TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 14.

Schaller, A. ; Schulz, S. ; Kohnhäuser, F. ; Katzenbeisser, S. (2017):
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
In: European Symposium on Research in Computer Security (ESORICS),
[Conference or Workshop Item]

Kohnhäuser, F. ; Büscher, N. ; Gabmeyer, S. ; Katzenbeisser, S. (2017):
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec),
ACM, [Conference or Workshop Item]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Conference or Workshop Item]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013):
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2), pp. 209-232. [Article]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]

Alsouri, S. ; Feller, T. ; Malipatlolla, S. ; Katzenbeisser, S. (2013):
Hardware-based Security for Virtual Trusted Platform Modules.

Ober, M. ; Katzenbeisser, S. ; Hamacher, Kay (2013):
Structure and Anonymity of the Bitcoin Transaction Graph.
In: Future Internet, 5 (2), pp. 237-250. [Article]

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012):
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
In: International Conference on Cryptology in Africa (AFRICACRYPT 2012), pp. 234-251,
Springer, [Conference or Workshop Item]

Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010):
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing, [Article]

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. (2010):
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
In: Information Hiding (IH 2010), pp. 193-207,
Springer, [Conference or Workshop Item]

Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1), [Article]

Reker, D. ; Katzenbeisser, S. ; Hamacher, Kay (2010):
Computation of mutual information from Hidden Markov Models.
In: Computational biology and chemistry, 34 (5-6), pp. 328-333. ISSN 1476-928X,

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009):
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4), pp. 803-819. Korean Mathematical Society, ISSN 1015-8634,
DOI: 10.4134/BKMS.2009.46.4.803,

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008):
Distributed Attribute-Based Encryption.
In: Lecture Notes in Computer Science, 5461, In: Information Security and Cryptology - ICISC 2008, pp. 20-36,
Springer, 11th International Conference on lnformation Security and Cryptology (ICISC 2008), Seoul, South Korea, 03.-05.12.2008, ISBN 978-3-642-00729-3,
DOI: 10.1007/978-3-642-00730-9_2,
[Conference or Workshop Item]

This list was generated on Sat Jan 22 03:19:30 2022 CET.