default search action
Rainer Böhme
Person information
- affiliation: University of Münster, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Daniel G. Arce, Daniel W. Woods, Rainer Böhme:
Economics of incident response panels in cyber insurance. Comput. Secur. 140: 103742 (2024) - [c116]Martin Benes, Rainer Böhme:
Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis. IH&MMSec 2024: 75-86 - [c115]Benedikt Lorch, Rainer Böhme:
Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications. USENIX Security Symposium 2024 - [e8]Rainer Böhme, Lucianna Kiffer:
6th Conference on Advances in Financial Technologies, AFT 2024, September 23-25, 2024, Vienna, Austria. LIPIcs 316, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2024, ISBN 978-3-95977-345-4 [contents] - [i23]Aviv Yaish, Svetlana Abramova, Rainer Böhme:
Strategic Vote Timing in Online Elections With Public Tallies. CoRR abs/2402.09776 (2024) - [i22]Benedikt Lorch, Rainer Böhme:
Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications. CoRR abs/2406.15206 (2024) - [i21]Nora Hofer, Rainer Böhme:
A Taxonomy of Miscompressions: Preparing Image Forensics for Neural Compression. CoRR abs/2409.05490 (2024) - 2023
- [j33]Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag:
Mapping the Privacy Landscape for Central Bank Digital Currencies. Commun. ACM 66(3): 46-53 (2023) - [c114]Michael Fröwis, Rainer Böhme:
Detecting Privileged Parties on Ethereum. FC Workshops 2023: 470-488 - [c113]Nora Hofer, Rainer Böhme:
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics. IH&MMSec 2023: 47-58 - [c112]Alexander Schlögl, Nora Hofer, Rainer Böhme:
Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks. NeurIPS 2023 - [c111]Svetlana Abramova, Rainer Böhme, Helmut Elsinger, Helmut Stix, Martin Summer:
What can central bank digital currency designers learn from asking potential users? SOUPS 2023: 151-170 - [c110]Svetlana Abramova, Rainer Böhme:
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. USENIX Security Symposium 2023: 715-732 - [c109]Daniel W. Woods, Rainer Böhme, Josephine Wolff, Daniel Schwarcz:
Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys. USENIX Security Symposium 2023: 2259-2273 - [c108]Martin Benes, Benedikt Lorch, Rainer Böhme:
JPEG Steganalysis Using Leaked Cover Thumbnails. WIFS 2023: 1-6 - [i20]Svetlana Abramova, Rainer Böhme:
Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. CoRR abs/2308.00375 (2023) - 2022
- [j32]Daniel W. Woods, Rainer Böhme:
The commodification of consent. Comput. Secur. 115: 102605 (2022) - [j31]Daniel W. Woods, Rainer Böhme:
Incident Response as a Lawyers' Service. IEEE Secur. Priv. 20(2): 68-74 (2022) - [j30]Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag:
Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you. ACM Queue 20(4): 16-38 (2022) - [j29]Federica Lago, Cecilia Pasquini, Rainer Böhme, Hélène Dumont, Valérie Goffaux, Giulia Boato:
More Real Than Real: A Study on Human Visual Perception of Synthetic Faces [Applications Corner]. IEEE Signal Process. Mag. 39(1): 109-116 (2022) - [c107]Patrik Keller, Rainer Böhme:
Parallel Proof-of-Work with Concrete Bounds. AFT 2022: 1-15 - [c106]Martin Benes, Nora Hofer, Rainer Böhme:
The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis. EUSIPCO 2022: 1057-1061 - [c105]Michael Fröwis, Rainer Böhme:
Not All Code are Create2 Equal. Financial Cryptography Workshops 2022: 516-538 - [c104]Martin Benes, Nora Hofer, Rainer Böhme:
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. IH&MMSec 2022: 19-25 - [c103]Friedhelm Victor, Bernhard Haslhofer, Sourav Sen Gupta, Malte Möser, Rainer Böhme:
CAAW'22: 2022 International Workshop on Cryptoasset Analytics. WWW (Companion Volume) 2022: 464-466 - [i19]Patrik Keller, Rainer Böhme:
Parallel Proof-of-Work with Concrete Bounds. CoRR abs/2204.00034 (2022) - 2021
- [j28]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Privacy Preference Signals: Past, Present and Future. Proc. Priv. Enhancing Technol. 2021(4): 249-269 (2021) - [c102]Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, Rainer Böhme:
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. CHI 2021: 692:1-692:19 - [c101]Artemij Voskobojnikov, Svetlana Abramova, Konstantin Beznosov, Rainer Böhme:
Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk. ECIS 2021 - [c100]Svetlana Abramova, Rainer Böhme:
Out of the Dark: The Effect of Law Enforcement Actions on Cryptocurrency Market Prices. eCrime 2021: 1-11 - [c99]Patrik Keller, Martin Florian, Rainer Böhme:
Collaborative Deanonymization. Financial Cryptography Workshops 2021: 39-46 - [c98]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
Forensicability of Deep Neural Network Inference Pipelines. ICASSP 2021: 2515-2519 - [c97]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
iNNformant: Boundary Samples as Telltale Watermarks. IH&MMSec 2021: 81-86 - [c96]Daniel W. Woods, Rainer Böhme:
SoK: Quantifying Cyber Risk. SP 2021: 211-228 - [i18]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
Forensicability of Deep Neural Network Inference Pipelines. CoRR abs/2102.00921 (2021) - [i17]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Privacy Preference Signals: Past, Present and Future. CoRR abs/2106.02283 (2021) - [i16]Federica Lago, Cecilia Pasquini, Rainer Böhme, Hélène Dumont, Valérie Goffaux, Giulia Boato:
More Real than Real: A Study on Human Visual Perception of Synthetic Faces. CoRR abs/2106.07226 (2021) - [i15]Alexander Schlögl, Tobias Kupek, Rainer Böhme:
iNNformant: Boundary Samples as Telltale Watermarks. CoRR abs/2106.07303 (2021) - [i14]Pietro Saggese, Alessandro Belmonte, Nicola Dimitri, Angelo Facchini, Rainer Böhme:
Who are the arbitrageurs? Empirical evidence from Bitcoin traders in the Mt. Gox exchange platform. CoRR abs/2109.10958 (2021) - [i13]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Conflicting Privacy Preference Signals in the Wild. CoRR abs/2109.14286 (2021) - 2020
- [j27]Rainer Böhme, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, Aviv Zohar:
Responsible vulnerability disclosure in cryptocurrencies. Commun. ACM 63(10): 62-71 (2020) - [j26]Cecilia Pasquini, Rainer Böhme:
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition. EURASIP J. Inf. Secur. 2020: 12 (2020) - [j25]Dominique Machuletz, Rainer Böhme:
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proc. Priv. Enhancing Technol. 2020(2): 481-498 (2020) - [c95]Maximilian Hils, Rainer Böhme:
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. ACNS (2) 2020: 233-253 - [c94]Alexander Schlögl, Rainer Böhme:
eNNclave: Offline Inference with Model Confidentiality. AISec@CCS 2020: 93-104 - [c93]Tobias Kupek, Cecilia Pasquini, Rainer Böhme:
On the Difficulty of Hiding Keys in Neural Networks. IH&MMSec 2020: 73-78 - [c92]Maximilian Hils, Daniel W. Woods, Rainer Böhme:
Measuring the Emergence of Consent Management on the Web. Internet Measurement Conference 2020: 317-332 - [i12]Maximilian Hils, Rainer Böhme:
Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069. CoRR abs/2001.02564 (2020) - [i11]Patrik Keller, Martin Florian, Rainer Böhme:
Collaborative Deanonymization. CoRR abs/2005.03535 (2020) - [i10]George Bissias, Rainer Böhme, David Thibodeau, Brian Neil Levine:
Pricing Security in Proof-of-Work Systems. CoRR abs/2012.03706 (2020)
2010 – 2019
- 2019
- [j24]Cecilia Pasquini, Giulia Boato, Rainer Böhme:
Teaching Digital Signal Processing With a Challenge on Image Forensics [SP Education]. IEEE Signal Process. Mag. 36(2): 101-109 (2019) - [j23]Cecilia Pasquini, Rainer Böhme:
Information-Theoretic Bounds for the Forensic Detection of Downscaled Signals. IEEE Trans. Inf. Forensics Secur. 14(7): 1928-1943 (2019) - [c91]Michael Fröwis, Rainer Böhme:
The Operational Cost of Ethereum Airdrops. DPM/CBT@ESORICS 2019: 255-270 - [c90]Michael Fröwis, Andreas Fuchs, Rainer Böhme:
Detecting Token Systems on Ethereum. Financial Cryptography 2019: 93-112 - [i9]Michael Fröwis, Rainer Böhme:
The Operational Cost of Ethereum Airdrops. CoRR abs/1907.12383 (2019) - [i8]Patrik Keller, Rainer Böhme:
HotPoW: Finality from Proof-of-Work Quorums. CoRR abs/1907.13531 (2019) - [i7]Dominique Machuletz, Rainer Böhme:
Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. CoRR abs/1908.10048 (2019) - [i6]Bryan Ford, Rainer Böhme:
Rationality is Self-Defeating in Permissionless Systems. CoRR abs/1910.08820 (2019) - 2018
- [j22]Markus Riek, Rainer Böhme:
The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†. J. Cybersecur. 4(1): tyy004 (2018) - [j21]Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. ACM Trans. Internet Techn. 18(4): 47:1-47:3 (2018) - [j20]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. ACM Trans. Internet Techn. 18(4): 49:1-49:25 (2018) - [c89]Dominique Machuletz, Stefan Laube, Rainer Böhme:
Webcam Covering as Planned Behavior. CHI 2018: 180 - [c88]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme:
Detecting Adversarial Examples - a Lesson from Multimedia Security. EUSIPCO 2018: 947-951 - [c87]Daniel G. Arce, Rainer Böhme:
Pricing Anonymity. Financial Cryptography 2018: 349-368 - [c86]Cecilia Pasquini, Rainer Böhme:
Towards A Theory of Jpeg Block Convergence. ICIP 2018: 550-554 - [c85]Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme:
Verbesserung der Syndrome-Trellis-Kodierung zur Erhöhung der Unvorhersagbarkeit von Einbettpositionen in steganographischen Systemen. Sicherheit 2018: 83-94 - [e7]Rainer Böhme, Cecilia Pasquini, Giulia Boato, Pascal Schöttle:
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018. ACM 2018 [contents] - [i5]Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme:
Detecting Adversarial Examples - A Lesson from Multimedia Forensics. CoRR abs/1803.03613 (2018) - [i4]Michael Fröwis, Andreas Fuchs, Rainer Böhme:
Detecting Token Systems on Ethereum. CoRR abs/1811.11645 (2018) - [i3]Rainer Böhme, Joseph Bonneau, Ittay Eyal:
Blockchain Security at Scale (Dagstuhl Seminar 18461). Dagstuhl Reports 8(11): 21-34 (2018) - 2017
- [j19]Stefan Laube, Rainer Böhme:
Strategic Aspects of Cyber Risk Information Sharing. ACM Comput. Surv. 50(5): 77:1-77:36 (2017) - [j18]Malte Möser, Rainer Böhme:
The price of anonymity: empirical evidence from a market for Bitcoin anonymization. J. Cybersecur. 3(2): 127-135 (2017) - [j17]Paulina Pesch, Rainer Böhme:
Datenschutz trotz öffentlicher Blockchain? Datenschutz und Datensicherheit 41(2): 93-98 (2017) - [j16]Rainer Böhme, Paulina Pesch:
Technische Grundlagen und datenschutzrechtliche Fragen der Blockchain-Technologie. Datenschutz und Datensicherheit 41(8): 473-481 (2017) - [c84]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c83]Michael Fröwis, Rainer Böhme:
In Code We Trust? - Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum. DPM/CBT@ESORICS 2017: 357-372 - [c82]Malte Möser, Rainer Böhme:
Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques. EuroS&P Workshops 2017: 32-41 - [c81]Svetlana Abramova, Pascal Schöttle, Rainer Böhme:
Mixing Coins of Different Quality: A Game-Theoretic Approach. Financial Cryptography Workshops 2017: 280-297 - [c80]Markus Riek, Svetlana Abramova, Rainer Böhme:
Analyzing Persistent Impact of Cybercrime on the Societal Level: Evidence for Individual Security Behavior. ICIS 2017 - [c79]Cecilia Pasquini, Rainer Böhme:
Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity. IH&MMSec 2017: 3-14 - [c78]Olaf Markus Köhler, Cecilia Pasquini, Rainer Böhme:
On the Statistical Properties of Syndrome Trellis Coding. IWDW 2017: 331-346 - [c77]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme:
Decoy Password Vaults: At Least as Hard as Steganography? SEC 2017: 356-370 - [i2]Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczynski, Michel van Eeten:
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse. CoRR abs/1702.01624 (2017) - [i1]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j15]Stefan Laube, Rainer Böhme:
The economics of mandatory security breach reporting to authorities. J. Cybersecur. 2(1): 29-41 (2016) - [j14]Markus Riek, Rainer Böhme, Tyler Moore:
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Trans. Dependable Secur. Comput. 13(2): 261-273 (2016) - [j13]Pascal Schöttle, Rainer Böhme:
Game Theory and Adaptive Steganography. IEEE Trans. Inf. Forensics Secur. 11(4): 760-773 (2016) - [c76]Rainer Böhme:
Back to the Roots: Information Sharing Economics and What We Can Learn for Security. WISCS@CCS 2016: 1-2 - [c75]Svetlana Abramova, Rainer Böhme:
Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study. ICIS 2016 - [c74]Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, Fernando Pérez-González:
Forensics of High Quality and Nearly Identical JPEG Image Recompression. IH&MMSec 2016: 11-21 - [c73]Svetlana Abramova, Rainer Böhme:
Detecting Copy-Move Forgeries in Scanned Text Documents. Media Watermarking, Security, and Forensics 2016: 1-9 - [c72]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Telltale Watermarks for Counting JPEG Compressions. Media Watermarking, Security, and Forensics 2016: 1-10 - [e6]Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman:
Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016. ACM 2016, ISBN 978-1-4503-4813-3 [contents] - 2015
- [j12]Sarah Spiekermann, Rainer Böhme, Alessandro Acquisti, Kai Lung Hui:
Personal data markets. Electron. Mark. 25(2): 91-93 (2015) - [j11]Sarah Spiekermann, Alessandro Acquisti, Rainer Böhme, Kai Lung Hui:
The challenges of personal data markets and privacy. Electron. Mark. 25(2): 161-167 (2015) - [j10]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Adaptive Steganography and Steganalysis with Fixed-Size Embedding. Trans. Data Hiding Multim. Secur. 10: 69-91 (2015) - [c71]Stefan Laube, Rainer Böhme:
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. WISCS@CCS 2015: 31-42 - [c70]Malte Möser, Rainer Böhme:
Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. Financial Cryptography Workshops 2015: 19-33 - [c69]Rainer Böhme, Ulrich Waldmann:
Die Automatisierung von Compliance in Cloud-Umgebungen (ACCU). GI-Jahrestagung 2015: 497 - [c68]Stefan Laube, Rainer Böhme:
The Economics of Mandatory Security Breach Reporting to Authorities. WEIS 2015 - [c67]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Forensics of high-quality JPEG images with color subsampling. WIFS 2015: 1-6 - [c66]Stefan Laube, Rainer Böhme:
Meldepflichten für IT-Sicherheitsvorfälle: Ein Prinzipal-Agent-Ansatz. Wirtschaftsinformatik 2015: 1146-1162 - [e5]Rainer Böhme, Tatsuaki Okamoto:
Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8975, Springer 2015, ISBN 978-3-662-47853-0 [contents] - [e4]Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme:
Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015. ACM 2015, ISBN 978-1-4503-3754-0 [contents] - 2014
- [j9]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage. ACM Trans. Internet Techn. 14(2-3): 19:1-19:22 (2014) - [c65]Malte Möser, Rainer Böhme, Dominic Breuker:
Towards Risk Scoring of Bitcoin Transactions. Financial Cryptography Workshops 2014: 16-32 - [c64]Matthias Kirchner, Rainer Böhme:
"Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers. ICASSP 2014: 3982-3986 - [c63]Matthias Carnein, Pascal Schöttle, Rainer Böhme:
Predictable rain?: steganalysis of public-key steganography using wet paper codes. IH&MMSec 2014: 97-108 - [c62]Sebastian Luhn, Ina Bruns, Rainer Böhme:
Consumer Participation in Online Contracts - Exploring Cross-Out Clauses. Sicherheit 2014: 255-270 - [c61]Stefan Korff, Rainer Böhme:
Too Much Choice: End-User Privacy Decisions in the Context of Choice Proliferation. SOUPS 2014: 69-87 - [e3]Rainer Böhme, Michael Brenner, Tyler Moore, Matthew Smith:
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer 2014, ISBN 978-3-662-44773-4 [contents] - 2013
- [c60]Malte Möser, Rainer Böhme, Dominic Breuker:
An inquiry into money laundering tools in the Bitcoin ecosystem. eCrime 2013: 1-14 - [c59]Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme:
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats. ESORICS 2013: 273-290 - [c58]Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Böhme:
A game-theoretic analysis of content-adaptive steganography with independent embedding. EUSIPCO 2013: 1-5 - [c57]Shiyue Lai, Rainer Böhme:
Block convergence in repeated transform coding: JPEG-100 forensics, carbon dating, and tamper detection. ICASSP 2013: 3028-3032 - [c56]Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný:
Moving steganography and steganalysis from the laboratory into the real world. IH&MMSec 2013: 45-58 - [c55]Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme:
Bitspotting: Detecting Optimal Adaptive Steganography. IWDW 2013: 3-18 - [c54]Rainer Böhme, Jens Grossklags:
Trading Agent Kills Market Information - Evidence from Online Social Lending. WINE 2013: 68-81 - [p4]Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. The Economics of Information Security and Privacy 2013: 135-156 - [p3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - [e2]Rainer Böhme:
The Economics of Information Security and Privacy. Springer 2013, ISBN 978-3-642-39497-3 [contents] - 2012
- [c53]Rainer Böhme, Tyler Moore:
How do consumers react to cybercrime? eCrime Researchers Summit 2012: 1-12 - [c52]Rainer Böhme:
Security Audits Revisited. Financial Cryptography 2012: 129-147 - [c51]Benjamin Johnson, Pascal Schöttle, Rainer Böhme:
Where to Hide the Bits ? GameSec 2012: 1-17 - [c50]Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Geld stinkt, Bitcoin auch - Eine Ökobilanz der BitcoinBlock Chain. GI-Jahrestagung 2012: 39-50 - [c49]Pascal Schöttle, Rainer Böhme:
A Game-Theoretic Approach to Content-Adaptive Steganography. Information Hiding 2012: 125-141 - [c48]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [c47]Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. WEIS 2012 - [c46]Pascal Schöttle, Stefan Korff, Rainer Böhme:
Weighted stego-image steganalysis for naive content-adaptive embedding. WIFS 2012: 193-198 - 2011
- [c45]Rainer Böhme, Stefanie Pötzsch:
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. Financial Cryptography 2011: 1-15 - [c44]Benjamin Johnson, Rainer Böhme, Jens Grossklags:
Security Games with Market Insurance. GameSec 2011: 117-130 - [c43]Shiyue Lai, Rainer Böhme:
Countering Counter-Forensics: The Case of JPEG Compression. Information Hiding 2011: 285-298 - [c42]Rainer Böhme, Jens Grossklags:
The security cost of cheap user interaction. NSPW 2011: 67-82 - [c41]Rainer Böhme:
Wann sind IT-Security-Audits nützlich? Wirtschaftsinformatik 2011: 72 - 2010
- [b2]Rainer Böhme:
Advanced Statistical Steganalysis. Information Security and Cryptography, Springer 2010, ISBN 978-3-642-14312-0, pp. 1-217 - [j8]Rainer Böhme, Tyler Moore:
The Iterated Weakest Link. IEEE Secur. Priv. 8(1): 53-55 (2010) - [j7]Rainer Böhme:
Towards Insurable Network Architectures (Versicherbare Netzarchitekturen). it Inf. Technol. 52(5): 290-294 (2010) - [j6]Thomas Gloe, Rainer Böhme:
The Dresden Image Database for Benchmarking Digital Image Forensics. J. Digit. Forensic Pract. 3(2-4): 150-159 (2010) - [c40]Rainer Böhme, Stefanie Pötzsch:
Privacy in Online Social Lending. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c39]Rainer Böhme, Stefan Köpsell:
Trained to accept?: a field experiment on consent dialogs. CHI 2010: 2403-2406 - [c38]Rainer Böhme, Márk Félegyházi:
Optimal Information Security Investment with Penetration Testing. GameSec 2010: 21-37 - [c37]Rainer Böhme:
Security Metrics and Security Investment Models. IWSEC 2010: 10-24 - [c36]Thomas Gloe, Rainer Böhme:
The 'Dresden Image Database' for benchmarking digital image forensics. SAC 2010: 1584-1590 - [c35]Rainer Böhme, Stefanie Pötzsch:
Social Lending aus der Perspektive des Datenschutzes. Sicherheit 2010: 317-328 - [c34]Stefanie Pötzsch, Rainer Böhme:
The Role of Soft Information in Trust Building: Evidence from Online Social Lending. TRUST 2010: 381-395 - [c33]Rainer Böhme, Galina Schwartz:
Modeling Cyber-Insurance: Towards a Unifying Framework. WEIS 2010 - [e1]Rainer Böhme, Philip W. L. Fong, Reihaneh Safavi-Naini:
Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer 2010, ISBN 978-3-642-16434-7 [contents]
2000 – 2009
- 2009
- [b1]Rainer Böhme:
Improved statistical steganalysis using models of heterogeneous cover signals. Dresden University of Technology, 2009, pp. 1-230 - [c32]Benjamin Kellermann, Rainer Böhme:
Privacy-Enhanced Event Scheduling. CSE (3) 2009: 52-59 - [c31]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia-Forensik als Teildisziplin der digitalen Forensik. GI Jahrestagung 2009: 1537-1551 - [c30]Rainer Böhme:
An Epistemological Approach to Steganography. Information Hiding 2009: 15-30 - [c29]Rainer Böhme, Felix C. Freiling, Thomas Gloe, Matthias Kirchner:
Multimedia Forensics Is Not Computer Forensics. IWCF 2009: 90-103 - [c28]Matthias Kirchner, Rainer Böhme:
Synthesis of color filter array pattern in digital images. Media Forensics and Security 2009: 72540K - [c27]Stefan Berthold, Rainer Böhme:
Valuating Privacy with Option Pricing Theory. WEIS 2009 - [c26]Rainer Böhme, Tyler Moore:
The Iterated Weakest Link - A Model of Adaptive Security Investment. WEIS 2009 - [p2]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. Managing Information Risk and the Economics of Security 2009: 55-80 - [p1]Rainer Böhme:
Conformity or Diversity: Social Implications of Transparency in Personal Data Processing. Managing Information Risk and the Economics of Security 2009: 291-312 - 2008
- [j5]Rainer Böhme, Andreas Pfitzmann:
Digital Rights Management zum Schutz personenbezogener Daten? Datenschutz und Datensicherheit 32(5): 342-347 (2008) - [j4]Matthias Kirchner, Rainer Böhme:
Hiding Traces of Resampling in Digital Images. IEEE Trans. Inf. Forensics Secur. 3(4): 582-592 (2008) - [c25]Stefan Berthold, Rainer Böhme, Stefan Köpsell:
Data Retention and Anonymity Services - Introducing a New Class of Realistic Adversary Models. FIDIS 2008: 92-106 - [c24]Rainer Böhme:
Weighted Stego-Image Steganalysis for JPEG Covers. Information Hiding 2008: 178-194 - [c23]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. ISSE 2008: 57-76 - [c22]Andrew D. Ker, Rainer Böhme:
Revisiting weighted stego-image steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681905 - [c21]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. WEIS 2008 - [c20]Rainer Böhme:
Conformity or Diversity: Social Implications of Transparency in Personal Data Processing. WEIS 2008 - 2007
- [j3]Rainer Böhme, Christian Keiler:
On the Security of "A Steganographic Scheme for Secure Communications Based on the Chaos and the Euler Theorem". IEEE Trans. Multim. 9(6): 1325-1329 (2007) - [j2]Rainer Böhme, Sven Koble:
Pricing strategies in electronic marketplaces with privacy-enhancing technologies. Wirtschaftsinf. 49(1): 16-25 (2007) - [c19]Matthias Kirchner, Rainer Böhme:
Tamper Hiding: Defeating Image Forensics. Information Hiding 2007: 326-341 - [c18]Thomas Gloe, Matthias Kirchner, Antje Winkler, Rainer Böhme:
Can we trust digital image forensics? ACM Multimedia 2007: 78-86 - [c17]Rainer Böhme, Sven Koble:
On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good? WEIS 2007 - 2006
- [c16]Rainer Böhme:
A Comparison of Market Approaches to Software Vulnerability Disclosure. ETRICS 2006: 298-311 - [c15]Rainer Böhme, Andrew D. Ker:
A two-factor error model for quantitative steganalysis. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607206 - [c14]Rainer Böhme, Gaurav Kataria:
On the Limits of Cyber-Insurance. TrustBus 2006: 31-40 - [c13]Rainer Böhme, Thorsten Holz:
The Effect of Stock Spam on Financial Markets. WEIS 2006 - [c12]Rainer Böhme, Gaurav Kataria:
Models and Measures for Correlation in Cyber-Insurance. WEIS 2006 - 2005
- [j1]Rainer Böhme, Andreas Westfeld:
Feature-based encoder classification of compressed audio streams. Multim. Syst. 11(2): 108-120 (2005) - [c11]Rainer Böhme, Felix C. Freiling:
On Metrics and Measurements. Dependability Metrics 2005: 7-13 - [c10]Rainer Böhme, Ralf H. Reussner:
Validation of Predictions with Measurements. Dependability Metrics 2005: 14-18 - [c9]Rainer Böhme, Thomas Nowey:
Economic Security Metrics. Dependability Metrics 2005: 176-187 - [c8]Rainer Böhme:
Assessment of Steganalytic Methods Using Multiple Regression Models. Information Hiding 2005: 278-295 - [c7]Sven Koble, Rainer Böhme:
Economics of Identity Management: A Supply-Side Perspective. Privacy Enhancing Technologies 2005: 259-272 - [c6]Rainer Böhme:
IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur. Sicherheit 2005: 27-40 - [c5]Rainer Böhme:
Cyber-Insurance Revisited. WEIS 2005 - 2004
- [c4]Rainer Böhme, Andreas Westfeld:
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. ESORICS 2004: 125-140 - [c3]Rainer Böhme, Andreas Westfeld:
Exploiting Preserved Statistics for Steganalysis. Information Hiding 2004: 82-96 - [c2]Rainer Böhme, Andreas Westfeld:
Statistical characterisation of MP3 encoders for steganalysis. MM&Sec 2004: 25-34 - [c1]Rainer Böhme, George Danezis, Claudia Díaz, Stefan Köpsell, Andreas Pfitzmann:
On the PET Workshop Panel "Mix Cascades Versus Peer-to-Peer: Is One Concept Superior?". Privacy Enhancing Technologies 2004: 243-255
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint