TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 14.

Schaller, A. and Schulz, S. and Kohnhäuser, F. and Katzenbeisser, S. :
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
European Symposium on Research in Computer Security (ESORICS)
[Conference or Workshop Item] , (2017)

Kohnhäuser, F. and Büscher, N. and Gabmeyer, S. and Katzenbeisser, S. :
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) ACM
[Conference or Workshop Item] , (2017)

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. :
ORAMs in a Quantum World.
PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography Springer
[Conference or Workshop Item] , (2017)

Armknecht, F. and Katzenbeisser, S. and Peter, A. :
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2) pp. 209-232.
[Article] , (2013)

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. :
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3) pp. 117-128.
[Article] , (2013)

Alsouri, S. and Feller, T. and Malipatlolla, S. and Katzenbeisser, S. :
Hardware-based Security for Virtual Trusted Platform Modules.
In:
[Article] , (2013)

Ober, M. and Katzenbeisser, S. and Hamacher, Kay :
Structure and Anonymity of the Bitcoin Transaction Graph.
In: Future Internet, 5 (2) pp. 237-250.
[Article] , (2013)

Armknecht, F. and Katzenbeisser, S. and Peter, A. :
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
International Conference on Cryptology in Africa (AFRICACRYPT 2012) Springer
[Conference or Workshop Item] , (2012)

Kinder, J. and Katzenbeisser, S. and Schallhart, C. and Veith, H. :
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
[Article] , (2010)

Liu, Y. and Ghosal, D. and Armknecht, F. and Sadeghi, A. and Schulz, S. and Katzenbeisser, S. :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding (IH 2010) Springer
[Conference or Workshop Item] , (2010)

Jha, Somesh and Katzenbeisser, S. and Schallhart, C. and Veith, H. and Chenney, S. :
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
[Article] , (2010)

Reker, D. and Katzenbeisser, S. and Hamacher, Kay :
Computation of mutual information from Hidden Markov Models.
In: Computational biology and chemistry, 34 (5-6) pp. 328-333. ISSN 1476-928X
[Article] , (2010)

Müller, S. and Katzenbeisser, S. and Eckert, C. :
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4) pp. 803-819.
[Article] , (2009)

Müller, S. and Katzenbeisser, S. and Eckert, C. :
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008)
[Conference or Workshop Item] , (2008)

This list was generated on Tue Apr 16 01:21:02 2019 CEST.