![]() | Ebene hoch |
Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas
:
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18)
ACM
[
Konferenzveröffentlichung]
, (2018)
Kohnhäuser, Florian ; Büscher, Niklas ; Katzenbeisser, Stefan
:
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[
Konferenzveröffentlichung]
, (2018)
Büscher, Niklas ; Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science
ISBN 978-3-319-67521-3
[Buch]
, (2017)
Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan
:
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
ACM
[
Konferenzveröffentlichung]
, (2017)
Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan
:
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies
De Gruyter
[
Konferenzveröffentlichung]
, (2017)
Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan
:
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In:
arXiv
[Artikel]
, (2017)
Büscher, Niklas ; Franz, Martin ; Holzer, Andreas ; Veith, Helmut ; Katzenbeisser, Stefan
:
On compiling Boolean circuits optimized for secure multi-party computation.
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0]
In:
Formal Methods in System Design, 51
(2)
S. 308-331.
[Artikel]
, (2017)
Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian
:
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography
ACM
[
Konferenzveröffentlichung]
, (2016)
Büscher, Niklas ; Schiffner, Stefan ; Fischer, Mathias
:
Consumer Privacy on Distributed Energy Markets.
[Online-Edition: https://doi.org/10.1007/978-3-319-44760-5\_7]
In: Privacy Technologies and Policy - 4th Annual Privacy Forum, APF 2016, Germany, September 7-8, 2016, Frankfurt/Main, Germany.
[
Konferenzveröffentlichung]
, (2016)
Baecher, Paul ; Büscher, Niklas ; Fischlin, Marc ; Milde, Benjamin
:
Breaking reCAPTCHA: A Holistic Approach via Shape Recognition.
[Online-Edition: https://doi.org/10.1007/978-3-642-21424-0\_5]
In: Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, June 7-9, 2011, Lucerne, Switzerland.
[
Konferenzveröffentlichung]
, (2011)
Büscher, Niklas
:
On Solving Pentago.
[Online-Edition: http://www.ke.tu-darmstadt.de/lehre/arbeiten/bachelor/2011/B...]
TU Darmstadt
[Masterarbeit]
, (2011)