@article{ChubukovKapitanovMoninaetal., author = {Chubukov, A. and Kapitanov, Valeriy and Monina, Olga and Silyanov, Valentin and Brannolte, Ulrich}, title = {Simulation of Regional Mortality Rate in Road Accidents}, series = {Transportation Research Procedia 20}, journal = {Transportation Research Procedia 20}, doi = {10.1016/j.trpro.2017.01.031}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20170331-30956}, pages = {112 -- 124}, abstract = {The paper gives the results of scientific research, which, being based on probabilistic and statistical modeling, identifies the relationship of certain socio-economic factors and the number of people killed in road accidents in the Russian Federation regions. It notes the identity of processes in various fields, in which there is loss of life. Scientific methods and techniques were used in the process of data processing and study findings: systematic approach, methods of system analysis (algorithmization, mathematical programming) and mathematical statistics. The scientific novelty lies in the formulation, formalization and solving problems related to the analysis of regional road traffic accidents, its modeling taking into account the factors of socio-economic impact.}, subject = {Modellierung}, language = {en} } @phdthesis{Wenzel, author = {Wenzel, Jakob}, title = {Design and Analysis of Cryptographic Algorithms for Authentication}, doi = {10.25643/bauhaus-universitaet.3714}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20171208-37140}, school = {Bauhaus-Universit{\"a}t Weimar}, abstract = {During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous groundbreaking research topics in the field of cryptography. This thesis focuses on the design and analysis of cryptographic primitives and schemes to be used for authentication of data and communication endpoints, i.e., users. It is structured into three parts, where we present the first freely scalable multi-block-length block-cipher-based compression function (Counter-bDM) in the first part. The presented design is accompanied by a thorough security analysis regarding its preimage and collision security. The second and major part is devoted to password hashing. It is motivated by the large amount of leaked password during the last years and our discovery of side-channel attacks on scrypt - the first modern password scrambler that allowed to parameterize the amount of memory required to compute a password hash. After summarizing which properties we expect from a modern password scrambler, we (1) describe a cache-timing attack on scrypt based on its password-dependent memory-access pattern and (2) outline an additional attack vector - garbage-collector attacks - that exploits optimization which may disregard to overwrite the internally used memory. Based on our observations, we introduce Catena - the first memory-demanding password-scrambling framework that allows a password-independent memory-access pattern for resistance to the aforementioned attacks. Catena was submitted to the Password Hashing Competition (PHC) and, after two years of rigorous analysis, ended up as a finalist gaining special recognition for its agile framework approach and side-channel resistance. We provide six instances of Catena suitable for a variety of applications. We close the second part of this thesis with an overview of modern password scramblers regarding their functional, security, and general properties; supported by a brief analysis of their resistance to garbage-collector attacks. The third part of this thesis is dedicated to the integrity (authenticity of data) of nonce-based authenticated encryption schemes (NAE). We introduce the so-called j-IV-Collision Attack, allowing to obtain an upper bound for an adversary that is provided with a first successful forgery and tries to efficiently compute j additional forgeries for a particular NAE scheme (in short: reforgeability). Additionally, we introduce the corresponding security notion j-INT-CTXT and provide a comparative analysis (regarding j-INT-CTXT security) of the third-round submission to the CAESAR competition and the four classical and widely used NAE schemes CWC, CCM, EAX, and GCM.}, subject = {Kryptologie}, language = {en} } @inproceedings{OPUS4-3826, title = {Hochschulwege 2015}, editor = {Mai, Andreas}, publisher = {tredition GmbH}, address = {Hamburg}, isbn = {978-3-7439-1763-7}, doi = {10.25643/bauhaus-universitaet.3826}, url = {http://nbn-resolving.de/urn:nbn:de:gbv:wim2-20181130-38263}, pages = {396}, abstract = {Die in diesem Tagungsband zusammengef{\"u}hrten Beitr{\"a}ge besch{\"a}ftigen sich mit dem Spannungsfeld, das sich zwischen externen F{\"o}rderprogrammen, Ver{\"a}nderungsprojekten und den Zielen, Strukturen und Bedingungen der jeweiligen Hochschule ergibt. In diesem Spannungsfeld kommt es unweigerlich zu Reibungen, da vorhandene Strukturen und Ziele in Konflikt mit neuen Vorhaben und Ideen geraten. Ein Teil der Projekte stellt allein durch ihr finanzielles Volumen und die daraus resultierende Wirkkraft die tradierten Verh{\"a}ltnisse zwischen Lehre, Forschung und den wissenschaftsst{\"u}tzenden Bereichen in Frage und teils auf den Kopf. Die leitenden Fragen der Tagung und der hier versammelten Beitr{\"a}ge waren daher: Wie bringen Hochschulen ihre individuellen Ziele mit denen der bundesweiten Programme oder l{\"a}nderspezfifischer F{\"o}rdermaßnahmen {\"u}berein? Wie gehen Hochschulen mit ihren Projekten um? Wie vollzieht sich Ver{\"a}nderung an den Hochschulen? Und schließlich: Was bleibt von den Impulsen, die Projekte setzen? Die in diesem Tagungsband versammelten Beitr{\"a}ge geben darauf erste, auf dem bisherigen Erfahrungswissen basierende Antworten. Sie setzen sich intensiv mit den Faktoren auseinander, die den Erfolg von Ver{\"a}nderungsprozessen und Projekten bef{\"o}rdern oder behindern k{\"o}nnen und leiten daraus Empfehlungen f{\"u}r Gestaltungsprozesse an Hochschulen ab.}, subject = {Hochschule}, language = {de} }