Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
41238 Publications
2022 | Conference Abstract | LibreCat-ID: 54549
N. Janicki, “Technische Bildung im Sachunterricht der Grundschule am Beispiel von Lernrobotern - Entwicklung und Evaluation eines Fortbildungskonzepts. Posterbeitrag im Rahmen der 31. Jahrestagung der Gesellschaft für Didaktik des Sachunterrichts (GDSU) vom 09. bis 12.03.2022 in Köln,” presented at the 31. Jahrestagung der Gesellschaft für Didaktik des Sachunterrichts (GDSU), Universität zu Köln, 2022.
LibreCat
2022 | Journal Article | LibreCat-ID: 52918
F. Baader, P. Koopmann, F. Michel, A.-Y. Turhan, and B. Zarrieß, “Efficient TBox Reasoning with Value Restrictions using the Flower Reasoner,” Theory Pract. Log. Program., vol. 22, no. 2, pp. 162–192, 2022, doi: 10.1017/S1471068421000466.
LibreCat
| DOI
2022 | Misc | LibreCat-ID: 54554
R. Janus, Gott wird Mensch. Weihnachten zwischen Fiktion und Evangelium, vol. 4. Bensheim: Evangelischer Bund, 2022.
LibreCat
2022 | Journal Article | LibreCat-ID: 49458 |

I. Nastjuk, S. T.-N. Trang, and E. Papageorgiou, “Smart cities and smart governance models for future cities,” Electronic Markets, vol. 32, pp. 1917–1924, 2022.
LibreCat
| Download (ext.)
2022 | Journal Article | LibreCat-ID: 49460
K. Masuch, M. Greve, and S. T.-N. Trang, “What to do after a data breach? Examining apology and compensation as response strategies for health service providers,” Electronic Markets, vol. 31, pp. 829–848, 2022.
LibreCat
2022 | Journal Article | LibreCat-ID: 49459
K. Masuch, M. Greve, and S. T.-N. Trang, “Apologize or Justify? Examining the Impact of Data Breach Response Actions on Stock Value of Affected Companies,” Computers & Security, vol. 12, 2022.
LibreCat
2022 | Journal Article | LibreCat-ID: 45849
Y. Mahmood and A. Meier, “Parameterised complexity of model checking and satisfiability in propositional dependence logic,” Annals of Mathematics and Artificial Intelligence, vol. 90, no. 2–3, pp. 271–296, 2022, doi: 10.1007/s10472-021-09730-w.
LibreCat
| DOI
2022 | Journal Article | LibreCat-ID: 45847
J. Kontinen, A. Meier, and Y. Mahmood, “A parameterized view on the complexity of dependence and independence logic,” Journal of Logic and Computation, vol. 32, no. 8, pp. 1624–1644, 2022, doi: 10.1093/logcom/exac070.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 45846
J. Kontinen, A. Meier, and Y. Mahmood, “A Parameterized View on the Complexity of Dependence Logic,” 2022, doi: 10.1007/978-3-030-93100-1_9.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47289
N. Huaman et al., “If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers,” in Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022, 2022, pp. 313–330.
LibreCat
2022 | Conference Paper | LibreCat-ID: 47844
J. Jancar et al., “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: 10.1109/sp46214.2022.9833713.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47286
M. Gutfleisch, J. H. Klemmer, N. Busch, Y. Acar, M. A. Sasse, and S. Fahl, “How Does Usable Security (Not) End Up in Software Products? Results From a Qualitative Interview Study,” in 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, 2022, pp. 893–910, doi: 10.1109/SP46214.2022.9833756.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47287
C. Stransky, O. Wiese, V. Roth, Y. Acar, and S. Fahl, “27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University,” in 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, 2022, pp. 860–875, doi: 10.1109/SP46214.2022.9833755.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47283
H. Kaur, S. Amft, D. Votipka, Y. Acar, and S. Fahl, “Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples,” in 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, 2022, pp. 4041–4058.
LibreCat
2022 | Journal Article | LibreCat-ID: 47290
N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl, “They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web,” IEEE Secur. Priv., vol. 20, no. 2, pp. 49–60, 2022, doi: 10.1109/MSEC.2021.3123795.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47843
D. Wermke, N. Wohler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects,” 2022, doi: 10.1109/sp46214.2022.9833686.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47288
J. Jancar et al., “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” in 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, 2022, pp. 632–649, doi: 10.1109/SP46214.2022.9833713.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47285
D. Wermke, N. Wöhler, J. H. Klemmer, M. Fourné, Y. Acar, and S. Fahl, “Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects,” in 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, 2022, pp. 1880–1896, doi: 10.1109/SP46214.2022.9833686.
LibreCat
| DOI
2022 | Conference Paper | LibreCat-ID: 47284
C. W. Munyendo, Y. Acar, and A. J. Aviv, “‘Desperate Times Call for Desperate Measures’: User Concerns with Mobile Loan Apps in Kenya,” in 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22-26, 2022, 2022, pp. 2304–2319, doi: 10.1109/SP46214.2022.9833779.
LibreCat
| DOI