Benjamin Leiding

Benjamin Leiding
Technische Universität Clausthal | TUC · Institute for Software and Systems Engineering

PhD in Computer Science

About

28
Publications
18,113
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
349
Citations
Additional affiliations
January 2020 - present
Georg-August-Universität Göttingen
Position
  • PostDoc Position
April 2017 - present
Georg-August-Universität Göttingen
Position
  • PhD Student
April 2016 - March 2017
Georg-August-Universität Göttingen
Position
  • Research Assistant

Publications

Publications (28)
Article
Full-text available
New SARS-CoV-2 variants, breakthrough infections, waning immunity, and sub-optimal vaccination rates account for surges of hospitalizations and deaths. There is an urgent need for clinically valuable and generalizable triage tools assisting the allocation of hospital resources, particularly in resource-limited countries. We developed and validate C...
Article
Full-text available
Nowadays, business enactments almost exclusively focus on human-to-human business transactions. However, the ubiquitousness of smart devices enables business enactments among autonomously acting machines, thereby providing the foundation for the machine-driven Machine-to-Everything (M2X) Economy. Human-to-human business is governed by enforceable c...
Article
Full-text available
Sustainability is one of the most critical issues today. Thus, the unsustainable consumption of resources, such as raw materials, CO2 emissions, and the Linear Economy needs to be changed. One framework for a more sustainable economy is the Circular Economy. Although the concept of the Circular Economy has been around since the 1990s, yet we are st...
Preprint
Full-text available
Background More contagious SARS-CoV-2 virus variants, breakthrough infections, waning immunity, and differential access to COVID-19 vaccines account for the worst yet numbers of hospitalization and deaths during the COVID-19 pandemic, particularly in resource-limited countries. There is an urgent need for clinically valuable, generalizable, and par...
Article
Full-text available
Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), facilitate the design, development, analysis and verification of new protocols; the detection of flaws;...
Preprint
Full-text available
Dwindling nonrenewable fuel reserves, progressing severe environmental pollution, and accelerating climate change require society to reevaluate existing transportation concepts. While electric vehicles (EVs) have become more popular and slowly gain widespread adoption, the corresponding battery charging infrastructures still limits EVs' use in our...
Conference Paper
Full-text available
The progressing severe environmental pollution and dwindling nonrenewable resources force society to increase the reuse of electronic waste (e-waste) to ensure the availability of sufficient resources for future products and an environment worth living in. The constant growth and expansion of the Internet of Things (IoT) and related smart devices a...
Article
Full-text available
Blockchain-and smart-contract technology enhance the effectiveness and automation of business processes. The rising interest in the development of decentralized autonomous organizations (DAO) shows that blockchain technology has the potential to reform business and society. A DAO is an organization wherein business rules are encoded in smart-contra...
Article
Full-text available
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unr...
Conference Paper
Full-text available
A reliable certificate revocation mechanism is crucial, as illustrated by the recent revocation of 1.7 million certificates issued by the Let's Encrypt certificate authority. It is just as essential to get revocation information to users in an efficient and timely manner without impacting their privacy. Existing approaches such as Certificate Revoc...
Thesis
Full-text available
Nowadays, business transactions almost exclusively focus on human-to-human transactions. The persistent growth and expansion of the Internet of Things, the ubiquitousness of so called smart devices, as well as progressing digitalization of our daily life, enables business transactions without human intervention among autonomously acting machine age...
Chapter
Wir stellen ein neues Konzept für das wissenschaftliche Publikationswesen vor. Unsere Vision ist im Kontext eines dreistufigen Phasenmodells digitaler Disruption von Geschäftsprozessen angesiedelt. Die erste Phase besteht dabei aus Technologie ohne Prozessanpassung. Die zweite Phase umfasst eine Prozessanpassung unter der Kontrolle von Intermediäre...
Article
Designing government independent and secure identification- and authentication protocols is a challenging task. Design flaws and missing specifications as well as security- and privacy issues of such protocols pose considerable user risks. Formal methods, such as Colored Petri Nets (CPN), are utilised for the design, development and analysis of suc...
Conference Paper
Full-text available
Authcoin is an alternative approach to the commonly used public key infrastructures such as central authorities and the PGP web of trust. It combines a challenge response-based validation and authentication process for domains, certificates, email accounts and public keys with the advantages of a block chain-based storage system. As a result, Authc...
Article
Full-text available
Zusammenfassung Wir stellen ein neues Konzept als Metamodell für das wissenschaftliche Publikationswesen vor. Unser Konzept ist im Kontext eines dreistufigen Phasenmodells digitaler Disruption von Geschäftsprozessen angesiedelt. Die erste Phase besteht dabei aus Technologie ohne Prozessanpassung. Die zweite Phase umfasst eine Prozessanpassung unter...
Chapter
As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Au...
Chapter
Full-text available
Current web technology allows the use of cryptographic primitives as part of server-provided Javascript. This may result in security problems with web-based services. We provide an example for an attack on the WhisperKey service. We present a solution which is based on human code reviewing and on CVE (Common Vulnerabilities and Exposures) data base...
Conference Paper
Full-text available
The design and development of novel security and authenti-cation protocols is a challenging task. Design flaws, security and privacy issues as well as incomplete specifications pose risks for its users. Au-thcoin is a blockchain-based validation and authentication protocol for secure identity assurance. Formal methods, such as Colored Petri Nets (C...
Thesis
Full-text available
Designing and developing new security and authentication protocols in the field of computer science is a challenging task. Design flaws and missing specifications as well as security and privacy issues of such protocols pose risks for its users. Formal methods, such as Colored Petri Nets, are utilized for the design, development and analysis of suc...
Article
Full-text available
Transferring money and gaining access to credit across international borders is still complicated, time consuming and expensive. Existing money transfer systems suffer furthermore from long lines, exchange rate losses, counter-party risks, bureaucracy and extensive paperwork. An estimated two billion adults are unbanked and with no, or limited acce...
Article
Full-text available
Authcoin is an alternative approach to the commonly used public key infrastructures such as central authorities and the PGP web of trust. It combines a challenge response-based validation and authentication process for domains, certificates, email accounts and public keys with the advantages of a block chain-based storage system. As a result, Authc...
Conference Paper
Full-text available
Combining Vehicle Ad-hoc Networks (VANETs) and Ethereum's blockchain-based application concepts enables transparent, self-managed and decentralized system which are self-regulating and in no need of a central managing authority.
Conference Paper
Full-text available
Authcoin is an alternative approach to the commonly used public key infrastructures such as central authorities and the PGP web of trust. It combines a challenge response-based validation and authentication process for domains, certificates, email accounts and public keys with the advantages of a block chain-based storage system. As a result, Authc...
Conference Paper
Full-text available
Over the last 25 years four million e-mail addresses have accumulated in the PGP web of trust. In a study each of them was tested for vitality with the result of 40\% being unreachable. Of the mailboxes proven to be reachable, 46.77% turn out to be operated by one of three organizations. In this article, the authors share their results and challeng...
Conference Paper
Full-text available
The increasing number of students per classroom requires new ways of interactions betweens teachers and students. Classroom Response Systems (CRS) aim to solve this problem by enabling feedback for large audiences. We defined and identified requirements of a viable solution and present Tweedback as a example of modern Classroom Response Systems. Tw...

Network

Cited By

Projects

Projects (3)
Project
To develop and disseminate educational material on blockchain and smart contracts.
Project
I want to understand how I can improve classroom based teaching using ubiquitous devices such as mobile phones, smart watches or tablets. My main interest is in a low-level use, where technology is supporting the teaching process without forcing a focus on technology, device user interface or similar distractions.
Project
Authcoin is an alternative approach to the commonly used public key infrastructures such as central authorities and the PGP web of trust. It combines a challenge response-based validation and authentication process for domains, certificates, email accounts and public keys with the advantages of a block chain-based storage system. As a result, Authcoin does not suffer from the downsides of existing solutions and is much more resilient to sybil attacks.