TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 14.

Schaller, A. and Schulz, S. and Kohnhäuser, F. and Katzenbeisser, S. (2017):
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
In: European Symposium on Research in Computer Security (ESORICS), [Conference or Workshop Item]

Kohnhäuser, F. and Büscher, N. and Gabmeyer, S. and Katzenbeisser, S. (2017):
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), ACM, [Conference or Workshop Item]

Gagliardoni, Tommaso and Karvelas, Nikolaos and Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography, Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, pp. 209-232, 67, (2), [Article]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Alsouri, S. and Feller, T. and Malipatlolla, S. and Katzenbeisser, S. (2013):
Hardware-based Security for Virtual Trusted Platform Modules.
[Article]

Ober, M. and Katzenbeisser, S. and Hamacher, Kay (2013):
Structure and Anonymity of the Bitcoin Transaction Graph.
In: Future Internet, pp. 237-250, 5, (2), [Article]

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer, [Conference or Workshop Item]

Kinder, J. and Katzenbeisser, S. and Schallhart, C. and Veith, H. (2010):
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing, [Article]

Liu, Y. and Ghosal, D. and Armknecht, F. and Sadeghi, A. and Schulz, S. and Katzenbeisser, S. (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010), Springer, [Conference or Workshop Item]

Jha, Somesh and Katzenbeisser, S. and Schallhart, C. and Veith, H. and Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10, (1), [Article]

Reker, D. and Katzenbeisser, S. and Hamacher, Kay (2010):
Computation of mutual information from Hidden Markov Models.
In: Computational biology and chemistry, pp. 328-333, 34, (5-6), ISSN 1476-928X,
[Article]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, pp. 803-819, 46, (4), [Article]

Müller, S. and Katzenbeisser, S. and Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: International Conference on lnformation Security and Cryptology (ICISC 2008), [Conference or Workshop Item]

This list was generated on Sat Oct 19 00:51:17 2019 CEST.