytic Methods Using Multiple Regression Models.
Rainer Böhme
2004
conf/ih
Exploiting Preserved Statistics for Steganalysis.
Rainer Böhme
Andreas Westfeld
2004
conf/esorics
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics.
Rainer Böhme
Andreas Westfeld
Coauthors
Adam Jenkins
(1)
Alexander Schlögl
(2)
Andreas Fuchs
(1)
Andreas Westfeld
(2)
Andrew D. Ker
(1)
Arman Noroozian
(1)
Aron Laszka
(1)
Benedikt Lorch
(1)
Benjamin Johnson
(1)
Cecilia Pasquini
(5)
Daniel G. Arce
(2)
Daniel Schwarcz
(1)
Daniel W. Woods
(6)
Dominic Breuker
(1)
Dominique Machuletz
(1)
Fernando Pérez-González
(1)
Giulia Boato
(1)
Helmut Elsinger
(1)
Helmut Stix
(1)
Jens Grossklags
(2)
Jessica J. Fridrich
(1)
Josephine Wolff
(1)
Maciej Korczynski
(1)
Malte Möser
(3)
Margherita Marinetti
(1)
Martin Benes
(2)
Martin Florian
(1)
Martin Summer
(1)
Matthias Carnein
(1)
Matthias Kirchner
(2)
Maximilian Hils
(2)
Michael Fröwis
(5)
Michel van Eeten
(1)
Nora Hofer
(2)
Pascal Schöttle
(7)
Patrick Bas
(1)
Patrik Keller
(1)
Rachiyta Jain
(1)
Rainer Böhme
(53)
Rémi Cogranne
(1)
Samaneh Tajalizadehkhoob
(1)
Scott Craver
(1)
Shiyue Lai
(1)
Stefan Korff
(1)
Stefan Laube
(1)
Stefanie Pötzsch
(1)
Svetlana Abramova
(3)
Temima Hrle
(1)
Tobias Kupek
(2)
Tom van Goethem
(1)
Tomás Filler
(1)
Tomás Pevný
(1)
Tyler Moore
(1)
Wouter Joosen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to