TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 94.

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos A. ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan :
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being.
27th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Stute, Milan ; Baumgärtner, Lars ; Almon, Lars ; Katzenbeisser, Stefan ; Hollick, Matthias ; Freisleben, Bernd :
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios.
IEEE Conference on Local Computer Networks (LCN) IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Using Oblivious RAM in Genomic Studies.
DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan :
Microblogging in a Privacy-Preserving way.
ARES 2017 - 12th International Conference on Availability, Reliability and Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Anagnostopoulos, Nikolaos A. ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan :
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
SCAPI: a scalable attestation protocol to detect software and physical attacks.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan :
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
Proceedings on Privacy Enhancing Technologies De Gruyter
[Konferenz- oder Workshop-Beitrag], (2017)

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan :
A lightweight protocol for privacy preserving division.
IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference IEEE
[Konferenz- oder Workshop-Beitrag], (2017)

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Institute of Electrical and Electronics Engineers (IEEE)
[Konferenz- oder Workshop-Beitrag], (2017)

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan :
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv
[Artikel], (2017)

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS (10493). Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Schaller, André ; Stanko, Taras ; Skoric, Boris ; Katzenbeisser, Stefan :
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security
[Artikel], (2017)

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan :
Scalable Secure Computation from ANSI-C.
WIFS - IEEE International Workshop on Information Forensics and Security IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Baumann, Peter ; Katzenbeisser, Stefan ; Stopczynski, Martin ; Tews, Erik :
Disguised Chromium Browser: Robust browser, Flash and Canvas Fingerprinting Protection.
WPES '16 Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan :
Compiling Low Depth Circuits for Practical Secure Computation.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Kohnhäuser, Florian ; Katzenbeisser, Stefan :
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
21st European Symposium on Research in Computer Security (ESORICS 2016) Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Anagnostopoulos, Nikolaos A. ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga :
Low-temperature data remanence attacks against intrinsic SRAM PUFs.

[Report], (2016)

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos A. ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (eds.) :

Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS) , 9813 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Senftleben, Marius ; Barroso, Ana ; Bucicoiu, Mihai ; Hollick, Matthias ; Katzenbeisser, Stefan ; Tews, Erik :
On the Privacy and Performance of Mobile Anonymous Microblogging.
In: IEEE Transactions on Information Forensics and Security, 11 (7) 1578 - 1591.
[Artikel], (2016)

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; van Vredendaal, Christine ; Walter, Michael ; Göpfert, Florian :
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography ACM
[Konferenz- oder Workshop-Beitrag], (2016)

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan :
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: TrustED
[Konferenz- oder Workshop-Beitrag], (2015)

Buescher, Niklas ; Katzenbeisser, Stefan :
Faster Secure Computation through Automatic Parallelization.
24th USENIX Security Symposium (USENIX Security'15) USENIX Association
[Konferenz- oder Workshop-Beitrag], (2015)

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan :
PUF-based Software Protection for Low-end Embedded Devices.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015 pp. 5-13.
[Artikel], (2015)

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub :
Hot-Hardening: Getting More Out of Your Security Settings.
In: ACSAC '14 . ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan :
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay :
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM .
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Merzdovnik, Georg ; Kieseberg, Peter ; Weippl, Edgar :
AES-SEC: Improving software obfuscation through hardware-assistance (short paper).
In: ARES '14 . IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2014)

Halvani, Oren ; Steinebach, Martin ; Neitzel, Svenja
Katzenbeisser, Stefan ; Lotz, Volkmar ; Weippl, Edgar (eds.) :

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
In: LNI (228).
[Konferenz- oder Workshop-Beitrag], (2014)

Senftleben, Marius ; Bucicoiu, Mihai ; Tews, Erik ; Armknecht, Frederik ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
MoP-2-MoP - Mobile private microblogging.
Financial Cryptography and Data Security (FC'14) Springer
[Konferenz- oder Workshop-Beitrag], (2014)

Franz, Martin ; Holzer, Andreas ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut :
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations.
Compiler Construction (CC)2014, Lecture Notes in Computer Science
[Konferenz- oder Workshop-Beitrag], (2014)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan ; Kieseberg, Peter ; Huber, Markus ; Leithner, Manuel ; Mulazzani, Martin ; Weippl, Edgar :
Covert Computation - Hiding code in code through compile-time obfuscation.
Computers & Security
[Konferenz- oder Workshop-Beitrag], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan :
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptology ePrint Archive 2014
[Konferenz- oder Workshop-Beitrag], (2014)

Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas :
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science , 8383 .
[Konferenz- oder Workshop-Beitrag], (2014)

Schaller, André ; Arul, Tolga ; van der Leest, Vincent ; Katzenbeisser, Stefan :
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
International Conference on Trust & Trustworthy Computing ( TRUST)
[Konferenz- oder Workshop-Beitrag], (2014)

Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas :
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327 pp. 114-125.
[Artikel], (2014)

Volkamer, Melanie ; Renaud, Karen
Fischlin, Marc ; Katzenbeisser, Stefan (eds.) :

Mental Models – General Introduction and Review of Their Application to Human-Centred Security.
In: Number Theory and Cryptography. Lecture Notes in Computer Science, 8260. Springer Berlin Heidelberg Berlin-Heidelberg , pp. 255-280. ISBN 978-3-642-42000-9
[Buchkapitel], (2013)

Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan :
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: >IACR Cryptology ePrint Archive, Report 2013/013
[Artikel], (2013)

Vielhauer, Claus ; Dittmann, Jana ; Katzenbeisser, Stefan :
Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain.
In: P. Campisi (ed.), Security and Privacy in Biometrics pp. 25-43.
[Artikel], (2013)

Cuong, N. ; Katzenbeisser, Stefan :
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machines.
In: Lecture Notes in Computer Science, Springer, 8099 pp. 113-122.
[Artikel], (2013)

Biedermann, Sebastian ; Zittel, Martin ; Katzenbeisser, Stefan :
Improving security of virtual machines during live migrations.
In: IEEE Press pp. 352-357.
[Artikel], (2013)

Oetting, Andreas ; Katzenbeisser, Stefan ; Hähnle, Reiner ; Hofmann, Klaus ; Klingauf, Uwe ; Mezini, Mira ; Schön, Sebastian ; Schütz, Ingo :
Langlebige sicherheitskritische Infrastrukturen.
In: Proceedings 13th International SIGNAL+DRAHT Congress, Fulda
[Konferenz- oder Workshop-Beitrag], (2013)

Fischlin, Marc ; Katzenbeisser, Stefan:
Number Theory and Cryptography.
Springer
[Buch], (2013)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
POSTER: Event-based Isolation of Critical Data in the Cloud.
In:
[Artikel], (2013)

Kalabis, Lukas ; Waidner, Michael
Anzinger, Heribert ; Hamacher, Kay ; Katzenbeisser, Stefan (eds.) :

Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe.
In: Keine Angabe Springer , pp. 189-218. ISBN 978-3642347405
[Buchkapitel], (2013)

Katzenbeisser, Stefan ; Schaller, André :
Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen.
In: Datenschutz und Datensicherheit pp. 881-885.
[Artikel], (2012)

Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan :
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012) IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Holzer, Andreas ; Franz, Martin ; Katzenbeisser, Stefan ; Veith, Helmut :
Secure Two-Party Computations in ANSI C.
Conference on Computer and Communications Security (CCS 2012) ACM Press
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; Rožic, Vladimir ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
In: Lecture Notes in Computer Science (LNCS) , 7428 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan :
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-33383-5_11]
In: 15th International Conference on Information Security, 19-21 Sep 2012, Passau, Germany. In: Lecture Notes in Computer Science (ISSN 0302-9743) , 7483 .
[Konferenz- oder Workshop-Beitrag], (2012)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Katzenbeisser, Stefan ; Weippl, Edgar ; Camp, Jean ; Volkamer, Melanie ; Reiter, Mike ; Zhang, Xinwen:
Trust and Trustworthy Computing.
Springer Wien ISBN 978-3-642-30921-2
[Buch], (2012)

Van Herrewege, Anthony ; Katzenbeisser, Stefan ; Maes, Roel ; Peeters, Roel ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid ; Wachsmann, Christian :
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs.
In: Lecture Notes in Computer Science (LNCS) , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan :
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
International Conference on Information Security (ISC 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Cuong, N. ; Katzenbeisser, Stefan :
Robust Resampling Detection in Digital Images.
Conference on Communications and Multimedia Security (CMS 2012) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Schrittwieser, Sebastian ; Katzenbeisser, Stefan :
Code Obfuscation against Static and Dynamic Reverse Engineering.
International Conference on Information Hiding (IH 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Biedermann, Sebastian ; Katzenbeisser, Stefan :
Detecting Computer Worms in the Cloud.
Open Problems in Network Security (iNetSec 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Müller, S. ; Katzenbeisser, Stefan :
Hiding the Policy in Cryptographic Access Control.
International Workshop on Security and Trust Management (STM 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas :
Oblivious Outsourced Storage with Delegation.
Financial Cryptography and Data Security (FC 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images.
International Workshop on Digital Forensics and Watermarking (IWDW 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Brzuska, Christina ; Fischlin, Marc ; Schröder, Heike ; Katzenbeisser, Stefan :
Physically Uncloneable Functions in the Universal Composition Framework.
Advances in Cryptography (CRYPTO 2011) Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Franz, M. ; Katzenbeisser, Stefan :
Processing Encrypted Floating Point Signals.
Workshop on Multimedia and Security (MMSEC'11) ACM Press
[Konferenz- oder Workshop-Beitrag], (2011)

Hamacher, Kay ; Katzenbeisser, Stefan :
Public Security: Simulations Need to Replace Conventional Wisdom.
In: New Security Paradigms Workshop (NSPW 2011). ACM Press , pp. 115-124.
[Buchkapitel], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Schröder, Heike ; Wachsmann, Christian :
Recyclable PUFs: Logically Reconfigurable PUFs.
In: Lecture Notes in Computer Science (LNCS) , 6917 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Katzenbeisser, Stefan ; Kocabaş, Ünal ; van der Leest, Vincent ; Sadeghi, Ahmad-Reza ; Schrijen, Geert-Jan ; Wachsmann, Christian :
Recyclable PUFs: logically reconfigurable PUFs.
In: Journal of Cryptographic Engineering, 1 (3) pp. 177-186.
[Artikel], (2011)

Cuong, N. ; Katzenbeisser, Stefan :
Security of Copy-Move Forgery Detection Techniques.
International Conference on Acoustics, Speech and Signal Processing (ICASSP'11) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2011)

Hülsing, Andreas ; Buchmann, J. ; Weber, Stefan G. ; Petzoldt, Albrecht ; Thomae, Enrico ; Krämer, Juliane ; Cayrel, Pierre-Louis ; Barreto, Paulo ; Heuser, Annelie:
Tagungsband des 13. Kryptotags. Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V.".
[Online-Edition: urn:nbn:de:tuda-tuprints-23711]
Security Engineering Group (TU Darmstadt), Darmstadt
[Buch], (2010)

Deiseroth, B. ; Franz, M. ; Hamacher, K. ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Secure Computations on Real-Valued Signals.
IEEE Workshop on Information Forensics and Security (WIFS'10) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2010)

Katzenbeisser, Stefan ; Dittmann, Jana ; Vielhauer, Claus
TU Darmstadt, Otto-von-Guericke-Universität Darmstadt, Fachhochschule Brandenburg (eds.) :

Pattern Recognition for IT Security, Book of Abstracts.
[Online-Edition: urn:nbn:de:tuda-tuprints-22734]
TU Darmstadt, Otto-von-Guericke-Universität Darmstadt, Fachhochschule Brandenburg (s.) -
[Anderes], (2010)

Katzenbeisser, Stefan ; Liu, Huajian ; Steinebach, Martin
Li, Chang-Tsun (ed.) :

Computational Forensics, Digital Crime, and Investigation: Methods and Solutions.
In: Keine Angabe Handbook of Research. Idea Group Reference , pp. 155-175. ISBN 1605668362
[Buchkapitel], (2010)

Steinebach, Martin ; Zmudzinski, Sascha ; Butt, Moazzam
Katzenbeisser, Stefan ; Dittmann, Jana ; Vielhauer, Claus (eds.) :

Robust hash controlled watermark embedding.
In: TUD Tuprints (2273).
[Konferenz- oder Workshop-Beitrag], (2010)

Alsouri, Sami ; Dagdelen, Özgür ; Katzenbeisser, Stefan
Acquisti, A. ; Sadeghi, Ahmad-Reza (eds.) :

Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation.
In: TRUST 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Information Hiding Conference (IH) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Busch, Heike ; Sotakova, M. ; Katzenbeisser, Stefan ; Sion, R. :
The PUF Promise.
3rd International Conference on Trust and Trustworthy Computing (TRUST 2010) Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique :
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science , 6055 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Rührmair, Ulrich ; Katzenbeisser, Stefan ; Steinebach, Martin ; Zmudzinski, Sascha :
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
In: LNCS, Security and Cryptology (6109). Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Müller, Sascha ; Katzenbeisser, Stefan :
A New DRM Architecture with Strong Enforcement.
In: Fifth International Conference on Availability, Reliability and Security (ARES 2010). IEEE Press
[Buchkapitel], (2010)

Steinebach, Martin ; Zmudzinski, Sascha ; Katzenbeisser, Stefan ; Rührmair, Ulrich :
Audio watermarking forensics: detecting malicious re-embedding.
Proceeding of IS&T SPIE Electronic Imaging 2010 Conference - Media Forensics and Security XII, San Jose, CA, USA
[Konferenz- oder Workshop-Beitrag], (2010)

Steinebach, Martin ; Liu, Huajian ; Katzenbeisser, Stefan :
Cell phone camera ballistics: attacks and countermeasures.
Proceeding of IS&T SPIE Electronic Imaging 2010 Conference, San Jose, CA, USA - Multimedia on Mobile Devices 2010
[Konferenz- oder Workshop-Beitrag], (2010)

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Secure Computation on Non-Integer Values.
2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2010)

Deiseroth, B. ; Franz, M. ; Hamacher, K. ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike :
Towards Secure Bioinformatics Services.
Financial Cryptography and Data Security (FC2011)
[Konferenz- oder Workshop-Beitrag], (2010)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
ESORICS
[Konferenz- oder Workshop-Beitrag], (2009)

Busch, Heike ; Katzenbeisser, Stefan ; Baecher, Paul :
PUF-Based Authentication Protocols, Revisited.
International Workshop on Information Security Applications (WISA'09)
[Konferenz- oder Workshop-Beitrag], (2009)

Skoric, B. ; Katzenbeisser, Stefan ; Celik, M. ; Schaathun, H. :
Tardos Fingerprinting Codes in the Combined Digit Model (Extended Abstract).
First IEEE Workshop on Information Forensics and Security (WIFS'09) IEEE Press
[Konferenz- oder Workshop-Beitrag], (2009)

Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan :
Hide and Seek in Time - Robust Covert Timing Channels.
In: LNCS (5789). Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Katzenbeisser, Stefan ; Kursawe, Klaus ; Stumpf, Frederic :
Revocation of TPM Keys.
Second International Conference on Trusted Computing (TRUST 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Erkin, Zekeriya ; Franz, Martin ; Guajardo, Jorge ; Katzenbeisser, Stefan ; Lagendijk, Inald ; Toft, Tomas :
Privacy-Preserving Face Recognition.
Privacy Enhancing Technologies Symposium (PETS 2009)
[Konferenz- oder Workshop-Beitrag], (2009)

Stumpf, Frederic ; Fuchs, Andreas ; Katzenbeisser, Stefan ; Eckert, Claudia :
Improving the Scalability of Platform Attestation.
Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC'08) ACM Press
[Konferenz- oder Workshop-Beitrag], (2008)

Fischer, Lars ; Katzenbeisser, Stefan ; Eckert, Claudia :
Measuring Unlinkability Revisited.
In: ACM Workshop on Privacy in the Electronic Society (WPES 2008) ACM
[Konferenz- oder Workshop-Beitrag], (2008)

Celik, Mehmet ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza ; Skoric, Boris :
Combining Tardos Fingerprinting Codes and Fingercasting.
In: 9th International Workshop on Information Hiding (IH 2007). In: LNCS , 4567 . Springer Verlag
[Konferenz- oder Workshop-Beitrag], (2007)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
A Computational Model for Watermark Robustness.
In: Information Hiding Workshop.
[Konferenz- oder Workshop-Beitrag], (2006)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Bas, Patrick ; Barni, Mauro ; Rosa, Alessia De
Katzenbeisser, Stefan (ed.) :

First Summary Report on Asymmetric Watermarking.
ECRYPT, Network of Excellence in Cryptology
[Konferenz- oder Workshop-Beitrag], (2005)

Adelsbach, Andre ; Katzenbeisser, Stefan ; Sadeghi, Ahmad-Reza :
Watermark Detection with Zero-Knowledge Disclosure.
In: ACM Multimedia Systems Journal, 9 (3) pp. 266-278.
[Artikel], (2003)

Sadeghi, Ahmad-Reza ; Adelsbach, Andre ; Katzenbeisser, Stefan :
Cryptography Meets Watermarking: Detecting Watermarks with Minimal- or Zero-Knowledge Disclosure.
In: XI European Signal Processing Conference , 1
[Konferenz- oder Workshop-Beitrag], (2002)

Diese Liste wurde am Sat Jun 23 02:25:38 2018 CEST generiert.