TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 120.

Reuter, Christian and Altmann, Jürgen and Aal, Konstantin and Aldehoff, Larissa and Buchmann, Johannes and Bernhardt, Ute and Denker, Kai and Herrmann, Dominik and Hollick, Matthias and Katzenbeisser, Stefan and Kaufhold, Marc-André and Nordmann, Alfred and Reinhold, Thomas and Riebe, Thea and Ripper, Annette and Ruhmann, Ingo and Saalbach, Klaus-Peter and Schörnig, Niklas and Sunyaev, Ali and Wulf, Volker
Reuter, Christian (ed.) :

The Future of Information Technology for Peace and Security.
In: Information Technology for Peace and Security - IT-Applications and Infrastructures in Conflicts, Crises, War, and Peace. Springer Vieweg, Wiesbaden, Germany Wiesbaden, Germany
[Book Section] , (2019)

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or Workshop Item] , (2018)

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Conference or Workshop Item] , (2018)

Karvelas, Nikolaos and Treiber, Amos and Katzenbeisser, Stefan :
Examining Leakage of Access Counts in ORAM Constructions.
29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2018)

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Tehranipoor, Fatemeh and Katzenbeisser, Stefan :
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
In: GI .
[Conference or Workshop Item] , (2018)

Kumar, Manish and Anagnostopoulos, Nikolaos Athanasios and Fan, Yufan and Katzenbeisser, Stefan :
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
In: GI .
[Conference or Workshop Item] , (2018)

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Skoric, Boris and Katzenbeisser, Stefan and Szefer, Jakub :
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC)
[Article] , (2018)

Kohnhäuser, Florian and Büscher, Niklas and Katzenbeisser, Stefan :
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
[Online-Edition: https://dl.acm.org/citation.cfm?id=3196544]
Proceedings of the 2018 on Asia Conference on Computer and Communications Security
[Conference or Workshop Item] , (2018)

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan :
Towards Practical RAM based Secure Computation.
[Online-Edition: https://esorics2018.upc.edu/]
In: ESORICS 2018, 3.9.-7.9. 2018, Barcelona, Spain. European Symposium on Research in Computer Security (ESORICS)
[Conference or Workshop Item] , (2018)

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Chandy, John A. and Tehranipoor, Fatemeh :
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, Volume 2 (7)
[Article] , (2018)

Geihs, Matthias and Karvelas, Nikolaos and Katzenbeisser, Stefan and Buchmann, Johannes :
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: The Sixth International Workshop on Security in Cloud Computing (SCC). In: ACM . Songdo, Incheon, Korea
[Conference or Workshop Item] , (2018)

Anagnostopoulos, Nikolaos Athanasios and Arul, Tolga and Fan, Yufan and Hatzfeld, Christian and Schaller, André and Xiong, Wenjie and Jain, Manishkumar and Saleem, Umair and Lotichius, Jan and Gabmeyer, Sebastian and Szefer, Jakub and Katzenbeisser, Stefan :
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
[Online-Edition: http://www.mdpi.com/2410-387X/2/3/13/htm]
In: Cryptography, 2 (3) ISSN 2410-387X
[Article] , (2018)

Birkholz, Henk and Krauß, Christoph and Zhdanova, Maria and Kuzhiyelil, Don and Arul, Tolga and Heinrich, Markus and Katzenbeisser, Stefan and Suri, Neeraj and Vateva-Gurova, Tsvetoslava and Schlehuber, Christian :
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
[Online-Edition: http://dx.doi.org/10.5281/zenodo.1314095]
In: International Workshop on MILS: Architecture and Assurance for Secure Systems, Luxembourg, 25.06.2018. Zenodo
[Conference or Workshop Item] , (2018)

Heinrich, Markus and Vieten, Jannik and Arul, Tolga and Katzenbeisser, Stefan :
Security Analysis of the RaSTA Safety Protocol.
[Online-Edition: https://doi.org/10.1109/ISI.2018.8587371]
In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).
[Conference or Workshop Item] , (2018)

Matyunin, Nikolay and Anagnostopoulos, Nikolaos Athanasios and Boukoros, Spyros and Heinrich, Markus and Schaller, André and Kolinichenko, Maksim and Katzenbeisser, Stefan :
Tracking Private Browsing Sessions using CPU-based Covert Channels.
[Online-Edition: http://doi.acm.org/10.1145/3212480.3212489]
In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018.
[Conference or Workshop Item] , (2018)

Woopen, T. and Lampe, B. and Böddeker, T. and Eckstein, L. and Kampmann, A. and Alrifaee, B. and Kowalewski, S. and Moormann, D. and Stolte, T. and Jatzkowski, I. and Maurer, M. and Möstl, M. and Ernst, R. and Ackermann, S. and Amersbach, C. and Winner, H. and Püllen, D. and Katzenbeisser, Stefan and Leinen, S. and Becker, M. and Stiller, C. and Furmans, K. and Bengler, Klaus and Diermeyer, F. and Lienkamp, Markus and Keilhoff, D. and Reuss, H.-C. and Buchholz, M. and Dietmayer, K. and Lategahn, H. and Siepenkötter, N. and Elbs, M. and v. Hinüber, E. and Dupuis, M. and Hecker, C. :
UNICARagil - Disruptive Modular Architectures for Agile, Automated Vehicle Concepts.
In: 27th Aachen Colloquium Automobile and Engine Technology 2018, 2018, Aachen.
[Conference or Workshop Item] , (2018)

Matyunin, Nikolay and Szefer, Jakub and Katzenbeisser, Stefan :
Zero-permission acoustic cross-device tracking.
[Online-Edition: https://doi.org/10.1109/HST.2018.8383887]
In: 2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018.
[Conference or Workshop Item] , (2018)

Anagnostopoulos, Nikolaos Athanasios and Gabmeyer, Sebastian and Arul, Tolga and Katzenbeisser, Stefan :
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...]
In: 27th Crypto-Day, 7 - 8 December 2017, Frankfurt (Oder), Germany. Angewandte Kryptographie of Gesellschaft für Informatik e.V
[Conference or Workshop Item] , (2017)

Sarangdhar, Ravi and Fan, Yufan and Anagnostopoulos, Nikolaos Athanasios and Gayer, Udo and Flederer, Frank and Mikschl, Tobias and Arul, Tolga and John, Philipp R. and Hierholz, Kirsten and Montenegro, Sergio and Katzenbeisser, Stefan :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
[Online-Edition: https://fg-krypto.gi.de/fileadmin/fg-krypto/LN_CryptoDay27_I...]
In: 27th Crypto-Day, 7 - 8 December 2017, Frankfurt (Oder), Germany. Angewandte Kryptographie of Gesellschaft für Informatik e.V
[Conference or Workshop Item] , (2017)

Kohnhäuser, Florian and Stute, Milan and Baumgärtner, Lars and Almon, Lars and Katzenbeisser, Stefan and Hollick, Matthias and Freisleben, Bernd :
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
IEEE Conference on Local Computer Networks (LCN) IEEE
[Conference or Workshop Item] , (2017)

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Conference or Workshop Item] , (2017)

Karvelas, Nikolaos and Senftleben, Marius and Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Conference or Workshop Item] , (2017)

Büscher, Niklas and Katzenbeisser, Stefan:
Compilation for Secure Multi-party Computation.
[Online-Edition: https://www.springer.com/de/book/9783319675213]
Springer Briefs in Computer Science ISBN 978-3-319-67521-3
[Book] , (2017)

Anagnostopoulos, Nikolaos Athanasios and Schaller, André and Fan, Yufan and Xiong, Wenjie and Tehranipoor, Fatemeh and Arul, Tolga and Gabmeyer, Sebastian and Szefer, Jakub and Chandy, John A. and Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Conference or Workshop Item] , (2017)

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan :
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM
[Conference or Workshop Item] , (2017)

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan :
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies De Gruyter
[Conference or Workshop Item] , (2017)

Boukoros, Spyros and Karvelas, Nikolaos and Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Conference or Workshop Item] , (2017)

Schaller, André and Xiong, Wenjie and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Gabmeyer, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub :
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Institute of Electrical and Electronics Engineers (IEEE)
[Conference or Workshop Item] , (2017)

Kohnhäuser, Florian and Büscher, Niklas and Gabmeyer, Sebastian and Katzenbeisser, Stefan :
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
[Article] , (2017)

Schulz, Steffen and Schaller, André and Kohnhäuser, Florian and Katzenbeisser, Stefan :
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS (10493). Springer
[Conference or Workshop Item] , (2017)

Schlehuber, Christian and Heinrich, Markus and Vateva-Gurova, Tsvetoslava and Katzenbeisser, Stefan and Suri, Neeraj :
Challenges and Approaches in Securing Safety-Relevant Railway Signalling.
[Online-Edition: http://dx.doi.org/10.1109/eurospw.2017.63]
In: Security and Privacy Workshops (EuroS&PW), 2017 IEEE European Symposium on.
[Conference or Workshop Item] , (2017)

Schaller, André and Stanko, Taras and Skoric, Boris and Katzenbeisser, Stefan :
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security
[Article] , (2017)

Boukoros, Spyros and Katzenbeisser, Stefan :
Measuring privacy in high dimensional microdata collections.
[Online-Edition: http://doi.acm.org/10.1145/3098954.3098977]
In: Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017.
[Conference or Workshop Item] , (2017)

Büscher, Niklas and Franz, Martin and Holzer, Andreas and Veith, Helmut and Katzenbeisser, Stefan :
On compiling Boolean circuits optimized for secure multi-party computation.
[Online-Edition: https://doi.org/10.1007/s10703-017-0300-0]
In: Formal Methods in System Design, 51 (2) pp. 308-331.
[Article] , (2017)

Schlehuber, Christian and Heinrich, Markus and Vateva-Gurova, Tsvetoslava and Katzenbeisser, Stefan and Suri, Neeraj :
A Security Architecture for Railway Signalling.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-66266-4_21]
In: International Conference on Computer Safety, Reliability, and Security.
[Conference or Workshop Item] , (2017)

Buescher, Niklas and Kretzmer, David and Jindal, Arnav and Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Conference or Workshop Item] , (2016)

Baumann, Peter and Katzenbeisser, Stefan and Stopczynski, Martin and Tews, Erik :
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ACM
[Conference or Workshop Item] , (2016)

Buescher, Niklas and Holzer, Andreas and Weber, Alina and Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Conference or Workshop Item] , (2016)

Kohnhäuser, Florian and Katzenbeisser, Stefan :
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Conference or Workshop Item] , (2016)

Anagnostopoulos, Nikolaos Athanasios and Katzenbeisser, Stefan and Rosenstihl, Markus and Schaller, André and Gabmeyer, Sebastian and Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report] , (2016)

Schaller, André and Xiong, Wenjie and Gabmeyer, Sebastian and Anagnostopoulos, Nikolaos Athanasios and Saleem, Umair and Katzenbeisser, Stefan and Szefer, Jakub
Gierlichs, Benedikt and Poschmann, Axel (eds.) :

Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS) , 9813 . Springer
[Conference or Workshop Item] , (2016)

Senftleben, Marius and Barroso, Ana and Bucicoiu, Mihai and Hollick, Matthias and Katzenbeisser, Stefan and Tews, Erik :
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, 11 (7) 1578 - 1591.
[Article] , (2016)

Buchmann, Johannes and Büscher, Niklas and Katzenbeisser, Stefan and Krämer, Juliane and Micciancio, Daniele and Siim, Sander and van Vredendaal, Christine and Walter, Michael and Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Conference or Workshop Item] , (2016)

Matyunin, Nikolay and Szefer, Jakub and Biedermann, Sebastian and Katzenbeisser, Stefan :
Covert channels using mobile device's magnetic field sensors.
[Online-Edition: https://doi.org/10.1109/ASPDAC.2016.7428065]
In: 21st Asia and South Pacific Design Automation Conference, ASP-DAC 2016, Macao, Macao, January 25-28, 2016.
[Conference or Workshop Item] , (2016)

Schaller, André and Skoric, Boris and Katzenbeisser, Stefan :
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: TrustED
[Conference or Workshop Item] , (2015)

Buescher, Niklas and Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Conference or Workshop Item] , (2015)

Kohnhäuser, Florian and Schaller, André and Katzenbeisser, Stefan :
PUF-based Software Protection for Low-end Embedded Devices.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015) Springer
[Conference or Workshop Item] , (2015)

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Article] , (2015)

Biedermann, Sebastian and Katzenbeisser, Stefan and Szefer, Jakub :
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14 . ACM
[Conference or Workshop Item] , (2014)

Araujo, Frederico and Hamlen, Kevin and Biedermann, Sebastian and Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Conference or Workshop Item] , (2014)

Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Conference or Workshop Item] , (2014)

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Merzdovnik, Georg and Kieseberg, Peter and Weippl, Edgar :
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: ARES '14 . IEEE Computer Society
[Conference or Workshop Item] , (2014)

Halvani, Oren and Steinebach, Martin and Neitzel, Svenja
Katzenbeisser, Stefan and Lotz, Volkmar and Weippl, Edgar (eds.) :

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich. Lecture Notes in Informatics (228). Wien, Österreich , pp. 229-241. ISBN 978-3-88579-622-0
[Book Section] , (2014)

Senftleben, Marius and Bucicoiu, Mihai and Tews, Erik and Armknecht, Frederik and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Conference or Workshop Item] , (2014)

Franz, Martin and Holzer, Andreas and Katzenbeisser, Stefan and Schallhart, Christian and Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[Conference or Workshop Item] , (2014)

Schrittwieser, Sebastian and Katzenbeisser, Stefan and Kieseberg, Peter and Huber, Markus and Leithner, Manuel and Mulazzani, Martin and Weippl, Edgar :
Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security
[Conference or Workshop Item] , (2014)

Biedermann, Sebastian and Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[Conference or Workshop Item] , (2014)

Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[Conference or Workshop Item] , (2014)

Schaller, André and Arul, Tolga and van der Leest, Vincent and Katzenbeisser, Stefan :
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
International Conference on Trust & Trustworthy Computing ( TRUST)
[Conference or Workshop Item] , (2014)

Biedermann, Sebastian and Karvelas, Nikolaos and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 pp. 114-125.
[Article] , (2014)

Volkamer, Melanie and Renaud, Karen
Fischlin, Marc and Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Book Section] , (2013)

Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Article] , (2013)

Vielhauer, Claus and Dittmann, Jana and Katzenbeisser, Stefan :
Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain.
In: P. Campisi (ed.), Security and Privacy in Biometrics pp. 25-43.
[Article] , (2013)

Cuong, N. and Katzenbeisser, Stefan :
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machines.
In: Lecture Notes in Computer Science, Springer, 8099 pp. 113-122.
[Article] , (2013)

Kalabis, Lukas and Waidner, Michael
Anzinger, Heribert and Hamacher, Kay and Katzenbeisser, Stefan (eds.) :

Federated Identity Management.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-34741-2]
In: Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe. Springer, Berlin , pp. 189-218. ISBN 978-3-642-34741-2
[Book Section] , (2013)

Biedermann, Sebastian and Zittel, Martin and Katzenbeisser, Stefan :
Improving security of virtual machines during live migrations.
In: IEEE Press pp. 352-357.
[Article] , (2013)

Oetting, Andreas and Katzenbeisser, Stefan and Hähnle, Reiner and Hofmann, Klaus and Klingauf, Uwe and Mezini, Mira and Schön, Sebastian and Schütz, Ingo :
Langlebige sicherheitskritische Infrastrukturen.
In: Proceedings 13th International SIGNAL+DRAHT Congress, Fulda
[Conference or Workshop Item] , (2013)

Fischlin, Marc and Katzenbeisser, Stefan:
Number Theory and Cryptography.
Springer
[Book] , (2013)

Biedermann, Sebastian and Katzenbeisser, Stefan :
POSTER: Event-based Isolation of Critical Data in the Cloud.
In:
[Article] , (2013)

Katzenbeisser, Stefan and Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit pp. 881-885.
[Article] , (2012)

Peter, Andreas and Hartmann, T. and Müller, S. and Katzenbeisser, Stefan :
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012) IEEE
[Conference or Workshop Item] , (2012)

Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[Conference or Workshop Item] , (2012)

Katzenbeisser, Stefan and Kocabaş, Ünal and Rožic, Vladimir and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Conference or Workshop Item] , (2012)

Alsouri, Sami and Sinschek, Jan and Sewe, Andreas and Bodden, Eric and Mezini, Mira and Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[Conference or Workshop Item] , (2012)

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Conference or Workshop Item] , (2012)

Katzenbeisser, Stefan and Weippl, Edgar and Camp, Jean and Volkamer, Melanie and Reiter, Mike and Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Book] , (2012)

Van Herrewege, Anthony and Katzenbeisser, Stefan and Maes, Roel and Peeters, Roel and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid and Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Conference or Workshop Item] , (2012)

Peter, Andreas and Kronberg, M. and Trei, W. and Katzenbeisser, Stefan :
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
International Conference on Information Security (ISC 2012) Springer
[Conference or Workshop Item] , (2012)

Cuong, N. and Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[Conference or Workshop Item] , (2012)

Schrittwieser, Sebastian and Katzenbeisser, Stefan :
Code Obfuscation against Static and Dynamic Reverse Engineering.
International Conference on Information Hiding (IH 2011) Springer
[Conference or Workshop Item] , (2011)

Biedermann, Sebastian and Katzenbeisser, Stefan :
Detecting Computer Worms in the Cloud.
Open Problems in Network Security (iNetSec 2011) Springer
[Conference or Workshop Item] , (2011)

Müller, S. and Katzenbeisser, Stefan :
Hiding the Policy in Cryptographic Access Control.
International Workshop on Security and Trust Management (STM 2011) Springer
[Conference or Workshop Item] , (2011)

Franz, M. and Carbunar, B. and Sion, R. and Katzenbeisser, Stefan and Sotakova, M. and Williams, P. and Peter, Andreas :
Oblivious Outsourced Storage with Delegation.
Financial Cryptography and Data Security (FC 2011) Springer
[Conference or Workshop Item] , (2011)

Cuong, N. and Katzenbeisser, Stefan :
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
International Workshop on Digital Forensics and Watermarking (IWDW 2011) Springer
[Conference or Workshop Item] , (2011)

Brzuska, Christina and Fischlin, Marc and Schröder, Heike and Katzenbeisser, Stefan :
Physically Uncloneable Functions in the Universal Composition Framework.
Advances in Cryptography (CRYPTO 2011) Springer
[Conference or Workshop Item] , (2011)

Franz, M. and Katzenbeisser, Stefan :
Processing Encrypted Floating Point Signals.
Workshop on Multimedia and Security (MMSEC'11) ACM Press
[Conference or Workshop Item] , (2011)

Hamacher, Kay and Katzenbeisser, Stefan :
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011). ACM Press , pp. 115-124.
[Book Section] , (2011)

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Schröder, Heike and Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Conference or Workshop Item] , (2011)

Katzenbeisser, Stefan and Kocabaş, Ünal and van der Leest, Vincent and Sadeghi, Ahmad-Reza and Schrijen, Geert-Jan and Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Article] , (2011)

Cuong, N. and Katzenbeisser, Stefan :
Security of Copy-Move Forgery Detection Techniques.
International Conference on Acoustics, Speech and Signal Processing (ICASSP'11) IEEE Press
[Conference or Workshop Item] , (2011)

Hülsing, Andreas and Buchmann, J. and Weber, Stefan G. and Petzoldt, Albrecht and Thomae, Enrico and Krämer, Juliane and Cayrel, Pierre-Louis and Barreto, Paulo and Heuser, Annelie:
Tagungsband des 13. Kryptotags. Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V.".
[Online-Edition: urn:nbn:de:tuda-tuprints-23711]
Security Engineering Group (TU Darmstadt), Darmstadt
[Book] , (2010)

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike :
Secure Computations on Real-Valued Signals.
IEEE Workshop on Information Forensics and Security (WIFS'10) IEEE Press
[Conference or Workshop Item] , (2010)

Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus
TU Darmstadt, Otto-von-Guericke-Universität Darmstadt, Fachhochschule Brandenburg (eds.) :

Pattern Recognition for IT Security, Book of Abstracts.
[Online-Edition: urn:nbn:de:tuda-tuprints-22734]
TU Darmstadt, Otto-von-Guericke-Universität Darmstadt, Fachhochschule Brandenburg (s.) -
[Other] , (2010)

Katzenbeisser, Stefan and Liu, Huajian and Steinebach, Martin
Li, Chang-Tsun (ed.) :

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: UNSPECIFIED Handbook of Research. Idea Group Reference , pp. 155-175. ISBN 1605668362
[Book Section] , (2010)

Steinebach, Martin and Zmudzinski, Sascha and Butt, Moazzam
Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus (eds.) :

Robust hash controlled watermark embedding.
In: TUD Tuprints (2273).
[Conference or Workshop Item] , (2010)

Alsouri, Sami and Dagdelen, Özgür and Katzenbeisser, Stefan
Acquisti, A. and Sadeghi, Ahmad-Reza (eds.) :

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: TRUST 2010
[Conference or Workshop Item] , (2010)

Armknecht, Frederik and Ghosal, Dipak and Katzenbeisser, Stefan and Liu, Yali and Sadeghi, Ahmad-Reza and Schulz, Steffen :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Conference or Workshop Item] , (2010)

Busch, Heike and Sotakova, M. and Katzenbeisser, Stefan and Sion, R. :
The PUF Promise.
3rd International Conference on Trust and Trustworthy Computing (TRUST 2010) Springer
[Conference or Workshop Item] , (2010)

Brzuska, Christina and Busch, Heike and Dagdelen, Özgür and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and Schröder, Dominique :
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Conference or Workshop Item] , (2010)

Rührmair, Ulrich and Katzenbeisser, Stefan and Steinebach, Martin and Zmudzinski, Sascha :
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
In: LNCS, Security and Cryptology (6109). Springer
[Conference or Workshop Item] , (2010)

Müller, Sascha and Katzenbeisser, Stefan :
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Press
[Book Section] , (2010)

Steinebach, Martin and Zmudzinski, Sascha and Katzenbeisser, Stefan and Rührmair, Ulrich :
Audio watermarking forensics: detecting malicious re-embedding.
Proceeding of IS&T SPIE Electronic Imaging 2010 Conference - Media Forensics and Security XII, San Jose, CA, USA
[Conference or Workshop Item] , (2010)

Steinebach, Martin and Liu, Huajian and Katzenbeisser, Stefan :
Cell phone camera ballistics: attacks and countermeasures.
Proceeding of IS&T SPIE Electronic Imaging 2010 Conference, San Jose, CA, USA - Multimedia on Mobile Devices 2010
[Conference or Workshop Item] , (2010)

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike :
Secure Computation on Non-Integer Values.
2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010) IEEE Press
[Conference or Workshop Item] , (2010)

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike :
Towards Secure Bioinformatics Services.
Financial Cryptography and Data Security (FC2011)
[Conference or Workshop Item] , (2010)

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
ESORICS
[Conference or Workshop Item] , (2009)

Busch, Heike and Katzenbeisser, Stefan and Baecher, Paul :
PUF-Based Authentication Protocols, Revisited.
International Workshop on Information Security Applications (WISA'09)
[Conference or Workshop Item] , (2009)

Skoric, B. and Katzenbeisser, Stefan and Celik, M. and Schaathun, H. :
Tardos Fingerprinting Codes in the Combined Digit Model (Extended Abstract).
First IEEE Workshop on Information Forensics and Security (WIFS'09) IEEE Press
[Conference or Workshop Item] , (2009)

Liu, Yali and Ghosal, Dipak and Armknecht, Frederik and Sadeghi, Ahmad-Reza and Schulz, Steffen and Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[Conference or Workshop Item] , (2009)

Katzenbeisser, Stefan and Kursawe, Klaus and Stumpf, Frederic :
Revocation of TPM Keys.
Second International Conference on Trusted Computing (TRUST 2009)
[Conference or Workshop Item] , (2009)

Erkin, Zekeriya and Franz, Martin and Guajardo, Jorge and Katzenbeisser, Stefan and Lagendijk, Inald and Toft, Tomas :
Privacy-Preserving Face Recognition.
Privacy Enhancing Technologies Symposium (PETS 2009)
[Conference or Workshop Item] , (2009)

Stumpf, Frederic and Fuchs, Andreas and Katzenbeisser, Stefan and Eckert, Claudia :
Improving the Scalability of Platform Attestation.
Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08) ACM Press
[Conference or Workshop Item] , (2008)

Fischer, Lars and Katzenbeisser, Stefan and Eckert, Claudia :
Measuring Unlinkability Revisited.
In: ACM Workshop on Privacy in the Electronic Society (WPES 2008) ACM
[Conference or Workshop Item] , (2008)

Celik, Mehmet and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza and Skoric, Boris :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007). In: LNCS , 4567 . Springer Verlag
[Conference or Workshop Item] , (2007)

Sadeghi, Ahmad-Reza and Katzenbeisser, Stefan and Skoric, Boris and Celik, Mehmet :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: LNCS , 4567 . Springer Verlag
[Conference or Workshop Item] , (2007)

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Conference or Workshop Item] , (2006)

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Bas, Patrick and Barni, Mauro and Rosa, Alessia De
Katzenbeisser, Stefan (ed.) :

First Summary Report on Asymmetric Watermarking.
ECRYPT, Network of Excellence in Cryptology
[Conference or Workshop Item] , (2005)

Adelsbach, Andre and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Article] , (2003)

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Katzenbeisser, Stefan :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Article] , (2003)

Sadeghi, Ahmad-Reza and Adelsbach, Andre and Katzenbeisser, Stefan :
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference , 1
[Conference or Workshop Item] , (2002)

This list was generated on Sat Apr 20 00:12:31 2019 CEST.