Blog
Career
Traveling
Diving
Hiking
Abi95
Info
Contact
Home

Publications

Some of the downloadable files are authors' versions or pre-prints. See also the respective disclaimers.

2019

  1. Harborth, D. and Pape, S.: How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies -- The Case of Tor. In 52st Hawaii International Conference on System Sciences, HICSS 2019, 2019, to appear.
    Abstract HP19hicssBibtexinformation systemsprivacy

2018

  1. Aladawy, D.; Beckers, K. and Pape, S.: PERSUADED: Fighting Social Engineering Attacks with a Serious Game. In Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings, Springer, Lecture Notes in Computer Science 11033, 2018, ISBN 978-3-319-98384-4, Acceptance rate: 15 / 29 = 51.7%.
    PDF DOI Link Abstract ABP18trustbusBibtexprivacysecuritysocial engineering
  2. Dax, J.; Hamburg, D.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Sichere Informationsnetze bei kleinen und mittleren Energieversorgern (SIDATE). In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 29, Universität der Bundeswehr, Neubiberg, 2018.
    LinkBibtexsecurity
  3. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand der IT-Sicherheit bei deutschen Stromnetzbetreibern. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 69-74, Universität der Bundeswehr, Neubiberg, 2018.
    LinkBibtexsecurity
  4. Dax, J.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Das SIDATE-Portal im Einsatz. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 145-150, Universität der Bundeswehr, Neubiberg, 2018.
    LinkBibtexsecurity
  5. Hamburg, D.; Niephaus, T.; Noll, W.; Pape, S.; Rannenberg, K. and Schmitz, C.: SIDATE: Gefährdungen und Sicherheitsmassnahmen. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 51, Universität der Bundeswehr, Neubiberg, 2018.
    LinkBibtexsecurity
  6. Harborth, D.; Braun, M.; Grosz, A.; Pape, S. and Rannenberg, K.: Anreize und Hemmnisse für die Implementierung von Privacy-Enhancing Technologies im Unternehmenskontext. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 29-41, 2018.
    PDF DOI Slides Link Abstract HBGPR18sicherheitBibtexinformation systemsprivacy
  7. Harborth, D. and Pape, S.: Examining Technology Use Factors of Privacy-Enhancing Technologies: The Role of Perceived Anonymity and Trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018, Association for Information Systems, 2018.
    PDF Link Abstract HP18amcisBibtexinformation systemsprivacy
  8. Harborth, D. and Pape, S.: JonDonym Users' Information Privacy Concerns. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 170-184, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF DOI Slides Link Abstract HP18ifipsecBibtexinformation systemsprivacy
  9. Harborth, D. and Pape, S.: German Translation of the Concerns for Information Privacy (CFIP) Construct.
    PDF DOI Link Abstract HP18ssrn_cfipBibtexinformation systemsprivacy
  10. Harborth, D. and Pape, S.: German Translation of the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) Questionnaire.
    PDF DOI Link Abstract HP18ssrn_utautBibtexinformation systems
  11. Kipker, D-K.; Pape, S.; Wojak, S. and Beckers, K.: Juristische Bewertung eines Social-Engineering-Abwehr Trainings. In State of the Art: IT-Sicherheit für Kritische Infrastrukturen, pages 112-115, Universität der Bundeswehr, Neubiberg, 2018.
    LinkBibtexsecuritysocial engineering
  12. Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C.; Sekulla, A. and Terhaag, F.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2018.
    PDF Link Abstract PPRSST18trBibtexsecurity
  13. Pape, S. and Rannenberg, K.: Cyber-Gefahren auf dem Radar. In ManagementKompass: Unternehmen schützen -- Risiken minimieren, November (03): pages 9-12, 2018.
    LinkBibtexsecurity
  14. Pape, S. and Rannenberg, K.: Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. In Mobile Networks and Applications (MONET) -- The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing, 2018.
    PDF DOI Link Abstract PR18monetBibtexiotprivacysoftware engineering
  15. Pape, S.; Tasche, D.; Bastys, I.; Grosz, A.; Laessig, J. and Rannenberg, K.: Towards an Architecture for Pseudonymous E-Commerce -- Applying Privacy by Design to Online Shopping. In Sicherheit 2018: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 9. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 25.-27. April 2018, Konstanz, pages 17-28, 2018.
    PDF DOI Slides Link Abstract PTBGLR18sicherheitBibtexprivacy
  16. Paul, N.; Tesfay, W. B.; Kipker, D-K.; Stelter, M. and Pape, S.: Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pages 156-169, 2018, Acceptance rate: 27 / 89 = 30.3%.
    PDF DOI Slides Link Abstract PTKSP18ifipsecBibtexprivacy
  17. Schmitz, C.; Sekula, A.; Pape, S.; Pipek, V. and Rannenberg, K.: Easing the Burden of Security Self-Assessments. In 12th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018 ,Dundee, Scotland, August 29-31, 2018, Proceedings., 2018.
    PDF Abstract SSPRR18haisaBibtexsecurity

2017

  1. Beckers, K.; Fries, V.; Groen, E. C. and Pape, S.: Creativity Techniques for Social Engineering Threat Elicitation: A Controlled Experiment. In Joint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, February 27, 2017., 2017.
    PDF Slides Link Abstract BFGP17CreaREBibtexsecuritysocial engineering
  2. Beckers, K.; Schosser, D.; Pape, S. and Schaab, P.: A Structured Comparison of Social Engineering Intelligence Gathering Tools. In Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings, pages 232-246, 2017, Revision 1, Table 7 was corrected, see http://link.springer.com/10.1007/978-3-319-64483-7_16.
    PDF DOI Slides Link Abstract BSPS17trustbusBibtexprivacysecuritysocial engineering
  3. Dax, J.; Ivan, A.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: IT Security Status of German Energy Providers. Technical Report, Cornell University, arXiv, 2017.
    PDF Link Abstract DILPPRSS17trBibtexsecurity
  4. Dax, J.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Sekulla, A.: Stand zur IT-Sicherheit deutscher Stromnetzbetreiber : technischer Bericht. Technical Report, Universität Siegen, 2017.
    PDF Link Abstract DLPPRSS17trBibtexsecurity
  5. Harborth, D.; Herrmann, D.; Köpsell, S.; Pape, S.; Roth, C.; Federrath, H.; Kesdogan, D. and Rannenberg, K.: Integrating Privacy-Enhancing Technologies into the Internet Infrastructure. Technical Report, Cornell University, arXiv, 2017.
    PDF Link Abstract HHKPRFKR17anonBibtexprivacy
  6. Harborth, D. and Pape, S.: Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go. In 2017 IEEE International Symposium on Mixed and Augmented Reality, ISMAR 2017, Nantes, France, October 9-13, 2017, pages 155-168, 2017.
    PDF DOI Link Abstract HP17ismarBibtexinformation systems
  7. Harborth, D. and Pape, S.: Privacy Concerns and Behavior of Pokémon Go Players in Germany. In Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, pages 314-329, Springer International Publishing, IFIP Advances in Information and Communication Technology 526, 2017.
    PDF DOI Link Abstract HP17ifipscBibtexinformation systemsprivacy
  8. Harborth, D. and Pape, S.: Age Matters - Privacy Concerns of Pokémon Go Players in Germany (Extended Abstract). In Preproceedings of IFIP Summer School on Privacy and Identity Management ? the Smart World Revolution 2017 (IFIPSC2017), 2017.
    PDF Abstract HP17ifipsc_eaBibtexinformation systemsprivacy
  9. Pape, S.: Technische Bedingungen wirksamer Verschlüsselung. In Jahrbuch 2016, Deutsche Gesellschaft für Recht und Informatik, 2017, available via https://www.dgri.de/55/Publikationen/Schriftenreihe-der-DGRI.htm.
    LinkBibtexcryptosecurity
  10. Sailer, M.; Hoppenz, C.; Beckers, K. and Pape, S.: Förderung von IT-Sicherheitsbewusstheit durch spielbasiertes Lernen - eine experimentelle Studie. In Tagung der Sektion "Empirische Bildungsforschung" -- Educational Research and Governance (AEPF 2017), 2017.
    PDF Link Abstract SHBP17aepfBibtexsecuritysocial engineering
  11. Schaab, P.; Beckers, K. and Pape, S.: Social engineering defence mechanisms and counteracting training strategies. In Information and Computer Security, 25 (2): 206-222, 2017.
    DOI Link Abstract SBP17icsBibtexsecuritysocial engineering

2016

  1. Beckers, K. and Pape, S.: A Serious Game for Eliciting Social Engineering Security Requirements. In Proceedings of the 24th IEEE International Conference on Requirements Engineering, IEEE Computer Society, RE '16 , 2016, Acceptance Rate: 22/79 = 27.8%.
    PDF DOI Abstract BP16reBibtexsecuritysocial engineering
  2. Beckers, K.; Pape, S. and Fries, V.: HATCH: Hack And Trick Capricious Humans -- A Serious Game on Social Engineering. In Proceedings of the 2016 British HCI Conference, Bournemouth, United Kingdom, July 11-15, 2016, 2016.
    PDF Poster Link Abstract BPF16bhciBibtexsecuritysocial engineering
  3. Dax, J.; Hamburg, D.; Kreusch, M.; Ley, B.; Pape, S.; Pipek, V.; Rannenberg, K.; Schmitz, C. and Terhaag, F.: Sichere Informationsinfrastrukturen für kleine und mittlere Energieversorger. In Multikonferenz Wirtschaftsinformatik (MKWI) -- Teilkonferenz IT-Sicherheit für Kritische Infrastrukturen (Poster), 2016.
    PDF Poster Abstract DHKLPPRST16mkwiBibtexsecurity
  4. Dax, J.; Ley, B.; Pape, S.; Schmitz, C.; Pipek, V. and Rannenberg, K.: Elicitation of Requirements for an inter-organizational Platform to Support Security Management Decisions. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract DLPS16haisaBibtexsecurity
  5. Pape, S.; Flake, J.; Beckmann, A. and Jürjens, J.: STAGE -- A Software Tool for Automatic Grading of Testing Exercises -- Case Study Paper. In Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016 - Companion Volume, pages 491-500, 2016, Acceptance rate: (22+4)/64 = (34.4 + 6.3) %.
    PDF DOI Slides Link Abstract PFBJ16icseseetBibtexsoftware engineering
  6. Schaab, P.; Beckers, K. and Pape, S.: A systematic Gap Analysis of Social Engineering Defence Mechanisms considering Social Psychology. In 10th International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016 ,Frankfurt, Germany, July 19-21, 2016, Proceedings., 2016.
    PDF Link Abstract SBP16haisaBibtexsecuritysocial engineering
  7. Tesfay, W. B.; Serna, J. and Pape, S.: Challenges in Detecting Privacy Revealing Information in Unstructured Text. In Workshop on Society, Privacy and the Semantic Web - Policy and Technology PrivOn 2016 at the International Semantic Web Conference (ISWC) 2016, Kobe, Japan, 2016.
    PDF Link Abstract TSP16privonBibtexprivacy
  8. Tschersich, M.; Kiyomoto, S.; Pape, S.; Nakamura, T.; Bal, G.; Takasaki, H. and Rannenberg, K.: On Gender Specific Perception of Data Sharing in Japan. In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 150-160, 2016, Acceptance rate: 27/139 = 20.9%.
    PDF DOI Slides Link Abstract TKPNBTR16ifipsecBibtexinformation systemsprivacy

2015

  1. Pape, S.; Serna-Olvera, J. and Tesfay, W.: Why Open Data May Threaten Your Privacy. In Workshop on Privacy and Inference, co-located with KI, 2015.
    PDF Slides Abstract PST15prinfBibtexprivacy

2014

  1. Pape, S.: Authentication in Insecure Environments -- Using Visual Cryptography and Non-Transferable Credentials in Practise. Springer Vieweg, Research , 2014.
    DOI Link Abstract pape14authenticationBibtexcryptoprivacysecurity
  2. Pape, S.: Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers, pages 291-303, 2014, Acceptance rate: 31 / 138 = 22.5%.
    PDF DOI Slides Abstract pape14fcBibtexcrypto

2013

  1. Bleikertz, S.; Mastelic, T.; Pape, S.; Pieters, W. and Dimkov, T.: Defining the Cloud Battlefield -- Supporting Security Assessments by Cloud Customers. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), pages 78-87, 2013, Acceptance rate: 22 / 107 = 20.6%.
    PDF DOI Abstract BMPPD13ic2eBibtexsecurity
  2. Pape, S.: The Challenge of Authentication in Insecure Environments. Ph.D. Thesis, Universität Kassel, 2013.
    Bibtexcryptoprivacysecurity

2012

  1. Ochoa, M.; Pape, S.; Ruhroth, T.; Sprick, B.; Stenzel, K. and Sudbrock, H.: Report on the RS3 Topic Workshop "Security Properties in Software Engineering". Technical Report, Universitätsbibliothek der Universität Augsburg, Universitätsstr. 22, 86159 Augsburg, 2012.
    PDF Link Abstract OPRSSS12TRRS3Bibtexsecuritysoftware engineering
  2. Pape, S.; Schöch, C. and Wegner, L.: TEICHI and the Tools Paradox. Developing a Publishing Framework for Digital Editions. In Journal of the Text Encoding Initiative, 2: 1-16, 2012.
    PDF DOI Link Abstract PSW12teijournalBibtexsoftware engineering

2010

  1. Pape, S.; Schöch, C. and Wegner, L.: Bringing Bérardier de Bataut's Essai sur le récit to the Web: Editorial Requirements and Publishing Framework (Poster). In Poster at: TEI 2010, The 2010 Conference of the Text Encoding Initiative Consortium, 2010.
    Poster LinkBibtexsoftware engineering
  2. Pape, S.; Schöch, C. and Wegner, L.: A Framework for TEI-Based Scholarly Text Editions. Technical Report, Universität Kassel, 2010.
    PDF Link Abstract PSW10TRBibtexsoftware engineering
  3. Wolf, C.; Pape, S. and Porada, L.: Leitfaden zur Gründung von GI - Studierendengruppen (GI-SG).
    LinkBibtex

2009

  1. Greveler, U.; Laskov, P. and Pape, S.: Vorwort der Workshop-Leitung.
    Bibtex
  2. Pape, S.: A Survey on Non-transferable Anonymous Credentials. In The Future of Identity in the Information Society, pages 107-118, Springer Boston, Brno, Czech Republic, IFIP Advances in Information and Communication Technology 298, 2009.
    DOI Abstract pape09fidisBibtexprivacy
  3. Pape, S.: Some Observations on Reusing One-Time Pads within Dice Codings (abstract). In Tagungsband zum 10. Kryptotag, Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft für Informatik, 2009, Berlin.
    Bibtexcrypto

2008

  1. Pape, S.: Templateless Biometric-Enforced Non-Transferability of Anonymous Credentials (extended abstract). In Book of Abstracts of the 2nd Weekend of Cryptography, Weimar, 2008.
    LinkBibtexprivacy
  2. Pape, S.: Embedding Biometric Information into Anonymous Credentials. In Extended Abstracts of the Second Privacy Enhancing Technologies Convention (PET-CON 2008.1), Bamberger Beiträge zur Wirtschaftsinformatik und angewandten Informatik , 2008.
    Abstract pape08petconBibtexprivacy
  3. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem: Untersuchungen eines Kryptosystems mit Worst-Case / Average-Case Äquivalenz zum unique Shortest Vector Problem. Vdm Verlag Dr. Müller, 2008.
    Link Abstract pape08ajtai-dworkBibtexcrypto
  4. Pape, S.: A Survey on Untransferable Anonymous Credentials (extended abstract). Technical Report, Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Brno, 2008.
    Abstract pape08fidispreBibtexprivacy
  5. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In The Future of Identity in the Information Society, pages 299-310, Springer Boston, IFIP International Federation for Information Processing 262, 2008.
    DOI Abstract PB08fidisBibtexcryptoprivacy

2007

  1. Pape, S. and Benamar, N.: Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy (extended Abstract). Technical Report, Pre-Proceedings of the IFIP/FIDIS Summer School on ``The Future of Identity in the Information Society'', Karlstad, 2007.
    Abstract PB07fidispreBibtexcryptoprivacy

2004

  1. Pape, S.: Sicherheitsmodelle für das Ajtai-Dwork-Kryptosystem. Master's Thesis, Lehrstuhl für Kryptographie und Computeralgebra, Fachbereich Informatik der Technischen Universität Darmstadt, 2004.
    PDF Abstract pape04thesisBibtexcrypto
  2. Pape, S.; Dietz, L. and Tandler, P.: Single Display Gaming: Examining Collaborative Games for Multi-User Tabletops. In Workshop on Gaming Applications in Pervasive Computing Environments at Pervasive '04, 2004.
    PDF Abstract PDT04pervasiveBibtexsoftware engineering

Profile

Business Networks

View Sebastian Pape's profile on Xing   View Sebastian Pape's profile on LinkedIn

Academic Networks

View Sebastian Pape's Profile on Research Gate   View Sebastian Pape's ORCID