TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | W | Z
Number of items at this level: 161.

A

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, pp. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Article]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Article]

Arzt, Steven (2017):
Static Data Flow Analysis for Android Applications.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5937],
[Ph.D. Thesis]

Arzt, Steven and Nadi, Sarah and Ali, Karim and Bodden, Eric and Erdweg, Sebastian and Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: OOPSLA Onward!, Piitsburgh, 25.10.2015, In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, [Online-Edition: http://2015.splashcon.org/track/onward2015-papers],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Hahn, Robert and Bodden, Eric (2015):
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, In: 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, Portland, USA, 14.06.2015, [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Ali, Karim and Rapoport, Marianna and Lhoták, Ondřej and Dolby, Julian and Tip, Frank (2014):
Constructing Call Graphs of Scala Programs.
In: Proceedings of the 28th European Conference on Object-Oriented Programming, In: ECOOP '14, [Online-Edition: http://dx.doi.org/10.1007/978-3-662-44202-9_3],
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Fritz, Christian and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2014):
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
In: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, [Conference or Workshop Item]

Arzt, Steven and Huber, Stephan and Rasthofer, Siegfried and Bodden, Eric (2014):
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
In: 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, [Conference or Workshop Item]

Arzt, Steven and Bodden, Eric (2014):
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
In: ICSE, Hyderabad, [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13), Springer, pp. 364-381, [Article]

Arzt, Steven and Bodden, Eric (2013):
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
[Online-Edition: http://www.bodden.de/pubs/TUD-CS-2013-0253.pdf],
[Report]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), Springer, ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Conference or Workshop Item]

Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric (2013):
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Arzt, Steven and Falzon, Kevin and Follner, Andreas and Rasthofer, Siegfried and Bodden, Eric and Stolz, Volker (2013):
How useful are existing monitoring languages for securing Android apps?
Gesellschaft für Informatik, In: 6. Arbeitstagung Programmiersprachen (ATPS 2013), In: GI Lecture Notes in Informatics, [Online-Edition: http://www.bodden.de/pubs/aff13howuseful.pdf],
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2013):
Averroes: Whole-Program Analysis without the Whole Program.
In: Proceedings of the 27th European Conference on Object-Oriented Programming, In: ECOOP '13, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-39038-8_16],
[Conference or Workshop Item]

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan (2012):
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
In: Information Security, In: 15th International Conference on Information Security, Passau, Germany, 19-21 Sep 2012, In: Lecture Notes in Computer Science, 7483, ISSN 0302-9743,
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11],
[Conference or Workshop Item]

Ansaloni, Danilo and Binder, Walter and Bockisch, Christoph and Bodden, Eric and Hatun, Kardelen and Marek, Lukas and Qi, Zhengwei and Sarimbekov, Aibek and Sewe, Andreas and Tuma, Petr and Zheng, Yudi (2012):
Challenges for Refinement and Composition of Instrumentations (Position Paper).
In: International Conference on Software Composition (SC 2012), [Online-Edition: http://www.bodden.de/pubs/abb+12challenges.pdf],
[Conference or Workshop Item]

Ahmad, Junaid Jameel and Li, Shujun and Sadeghi, Ahmad-Reza and Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), Springer, DOI: 10.1007/978-3-642-32946-3_22,
[Conference or Workshop Item]

Ali, Karim and Lhoták, Ondřej (2012):
Application-Only Call Graph Construction.
In: Proceedings of the 26th European Conference on Object-Oriented Programming, In: ECOOP '12, [Online-Edition: http://dx.doi.org/10.1007/978-3-642-31057-7_30],
[Conference or Workshop Item]

Almeida, José Bacelar and Bangerter, Endre and Barbosa, Manuel and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), Springer, DOI: 10.1007/978-3-642-15497-3_10,
[Conference or Workshop Item]

Ali, Karim and Aib, Issam and Boutaba, Raouf (2009):
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Ali, Karim and Boutaba, Raouf (2009):
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
In: Global Information Infrastructure Symposium, In: GIIS '09, [Conference or Workshop Item]

Aly, Sherif G. and Nadi, Sarah and Hamdan, Karim (2008):
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, pp. 329-336, 8, (6), [Article]

B

Bodden, Eric and Pun, Ka I. and Steffen, Martin and Stolz, Volker and Wickert, Anna-Katharina
Margaria, Tiziana and Steffen, Bernhard (eds.) (2016):
Information Flow Analysis for Go.
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques, Springer International Publishing, pp. 431-445, DOI: 10.1007/978-3-319-47166-2_30,
[Online-Edition: https://doi.org/10.1007/978-3-319-47166-2_30],
[Book Section]

Baluda, Mauro (2015):
EvoSE: Evolutionary Symbolic Execution.
In: Proceedings for ESEC/FSE 2015 Workshops - 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015), [Online-Edition: http://dx.doi.org/10.1145/2804322.2804325],
[Article]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Bodden, Eric and Hermann, Ben and Lerch, Johannes and Mezini, Mira (2013):
Reducing human factors in software security architectures.
In: Future Security Conference 2013, [Online-Edition: http://www.bodden.de/pubs/blh+13reducing.pdf],
[Conference or Workshop Item]

Brzuska, Christina and Fischlin, Marc and Smart, Nigel and Warinschi, Bogdan and Williams, Stephen (2013):
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, pp. 267-297, 12, (4), [Article]

Bodden, Eric and Mezini, Mira and Brabrand, Claus and Tolêdo, Társis and Ribeiro, Márcio and Borba, Paulo (2013):
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013), [Online-Edition: http://www.bodden.de/pubs/bmb+13spllift.pdf],
[Conference or Workshop Item]

Bodden, Eric and Tolêdo, Társis and Ribeiro, Márcio and Brabrand, Claus and Borba, Paulo and Mezini, Mira (2012):
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
[Online-Edition: http://www.bodden.de/pubs/btr+12transparent.pdf],
[Report]

Bugiel, Sven and Heuser, Stephan and Sadeghi, Ahmad-Reza (2012):
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
(TUD-CS-2012-0226), [Report]

Bodden, Eric and Falzon, Kevin and Pun, Ka I. and Stolz, Volker (2012):
Delta-oriented Monitor Specification.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Online-Edition: http://www.bodden.de/pubs/bfp+12delta.pdf],
[Conference or Workshop Item]

Bodden, Eric and Follner, Andreas and Rasthofer, Siegfried (2012):
Challenges in defining a programming language for provably correct dynamic analyses.
Springer, In: 5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012), [Conference or Workshop Item]

Bodden, Eric (2012):
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
In: FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages, [Conference or Workshop Item]

Bodden, Eric (2012):
Identifying meaningless parameterized linear-temporal-logic formulas.
[Report]

Bodden, Eric (2012):
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
[Report]

Bodden, Eric and Lam, Patrick and Hendren, Laurie (2012):
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS), [Article]

Bodden, Eric (2012):
MOPBox: A Library Approach to Runtime Verification.
Springer, In: RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30, In: Lecture notes in computer science , 7186, [Online-Edition: http://www.bodden.de/pubs/bodden11mopbox.pdf],
[Conference or Workshop Item]

Bodden, Eric and Tanter, Éric and Inostroza, Milton (2012):
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
(TUD-CS-2012-0106), [Report]

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), ACM, DOI: 10.1145/2046707.2046753,
[Conference or Workshop Item]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: Secure Cloud Computing with Low Latency.
In: 12. Communications and Multimedia Security Conference (CMS'11), Springer, DOI: 10.1007/978-3-642-24712-5_3,
[Conference or Workshop Item]

Bodden, Eric (2011):
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Online-Edition: http://www.bodden.de/pubs/bodden11stateful.pdf],
[Conference or Workshop Item]

Bodden, Eric (2011):
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
ACM, In: WODA '11: International Workshop on Dynamic Analysis, [Online-Edition: http://www.bodden.de/pubs/bodden11continuation.pdf],
[Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), pp. 452-468, 6, (2), DOI: 10.1109/TIFS.2011.2108650,
[Article]

Bodden, Eric (2011):
Closure Joinpoints: Block joinpoints without surprises.
ACM, In: AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development, [Online-Edition: http://www.bodden.de/pubs/bodden11closure.pdf],
[Conference or Workshop Item]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (WCSC'11), [Conference or Workshop Item]

Bodden, Eric and Sewe, Andreas and Sinschek, Jan and Oueslati, Hela and Mezini, Mira (2011):
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
In: Proceedings of the 33rd International Conference on Software Engineering, New York, NY, USA, In: International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 21-28 May 2011, [Online-Edition: http://doi.acm.org/10.1145/1985793.1985827],
[Conference or Workshop Item]

Bodden, Eric and Lam, Patrick and Hendren, Laurie (2010):
Clara: a Framework for Statically Evaluating Finite-state Runtime Monitors.
Springer, In: 1st International Conference on Runtime Verification (RV), In: LNCS, 6418, [Conference or Workshop Item]

Bodden, Eric and Lam, Patrick (2010):
Clara: Partially Evaluating Runtime Monitors at Compile Time.
Springer, In: 1st International Conference on Runtime Verification (RV), In: LNCS, 6418, [Conference or Workshop Item]

Bruch, Marcel and Bodden, Eric and Monperrus, Martin and Mezini, Mira (2010):
IDE 2.0: Collective Intelligence in Software Development.
ACM, In: FSE/SDP Workshop on the Future of Software Engineering, DOI: 10.1145/1882362.1882374?,
[Online-Edition: http://www.bodden.de/pubs/bbmm10ide.pdf],
[Conference or Workshop Item]

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
YACZK: Yet Another Compiler for Zero-Knowledge.
In: 19. USENIX Security Symposium (USENIX Security'10) Poster Session, In: 19th USENIX Security Symposium (Security'10) Poster Session, [Other]

Bodden, Eric and Havelund, Klaus (2010):
Aspect-oriented Race Detection in Java.
In: IEEE Transactions on Software Engineering (TSE), IEEE, pp. 509-527, 36, (4), [Article]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Efficient Privacy-Preserving Classification of ECG Signals.
In: 1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), IEEE, DOI: 10.1109/WIFS.2009.5386475,
[Conference or Workshop Item]

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai (2009):
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), [Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), [Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09), Springer, DOI: 10.1007/978-3-642-04444-1_26,
[Conference or Workshop Item]

Bangerter, Endre and Briner, Thomas and Henecka, Wilko and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), Springer, DOI: 10.1007/978-3-642-16441-5_5,
[Conference or Workshop Item]

Bangerter, Endre and Barzan, Stefania and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai (2009):
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
In: 17. International Workshop on Security Protocols (SPW'09), Springer, DOI: 10.1007/978-3-642-36213-2_9,
[Conference or Workshop Item]

Bangerter, Endre and Camenisch, Jan and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28. Advances in Cryptology -- EUROCRYPT 2009 Poster Session, In: 28th Advances in Cryptology -- EUROCRYPT 2009 Poster Session, [Other]

C

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

D

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Davi, Lucas and Gens, David and Liebchen, Christopher and Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), Internet Society, [Conference or Workshop Item]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
In: 6. ACM Cloud Computing Security Workshop (CCSW'14), ACM, DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Master Thesis]

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso (2013):
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013, [Article]

Davi, Lucas and Dmitrienko, Alexandra and Nürnberger, Stefan and Sadeghi, Ahmad-Reza (2012):
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students (S3 2012), [Conference or Workshop Item]

E

Eichberg, Michael and Hermann, Ben and Mezini, Mira and Glanz, Leonid (2015):
Hidden Truths in Dead Software Paths.
New York, NY, USA, ACM, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, New York, NY, USA, In: ESEC/FSE 2015, ISBN 978-1-4503-3675-8,
[Online-Edition: http://doi.acm.org/10.1145/2786805.2786865],
[Conference or Workshop Item]

F

Follner, Andreas (2017):
On Generating Gadget Chains for Return-Oriented Programming.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5906],
[Ph.D. Thesis]

Falzon, Kevin (2017):
On the Use of Migration to Stop Illicit Channels.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5907],
[Ph.D. Thesis]

Falzon, Kevin and Bodden, Eric
Lopez, Javier and Mitchell, Chris J. (eds.) (2015):
Dynamically Provisioning Isolation in Hierarchical Architectures.
In: Information Security, In: Information Security Conference, Trondheim, In: Lecture Notes in Computer Science, 9290, [Conference or Workshop Item]

Falzon, Kevin and Bodden, Eric and Purandare, Rahul (2013):
Distributed Finite-State Runtime Monitoring with Aggregated Events.
In: Runtime Verification 2013 (RV'13), Springer, LNCS, [Article]

Fritz, Christian and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Bartel, Alexandre and Klein, Jacques and Le Traon, Yves and Octeau, Damien and McDaniel, Patrick (2013):
Highly Precise Taint Analysis for Android Applications.
[Online-Edition: http://www.informatik.tu-darmstadt.de/fileadmin/user_upload/...],
[Report]

Falzon, Kevin and Pace, Gordon J.
Machado, Ricardo J. and Maciel, Rita Suzana and Rubin, Julia and Botterweck, Goetz (eds.) (2012):
Combining Testing and Runtime Verification.
In: 8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software, Essen, Germany, September 04, 2012, [Online-Edition: http://www.di.uminho.pt/mompes],
[Conference or Workshop Item]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

G

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Conference or Workshop Item]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt, [Online-Edition: https://www.encrypto.cs.tu-darmstadt.de/media/encrypto/encry...],
[Bachelor Thesis]

Garcia, Luis and Brasser, Ferdinand and Cintuglu, Mehmet H. and Sadeghi, Ahmad-Reza and Mohammed, Osama and Zonouz, Saman A. (2017):
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

H

Heuser, Stephan and Reaves, Bradley and Pendyala, Praveen Kumar and Carter, Henry and Dmitrienko, Alexandra and Kiyavash, Negar and Enck, William and Sadeghi, Ahmad-Reza and Traynor, Patrick (2017):
Phonion: Practical Protection of Metadata in Telephony Networks.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), [Conference or Workshop Item]

Hermann, Ben and Reif, Michael and Eichberg, Michael and Mezini, Mira (2015):
Getting to Know You: Towards a Capability Model for Java.
New York, NY, USA, ACM, In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, New York, NY, USA, In: ESEC/FSE 2015, ISBN 978-1-4503-3675-8,
[Online-Edition: http://doi.acm.org/10.1145/2786805.2786829],
[Conference or Workshop Item]

Hiemenz, Benedikt (2014):
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
TU Darmstadt, [Bachelor Thesis]

Henecka, Wilko and Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), ACM, DOI: 10.1145/2484313.2484369,
[Conference or Workshop Item]

Huss, Sorin A. and Stöttinger, Marc and Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, [Conference or Workshop Item]

Henecka, Wilko and Kögl, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: 17. ACM Conference on Computer and Communications Security (CCS'10), ACM, DOI: 10.1145/1866307.1866358,
[Conference or Workshop Item]

I

Inostroza, Milton and Tanter, Éric and Bodden, Eric (2011):
Modular Reasoning with Join Point Interfaces.
[Report]

Inostroza, Milton and Tanter, Éric and Bodden, Eric (2011):
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
In: ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, [Online-Edition: http://www.bodden.de/pubs/itb11jpi.pdf],
[Conference or Workshop Item]

J

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Springer, DOI: 10.1007/978-3-642-15031-9_26,
[Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Embedded SFE: Offloading Server and Network using Hardware Tokens.
In: 14. International Conference on Financial Cryptography and Data Security (FC'10), Springer, DOI: 10.1007/978-3-642-14577-3_17,
[Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice, Springer-Verlag Berlin Heidelberg, pp. 367-386, DOI: 10.1007/978-3-642-14452-3_17,
[Book Section]

K

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17), Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Online-Edition: http://dl.acm.org/citation.cfm?id=3155562.3155681],
[Conference or Workshop Item]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Article]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Conference or Workshop Item]

Krämer, Juliane and Kiss, Ágnes and Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2014):
Automatic protocol selection in secure two-party computations.
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14), [Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33],
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), IOS Press, pp. 283-315, 21, (2), [Online-Edition: http://dx.doi.org/10.3233/JCS-130464],
[Article]

Kononenko, Kirill (2012):
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
In: International Conference on Mobile Computing and Networking, [Conference or Workshop Item]

Kim, Chang Hwan Peter and Bodden, Eric and Batory, Don and Khurshid, Sarfraz (2010):
Reducing Configurations to Monitor in a Software Product Line.
Springer, In: 1st International Conference on Runtime Verification (RV), In: LNCS, 6418, [Online-Edition: http://www.bodden.de/pubs/kbbk10reducing.pdf],
[Conference or Workshop Item]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: 8. International Conference on Cryptology And Network Security (CANS'09), Springer, DOI: 10.1007/978-3-642-10433-6_1,
[Conference or Workshop Item]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), [Conference or Workshop Item]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), [Conference or Workshop Item]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html],
[Standards, patents]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767],
[Standards, patents]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Improved Garbled Circuit: Free XOR Gates and Applications.
In: 35. International Colloquium on Automata, Languages and Programming (ICALP'08), Springer, DOI: 10.1007/978-3-540-70583-3_40,
[Conference or Workshop Item]

Kolesnikov, Vladimir and Schneider, Thomas and Strehl, Volker (2008):
Practical Secure Function Evaluation.
In: 8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), WSI-2008-02, [Conference or Workshop Item]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
In: 12. International Conference on Financial Cryptography and Data Security (FC'08), Springer, DOI: 10.1007/978-3-540-85230-8_7,
[Conference or Workshop Item]

L

Lerch, Johannes (2016):
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5580],
[Ph.D. Thesis]

Lerch, Johannes and Späth, Johannes and Bodden, Eric and Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), Washington, DC, USA, IEEE Computer Society, In: Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Online-Edition: https://dl.acm.org/citation.cfm?id=2916135&picked=prox],
[Conference or Workshop Item]

Lerch, Johannes and Hermann, Ben (2015):
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
New York, NY, USA, ACM, In: Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis, New York, NY, USA, In: SOAP 2015, ISBN 978-1-4503-3585-0,
[Online-Edition: http://doi.acm.org/10.1145/2771284.2771289],
[Conference or Workshop Item]

Lerch, Johannes and Hermann, Ben and Bodden, Eric and Mezini, Mira (2014):
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
New York, NY, USA, ACM, In: Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, In: FSE 2014, [Online-Edition: http://doi.acm.org/10.1145/2635868.2635878],
[Conference or Workshop Item]

Li, Li and Bartel, Alexandre and Klein, Jacques and Traon, Yves Le and Arzt, Steven and Rasthofer, Siegfried and Bodden, Eric and Octeau, Damien and McDaniel, Patrick (2014):
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
[Online-Edition: http://www.abartel.net/static/p/tr-iccta.pdf],
[Report]

Lam, Patrick and Bodden, Eric and Lhotak, Ondrej and Hendren, Laurie (2011):
The Soot framework for Java program analysis: a retrospective.
In: Cetus Users and Compiler Infastructure Workshop (CETUS 2011), [Online-Edition: http://www.bodden.de/pubs/lblh11soot.pdf],
[Conference or Workshop Item]

M

Mittelbach, Arno (2013):
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
In: Applied Cryptography and Network Security, Springer, In: Lecture Notes in Computer Science, [Conference or Workshop Item]

N

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Conference or Workshop Item]

Nadi, Sarah and Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, [Conference or Workshop Item]

P

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), pp. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Article]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Pullonen, Pille and Bogdanov, Dan and Schneider, Thomas (2012):
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...],
[Report]

Pinkas, Benny and Schneider, Thomas and Smart, Nigel P. and Williams, Stephen C. (2009):
Secure Two-Party Computation is Practical.
In: 15. Advances in Cryptology -- ASIACRYPT 2009, Springer, DOI: 10.1007/978-3-642-10366-7_15,
[Conference or Workshop Item]

Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Practical Secure Evaluation of Semi-Private Functions.
In: 7. International Conference on Applied Cryptography and Network Security (ACNS'09), Springer, DOI: 10.1007/978-3-642-01957-9_6,
[Conference or Workshop Item]

R

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196522,
[Conference or Workshop Item]

Rudd, Robert and Skowyra, Richard and Bigelow, David and Dedhia, Veer and Hobson, Thomas and Crane, Stephen and Liebchen, Christopher and Larsen, Per and Davi, Lucas and Franz, Michael and Sadeghi, Ahmad-Reza and Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS), [Conference or Workshop Item]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Article]

Rasthofer, Siegfried (2017):
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques.
Darmstadt, Technische Universität Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/5911],
[Ph.D. Thesis]

Rauzy, Pablo and Kiss, Ágnes and Krämer, Juliane and Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Conference or Workshop Item]

Rasthofer, Siegfried and Arzt, Steven and Lovat, Enrico and Bodden, Eric (2014):
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES), [Article]

Rasthofer, Siegfried and Arzt, Steven and Bodden, Eric (2014):
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS), [Article]

Robillard, Martin P. and Bodden, Eric and Kawrykow, David and Mezini, Mira and Ratchford, Tristan (2012):
Automated API Property Inference Techniques.
In: IEEE Transactions on Software Engineering (TSE), [Online-Edition: http://www.bodden.de/pubs/rbk+12automated.pdf],
[Article]

S

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, DOI: 10.1145/2897937.2898027,
[Conference or Workshop Item]

Songhori, Ebrahim and Hussain, Siam and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, DOI: 10.1109/SP.2015.32,
[Conference or Workshop Item]

Schneider, Matthias and Schneider, Thomas (2014):
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600927,
[Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2013):
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
In: 17. International Conference on Financial Cryptography and Data Security (FC'13), Springer, DOI: 10.1007/978-3-642-39884-1_23,
[Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2012):
Efficient Secure Two-Party Computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Schneider, Thomas (2012):
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-30041-7,
DOI: 10.1007/978-3-642-30042-4,
[Book]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
[Report]

Sadeghi, Ahmad-Reza and Schulz, Steffen and Varadharajan, Vijay
Foresti, Sara and Yung, Moti and Martinelli, Fabio (eds.) (2012):
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS), Berlin, Heidelberg, Springer Verlag, pp. 253-270, [Book Section]

Schneider, Thomas (2011):
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-University Bochum, Germany, [Online-Edition: https://thomaschneider.de/papers/S11Thesis.pdf],
[Ph.D. Thesis]

Schneider, Thomas (2011):
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
In: 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, SecuMedia-Verlag, [Online-Edition: http://buchshop.secumedia.de/buchshop/index.php?page=detail&...],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), Bonner Köllen Verlag, In: LNI, P-174, [Online-Edition: http://www.gi-ev.de/service/publikationen/lni/gi-edition-pro...],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo (2009):
Efficient Privacy-Preserving Face Recognition.
In: 12. International Conference on Information Security and Cryptology (ICISC'09), Springer, DOI: 10.1007/978-3-642-14423-3_16,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School, [Other]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2008):
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08), Springer, DOI: 10.1007/978-3-642-00730-9_21,
[Conference or Workshop Item]

Schneider, Thomas (2008):
Practical Secure Function Evaluation.
University Erlangen-Nürnberg, Germany, [Online-Edition: https://thomaschneider.de/papers/S08Thesis.pdf],
[Master Thesis]

Schneider, Thomas (2007):
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany, [Bachelor Thesis]

T

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196541,
[Conference or Workshop Item]

Thies, Andreas and Bodden, Eric (2012):
RefaFlex: Safer Refactorings for Reflective Java Programs [forthcoming].
In: International Symposium on Software Testing and Analysis (ISSTA 2012), [Online-Edition: http://www.bodden.de/pubs/tb12refaflex.pdf],
[Conference or Workshop Item]

W

Weinert, Christian and Demirel, Denise and Vigil, Martín and Geihs, Matthias and Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Conference or Workshop Item]

Z

Zohner, Michael (2017):
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154],
[Ph.D. Thesis]

This list was generated on Sun Jun 16 01:40:37 2019 CEST.