TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | H | J | K | M | N | P | R | S | T | U | W | Z
Number of items at this level (without sub-levels): 86.

A

Alhassan, Masaud Y. and Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Aragon, Santiago and Tiloca, Marco and Maass, Max and Hollick, Matthias and Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Article]

B

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference or Workshop Item]

Büscher, Niklas and Demmler, Daniel and Karvelas, Nikolaos and Katzenbeisser, Stefan and Krämer, Juliane and Rathee, Deevashwer and Schneider, Thomas and Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference or Workshop Item]

Boemer, Fabian and Cammarota, Rosario and Demmler, Daniel and Schneider, Thomas and Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Bayerl, Sebastian P. and Frassetto, Tommaso and Jauernig, Patrick and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference or Workshop Item]

Brandt, Markus and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference or Workshop Item]

Bock, Estuardo Alpirez and Brzuska, Chris and Fischlin, Marc and Janson, Christian and Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[Ph.D. Thesis]

Brendel, Jacqueline and Fischlin, Marc and Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
pp. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference or Workshop Item]

Boukoros, Spyros and Humbert, Mathias and Katzenbeisser, Stefan and Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference or Workshop Item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Brendel, Jacqueline and Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), pp. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina and Brendel, Jacqueline and Fischlin, Marc and Goncalves, Brian and Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference or Workshop Item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Buescher, Niklas and Weber, Alina and Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference or Workshop Item]

Brendel, Jacqueline and Fischlin, Marc Foley, Simon N. and Gollmann, Dieter and Snekkenes, Einar (eds.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, pp. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book Section]

Büscher, Niklas and Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]

Büscher, Niklas and Boukoros, Spyros and Bauregger, Stefan and Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, pp. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference or Workshop Item]

Boukoros, Spyros and Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
pp. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference or Workshop Item]

Brendel, J. and Demirel, D. (2016):
Efficient proactive secret sharing.
pp. 543-550, 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference or Workshop Item]

C

Cammarota, Rosario and Schunter, Matthias and Rajan, Anand and Boemer, Fabian and Kiss, Ágnes and Treiber, Amos and Weinert, Christian and Schneider, Thomas and Stapf, Emmanuel and Sadeghi, Ahmad-Reza and Demmler, Daniel and Chen, Huili and Hussain, Siam Umar and Riazi, M. Sadegh and Koushanfar, Farinaz and Gupta, Saransh and Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

D

Dalskov, Anders and Keller, Marcel and Orlandi, Claudio and Shrishak, Kris and Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference or Workshop Item]

Daubert, Jörg and Boopalan, Dhanasekar and Mühlhäuser, Max and Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, pp. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference or Workshop Item]

Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]

Daubert, Jörg and Grube, Tim and Fischer, Mathias and Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), pp. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference or Workshop Item]

Daubert, Jörg and Fischer, Mathias and Grube, Tim and Schiffner, Stefan and Kikiras, Panayotis and Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Elsevier Computer Communications (ComCom), 76, pp. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

F

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference or Workshop Item]

Fomichev, Mikhail and Maass, Max and Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), pp. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]

Fischlin, Marc and Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference or Workshop Item]

Fomichev, Mikhail and Maass, Max and Almon, Lars and Molina, Alejandro and Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Article]

Fomichev, Mikhail and Álvarez, Flor and Steinmetzer, Daniel and Gardner-Stephen, Paul and Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), pp. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian and Wiesmaier, Alexander and Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference or Workshop Item]

Funke, Sebastian Daubert, Jörg (ed.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, pp. 1-10,
München, DACH Security 2017, [Conference or Workshop Item]

G

Garcia Cordero, Carlos and Vasilomanolakis, Emmanouil and Wainakh, Aidmar and Mühlhäuser, Max and Nadjm-Tehrani, Simin (2021):
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection.
In: ACM Transactions on Privacy and Security, 24 (2), ACM, ISSN 2471-2566,
DOI: 10.1145/3424155,
[Article]

Grube, Tim and Heinrich, Alexander and Stroscher, Jan-Philipp and Schomberg, Sabrina (2020):
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8), pp. 501-505. Springer Nature, ISSN 1862-2607,
DOI: 10.1007/s11623-020-1314-0,
[Article]

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference or Workshop Item]

Gedeon, Julien and Brandherm, Florian and Egert, Rolf and Grube, Tim and Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
In: IEEE Access, 7, pp. 152847-152878. IEEE, ISSN 2169-3536,
DOI: 10.1109/ACCESS.2019.2948399,
[Article]

Grube, Tim and Daubert, Jörg and Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference or Workshop Item]

Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Grube, Tim and Volk, Florian and Mühlhäuser, Max and Bhairav, Suhas and Sachidananda, Vinay and Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, pp. 24-31,
Athens, Greece, IARIA, [Conference or Workshop Item]

Grube, Tim and Thummerer, Markus and Daubert, Jörg and Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., pp. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), pp. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference or Workshop Item]

Grube, Tim and Hauke, Sascha and Daubert, Jörg and Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference or Workshop Item]

H

Hagen, Christoph and Weinert, Christian and Sendner, Christoph and Dmitrienko, Alexandra and Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference or Workshop Item]

Holz, Marco and Kiss, Ágnes and Rathee, Deevashwer and Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference or Workshop Item]

J

Javadi, Mohammad and Yalame, Mohammad Hossein and Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

K

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference or Workshop Item]

M

Meurisch, Christian and Mühlhäuser, Max (2021):
Data Protection in AI Services: A Survey.
In: ACM Computing Surveys, 54 (2), ACM, ISSN 0360-0300,
DOI: 10.1145/3440754,
[Article]

Maass, Max and Wichmann, Pascal and Pridöhl, Henning and Herrmann, Dominik (2021):
PrivacyScore : Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites. (Postprint)
In: Lecture Notes in Computer Science, 10518, In: Privacy Technologies and Policy, pp. 178-191,
Cham, Springer, 5th Annual Privacy Forum (APF 2017), Wien, 07.-08.06.2017, ISBN 978-3-319-67279-3,
DOI: 10.26083/tuprints-00017854,
[Conference or Workshop Item]

Mantel, Heiko and Scheidel, Lukas and Schneider, Thomas and Weber, Alexandra and Weinert, Christian and Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference or Workshop Item]

Mantz, Dennis and Classen, Jiska and Schulz, Matthias and Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, In: Privacy Technologies and Policy,
Annual Privacy Forum 2019, Rome, Italy, June 7th and 8th, 2019, DOI: 10.1007/978-3-030-21752-5_2,
[Conference or Workshop Item]

Maass, Max and Schwär, Stephan and Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: Annual Privacy Forum (LNCS), In: Proceedings of the Annual Privacy Forum 2019,
Rome, Italy, Rome, [Conference or Workshop Item]

Maass, Max and Walter, Nicolas and Herrmann, Dominik and Hollick, Matthias (2019):
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Wirtschaftsinformatik 2019, Siegen, Germany, 25-27.2.2019, [Conference or Workshop Item]

Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MRMCD 2017,
[Other]

Maass, Max and Laubach, Anne and Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: Proceedings of INFORMATIK 2017,
Leipzig, Deutschland, [Conference or Workshop Item]

Maass, Max and Wichmann, Pascal and Pridöhl, Henning and Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017,
Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Conference or Workshop Item]

Maass, Max and Laubach, Anne and Herrman, Dominik (2017):
PrivacyScore : Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme : Konzept und rechtliche Zulässigkeit. (Publisher's Version)
In: Lecture Notes in Informatics (LNI) - Proceedings, P-275, In: INFORMATIK 2017, pp. 1049-1060,
Bonn, Gesellschaft für Informatik, INFORMATIK 2017 - Jahrestagung der Gesellschaft für Informatik, Chemnitz, Deutschland, 25.-29.09.2017, ISSN 1617-5468, ISBN 978-3-88579-669-5,
DOI: 10.25534/tuprints-00014292,
[Conference or Workshop Item]

Maass, Max (2017):
Web-Privacy : Lustwandeln im Trackergarten. (Publisher's Version)
Darmstadt, MRMCD 2017, Bundesdatenschau, Darmstadt, 01.-03.09.2017, DOI: 10.25534/tuprints-00013367,
[Conference or Workshop Item]

N

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference or Workshop Item]

P

Patra, Arpita and Schneider, Thomas and Suresh, Ajith and Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference or Workshop Item]

R

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference or Workshop Item]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference or Workshop Item]

S

Sridaran, Kris Shrishak (2021):
Practical Secure Computation for Internet Infrastructure. (Publisher's Version)
Darmstadt, Technische Universität,
DOI: 10.26083/tuprints-00018504,
[Ph.D. Thesis]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Conference or Workshop Item]

Shrishak, Kris and Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Conference or Workshop Item]

Schneider, Thomas and Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Article]

Shrishak, Kris and Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Conference or Workshop Item]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor Thesis]

Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität,
[Ph.D. Thesis]

Shrishak, Kris and Shulman, Haya and Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
pp. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference or Workshop Item]

Stute, Milan and Maass, Max and Schons, Tom and Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17,
2. updated version, The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Conference or Workshop Item]

Strohbach, Martin and Daubert, Jörg and Ravkin, Herman and Lischka, Mario Curry, Edward and Wahlster, Wolfgang (eds.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, pp. 119-141, Springer, ISBN 978-3-319-21568-6,
DOI: 10.1007/978-3-319-21569-3,
[Book Section]

T

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Conference or Workshop Item]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference or Workshop Item]

Treiber, Amos and Molina, Alejandro and Weinert, Christian and Schneider, Thomas and Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Conference or Workshop Item]

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

U

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master Thesis]

W

Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Conference or Workshop Item]

Weiler, Michael and Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691,
DOI: 10.1007/s11846-018-0280-5,
[Article]

Z

Zimmermann, Verena and Renaud, Karen (2021):
The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions.
In: ACM Transactions on Computer-Human Interaction, 28 (1), pp. 7:1-7:45. ACM, DOI: 10.1145/3429888,
[Article]

This list was generated on Sun May 16 01:52:02 2021 CEST.