TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 22.

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Karvelas, Nikolaos and Katzenbeisser, Stefan and Krämer, Juliane and Rathee, Deevashwer and Schneider, Thomas and Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Cammarota, Rosario and Schunter, Matthias and Rajan, Anand and Boemer, Fabian and Kiss, Ágnes and Treiber, Amos and Weinert, Christian and Schneider, Thomas and Stapf, Emmanuel and Sadeghi, Ahmad-Reza and Demmler, Daniel and Chen, Huili and Hussain, Siam Umar and Riazi, M. Sadegh and Koushanfar, Farinaz and Gupta, Saransh and Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Bauspieß, Pia and Kolberg, Jascha and Demmler, Daniel and Krämer, Juliane and Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Conference or Workshop Item]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), pp. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Conference or Workshop Item]

Demmler, Daniel and Rindal, Peter and Rosulek, Mike and Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Article]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pp. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Conference or Workshop Item]

Krüger, Stefan and Nadi, Sarah and Reif, Michael and Ali, Karim and Mezini, Mira and Bodden, Eric and Göpfert, Florian and Günther, Felix and Weinert, Christian and Demmler, Daniel and Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Conference or Workshop Item]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Conference or Workshop Item]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), pp. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), pp. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Article]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pp. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), pp. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Demmler, Daniel (2013):
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
TU Darmstadt, [Master Thesis]

Demmler, Daniel (2011):
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
TU Darmstadt, [Bachelor Thesis]

This list was generated on Sat Jan 23 00:05:45 2021 CET.