TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | J | K | L | M | N | P | R | S | T | W | Z
Number of items at this level (without sub-levels): 164.

A

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Article, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017)
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3)
doi: 10.1007/s00145-016-9236-6
Article, Bibliographie

Arzt, Steven (2017)
Static Data Flow Analysis for Android Applications.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015)
Towards Secure Integration of Cryptographic Software.
OOPSLA Onward!. Piitsburgh (25.10.2015)
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Hahn, Robert ; Bodden, Eric (2015)
Using Targeted Symbolic Execution for Reducing False-Positives in Dataflow Analysis.
4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. Portland, USA (14.06.2015)
Conference or Workshop Item, Bibliographie

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Conference or Workshop Item, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Conference or Workshop Item, Bibliographie

Ali, Karim ; Rapoport, Marianna ; Lhoták, Ondřej ; Dolby, Julian ; Tip, Frank (2014)
Constructing Call Graphs of Scala Programs.
Proceedings of the 28th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Fritz, Christian ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2014)
Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps.
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. Edinburgh
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Huber, Stephan ; Rasthofer, Siegfried ; Bodden, Eric (2014)
Denial-of-App Attack: Inhibiting the Installation of Android Apps on Stock Phones.
4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Scottsdale
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Bodden, Eric (2014)
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes.
ICSE. Hyderabad
Conference or Workshop Item, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
doi: 10.1145/2508859.2516738
Book Section, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
Instrumenting Android and Java Applications as Easy as abc.
In: Runtime Verification 2013 (RV'13)
Article, Bibliographie

Arzt, Steven ; Bodden, Eric (2013)
Efficiently updating IDE-based data-flow analyses in response to incremental program changes.
Report, Bibliographie

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Conference or Workshop Item, Bibliographie

Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric (2013)
SuSi: A Tool for the Fully Automated Classification and Categorization of Android Sources and Sinks.
Report, Bibliographie

Arzt, Steven ; Falzon, Kevin ; Follner, Andreas ; Rasthofer, Siegfried ; Bodden, Eric ; Stolz, Volker (2013)
How useful are existing monitoring languages for securing Android apps?
6. Arbeitstagung Programmiersprachen (ATPS 2013).
Conference or Workshop Item, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2013)
Averroes: Whole-Program Analysis without the Whole Program.
Proceedings of the 27th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Alsouri, Sami ; Sinschek, Jan ; Sewe, Andreas ; Bodden, Eric ; Mezini, Mira ; Katzenbeisser, Stefan (2012)
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
15th International Conference on Information Security. Passau, Germany (19-21 Sep 2012)
doi: 10.1007/978-3-642-33383-5_11
Conference or Workshop Item, Bibliographie

Ansaloni, Danilo ; Binder, Walter ; Bockisch, Christoph ; Bodden, Eric ; Hatun, Kardelen ; Marek, Lukas ; Qi, Zhengwei ; Sarimbekov, Aibek ; Sewe, Andreas ; Tuma, Petr ; Zheng, Yudi (2012)
Challenges for Refinement and Composition of Instrumentations (Position Paper).
International Conference on Software Composition (SC 2012).
Conference or Workshop Item, Bibliographie

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012)
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12). Kralendijk, Bonaire (02.03.2012-02.03.2012)
doi: 10.1007/978-3-642-32946-3_22
Conference or Workshop Item, Bibliographie

Ali, Karim ; Lhoták, Ondřej (2012)
Application-Only Call Graph Construction.
Proceedings of the 26th European Conference on Object-Oriented Programming.
Conference or Workshop Item, Bibliographie

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15th European Symposium on Research in Computer Security (ESORICS'10). Athens, Greece (20.09.2010 - 22.09.2010)
doi: 10.1007/978-3-642-15497-3_10
Conference or Workshop Item, Bibliographie

Ali, Karim ; Aib, Issam ; Boutaba, Raouf (2009)
P2P-AIS: A P2P Artificial Immune Systems architecture for detecting DDoS flooding attacks.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie

Ali, Karim ; Boutaba, Raouf (2009)
Applying Kernel Methods to Anomaly-based Intrusion Detection Systems.
Global Information Infrastructure Symposium.
Conference or Workshop Item, Bibliographie

Aly, Sherif G. ; Nadi, Sarah ; Hamdan, Karim (2008)
A Java-Based Programming Language Support of Location Management in Pervasive Systems.
In: International Journal of Computer Science and Network Security, 8 (6)
Article, Bibliographie

B

Bodden, Eric ; Pun, Ka I. ; Steffen, Martin ; Stolz, Volker ; Wickert, Anna-Katharina
eds.: Margaria, Tiziana ; Steffen, Bernhard (2016)
Information Flow Analysis for Go.
In: Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques
doi: 10.1007/978-3-319-47166-2_30
Book Section, Bibliographie

Baluda, Mauro (2015)
EvoSE: Evolutionary Symbolic Execution.
In: 6th International Workshop on Automating Test Case Design, Selection and Evaluation (A-TEST 2015): Proceedings
Book Section, Bibliographie

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600922
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2013)
Reducing human factors in software security architectures.
Future Security Conference 2013.
Conference or Workshop Item, Bibliographie

Brzuska, Christina ; Fischlin, Marc ; Smart, Nigel ; Warinschi, Bogdan ; Williams, Stephen (2013)
Less is more: relaxed yet composable security notions for key exchange.
In: Int. J. Inf. Sec, 12 (4)
Article, Bibliographie

Bodden, Eric ; Mezini, Mira ; Brabrand, Claus ; Tolêdo, Társis ; Ribeiro, Márcio ; Borba, Paulo (2013)
SPLlift - Statically Analyzing Software Product Lines in Minutes Instead of Years.
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2013).
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Tolêdo, Társis ; Ribeiro, Márcio ; Brabrand, Claus ; Borba, Paulo ; Mezini, Mira (2012)
Transparent and Efficient Reuse of IFDS-based Static Program Analyses for Software Product Lines.
Report, Bibliographie

Bugiel, Sven ; Heuser, Stephan ; Sadeghi, Ahmad-Reza (2012)
myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android.
Report, Bibliographie

Bodden, Eric ; Falzon, Kevin ; Pun, Ka I. ; Stolz, Volker (2012)
Delta-oriented Monitor Specification.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Follner, Andreas ; Rasthofer, Siegfried (2012)
Challenges in defining a programming language for provably correct dynamic analyses.
5th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2012).
Conference or Workshop Item, Bibliographie

Bodden, Eric (2012)
Towards Typesafe Weaving for Modular Reasoning in Aspect-Oriented Programs.
FOAL 2012: International Workshop on the Foundations of Aspect-Oriented Languages.
Conference or Workshop Item, Bibliographie

Bodden, Eric (2012)
Identifying meaningless parameterized linear-temporal-logic formulas.
Report, Bibliographie

Bodden, Eric (2012)
On the Expressiveness of Parameterized Finite-state Runtime Monitors.
Report, Bibliographie

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2012)
Partially evaluating finite-state runtime monitors ahead of time.
In: ACM Transactions on Programming Languages and Systems (TOPLAS)
Article, Bibliographie

Bodden, Eric (2012)
MOPBox: A Library Approach to Runtime Verification.
RV ; 2 (San Francisco, CA) : 2011.09.27-30 International Conference on Runtime Verification ; 2 (San Francisco, CA) : 2011.09.27-30.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Tanter, Éric ; Inostroza, Milton (2012)
Safe and Practical Decoupling of Aspects with Join Point Interfaces.
Report, Bibliographie

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Conference or Workshop Item, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11). Ghent, Belgium (19.10.2011-21.10.2011)
doi: 10.1007/978-3-642-24712-5_3
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Stateful Breakpoints: A Practical Approach to Defining Parameterized Runtime Monitors.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Continuation equivalence: a Correctness Criterion for Static Optimizations of Dynamic Analyses.
WODA '11: International Workshop on Dynamic Analysis.
Conference or Workshop Item, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Article, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Conference or Workshop Item, Bibliographie

Bodden, Eric (2011)
Closure Joinpoints: Block joinpoints without surprises.
AOSD '11: Proceedings of the 10th International Conference on Aspect-oriented Software Development.
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Sewe, Andreas ; Sinschek, Jan ; Oueslati, Hela ; Mezini, Mira (2011)
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders.
International Conference on Software Engineering. Waikiki, Honolulu, HI, USA (21-28 May 2011)
doi: 10.1145/1985793.1985827
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Lam, Patrick ; Hendren, Laurie (2010)
Clara: a Framework for Statically Evaluating Finite-state Runtime Monitors.
1st International Conference on Runtime Verification (RV).
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Lam, Patrick (2010)
Clara: Partially Evaluating Runtime Monitors at Compile Time.
1st International Conference on Runtime Verification (RV).
Conference or Workshop Item, Bibliographie

Bruch, Marcel ; Bodden, Eric ; Monperrus, Martin ; Mezini, Mira (2010)
IDE 2.0: Collective Intelligence in Software Development.
FSE/SDP Workshop on the Future of Software Engineering.
doi: 10.1145/1882362.1882374?
Conference or Workshop Item, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
YACZK: Yet Another Compiler for Zero-Knowledge.
19th USENIX Security Symposium. Washington D.C., USA (11.08.2010 – 13.08.2010)
Conference or Workshop Item, Bibliographie

Bodden, Eric ; Havelund, Klaus (2010)
Aspect-oriented Race Detection in Java.
In: IEEE Transactions on Software Engineering (TSE), 36 (4)
Article, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Efficient Privacy-Preserving Classification of ECG Signals.
2009 First IEEE International Workshop on Information Forensics and Security (WIFS). London (06.12.2009-09.12.2009)
doi: 10.1109/WIFS.2009.5386475
Conference or Workshop Item, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Book Section, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Book Section, Bibliographie

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09)
doi: 10.1007/978-3-642-16441-5_5
Book Section, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09)
doi: 10.1007/978-3-642-04444-1_26
Book Section, Bibliographie

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09). Cambridge, UK (01.04.2009-03.04.2009)
doi: 10.1007/978-3-642-36213-2_9
Conference or Workshop Item, Bibliographie

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sound Zero-Knowledge Protocols.
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany (26.04.2009 -30.04.2009)
Conference or Workshop Item, Bibliographie

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17). Incheon Republic of Korea (12.12.2017-15.12.2017)
doi: 10.1145/3143361.3143362
Conference or Workshop Item, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016)
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16). Berlin (16.07.2016-16.07.2016)
doi: 10.1145/2959424.2959427
Conference or Workshop Item, Bibliographie

D

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17). Hong Kong (30.11.2017-02.12.2017)
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17). Kanazawa, Japan (10.07.2017-12.07.2017)
doi: 10.1007/978-3-319-61204-1_30
Conference or Workshop Item, Bibliographie

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017)
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Conference or Workshop Item, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015 - 11.02.2015)
doi: 10.14722/ndss.2015.23113
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (November 07 - 07, 2014)
doi: 10.1145/2664168.2664181
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014 – 22.08.2014)
Conference or Workshop Item, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Conference or Workshop Item, Bibliographie

Demmler, Daniel (2013)
Hardware-Assisted Two-Party Secure Computation on Mobile Devices.
Technische Universität Darmstadt
Master Thesis, Bibliographie

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso (2013)
The Fiat-Shamir Transformation in a Quantum World.
In: arXiv:1306.0315, 2013
Article, Bibliographie

Davi, Lucas ; Dmitrienko, Alexandra ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza (2012)
XIFER: A Software Diversity Tool Against Code-Reuse Attacks.
Conference or Workshop Item, Bibliographie

E

Eichberg, Michael ; Hermann, Ben ; Mezini, Mira ; Glanz, Leonid (2015)
Hidden Truths in Dead Software Paths.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. New York, NY, USA
Conference or Workshop Item, Bibliographie

F

Falzon, Kevin (2017)
On the Use of Migration to Stop Illicit Channels.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Follner, Andreas (2017)
On Generating Gadget Chains for Return-Oriented Programming.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Falzon, Kevin ; Bodden, Eric
eds.: Lopez, Javier ; Mitchell, Chris J. (2015)
Dynamically Provisioning Isolation in Hierarchical Architectures.
Information Security Conference. Trondheim
Conference or Workshop Item, Bibliographie

Falzon, Kevin ; Bodden, Eric ; Purandare, Rahul (2013)
Distributed Finite-State Runtime Monitoring with Aggregated Events.
4th International Conference on Runtime Verification (RV'13). Rennes, France (24.-27.09.)
doi: 10.1007/978-3-642-40787-1_6
Conference or Workshop Item, Bibliographie

Fritz, Christian ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Octeau, Damien ; McDaniel, Patrick (2013)
Highly Precise Taint Analysis for Android Applications.
Report, Bibliographie

Falzon, Kevin ; Pace, Gordon J.
eds.: Machado, Ricardo J. ; Maciel, Rita Suzana ; Rubin, Julia ; Botterweck, Goetz (2012)
Combining Testing and Runtime Verification.
8th International Workshop on Model-based Methodologies for Pervasive and Embedded Software. Essen, Germany (September 04, 2012)
Conference or Workshop Item, Bibliographie

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Conference or Workshop Item, Bibliographie

G

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017. Hong Kong, China (03.12.2017-07.12.2017)
doi: 10.1007/978-3-319-70697-9_16
Conference or Workshop Item, Bibliographie

Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Garcia, Luis ; Brasser, Ferdinand ; Cintuglu, Mehmet H. ; Sadeghi, Ahmad-Reza ; Mohammed, Osama ; Zonouz, Saman A. (2017)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Conference or Workshop Item, Bibliographie

H

Heuser, Stephan ; Reaves, Bradley ; Pendyala, Praveen Kumar ; Carter, Henry ; Dmitrienko, Alexandra ; Kiyavash, Negar ; Enck, William ; Sadeghi, Ahmad-Reza ; Traynor, Patrick (2017)
Phonion: Practical Protection of Metadata in Telephony Networks.
Conference or Workshop Item, Bibliographie

Hermann, Ben ; Reif, Michael ; Eichberg, Michael ; Mezini, Mira (2015)
Getting to Know You: Towards a Capability Model for Java.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. New York, NY, USA
Conference or Workshop Item, Bibliographie

Hiemenz, Benedikt (2014)
Analysis and Extensions of the PCF Secure Two-Party Computation Compiler.
Technische Universität Darmstadt
Bachelor Thesis, Bibliographie

Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (May 08 - 10, 2013)
doi: 10.1145/2484313.2484369
Conference or Workshop Item, Bibliographie

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013)
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Conference or Workshop Item, Bibliographie

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. Chicago Illinois USA (04.10.2010-08.10.2010)
doi: 10.1145/1866307.1866358
Conference or Workshop Item, Bibliographie

I

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Modular Reasoning with Join Point Interfaces.
Report, Bibliographie

Inostroza, Milton ; Tanter, Éric ; Bodden, Eric (2011)
Join Point Interfaces for Modular Reasoning in Aspect-Oriented Programs.
ESEC/FSE '11: Joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie

J

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Conference or Workshop Item, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Conference or Workshop Item, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Book Section, Bibliographie

K

Krüger, Stefan ; Reif, Michael ; Wickert, Anna-Katharina ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Mezini, Mira ; Acar, Yasemin ; Fahl, Sascha (2023)
Securing Your Crypto-API Usage Through Tool Support - A Usability Study.
2023 IEEE Secure Development Conference. Atlanta, USA (18.10.2023 - 20.10.2023)
doi: 10.1109/SecDev56634.2023.00015
Conference or Workshop Item, Bibliographie

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017)
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17). Urbana, Illinois, USA (30.10.2017-03.11.2017)
doi: 10.1109/ASE.2017.8115707
Conference or Workshop Item, Bibliographie

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Article, Bibliographie

Kiss, Ágnes ; Schneider, Thomas (2016)
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016. Wien (08.05.2016-12.05.2016)
doi: 10.1007/978-3-662-49890-3_27
Conference or Workshop Item, Bibliographie

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Conference or Workshop Item, Bibliographie

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015)
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15). Heraklion, Greece (24.08.2015-26.08.2015)
doi: 10.1007/978-3-319-22846-4_11
Conference or Workshop Item, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2014)
Automatic protocol selection in secure two-party computations.
12. International Conference on Applied Cryptography and Network Security (ACNS'14). Lausanne, Switzerland (10.06.2014-13.06.2014)
doi: 10.1007/978-3-319-07536-5_33
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2013)
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
Norm, patent, standard, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013 - 27.02.2013)
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Article, Bibliographie

Kononenko, Kirill (2012)
A Unified Approach to Identifying and Healing Vulnerabilities in x86 Machine Code.
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2012)
Universal Circuit for Secure Function Evaluation.
Norm, patent, standard, Bibliographie

Kim, Chang Hwan Peter ; Bodden, Eric ; Batory, Don ; Khurshid, Sarfraz (2010)
Reducing Configurations to Monitor in a Software Product Line.
1st International Conference on Runtime Verification (RV).
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09). Kanazawa, Japan (12.12.2009-14.12.2009)
doi: 10.1007/978-3-642-10433-6_1
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Book Section, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Book Section, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
Improved Garbled Circuit: Free XOR Gates and Applications.
35. International Colloquium on Automata, Languages and Programming (ICALP'08). Reykjavik, Iceland (07.07.2008-11.07.2008)
doi: 10.1007/978-3-540-70583-3_40
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker (2008)
Practical Secure Function Evaluation.
8. Kryptotag. Tübingen, Germany (11.04.2008)
Conference or Workshop Item, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
12th International Conference on Financial Cryptography and Data Security (FC'08). Cozumel, Mexico (28.01.2008 - 31.01.2008)
doi: 10.1007/978-3-540-85230-8_7
Conference or Workshop Item, Bibliographie

L

Lerch, Johannes (2016)
On the Scalability of Static Program Analysis to Detect Vulnerabilities in the Java Platform.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015)
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on. Lincoln, Nebraska, USA (9.-13. November 2015)
Conference or Workshop Item, Bibliographie

Lerch, Johannes ; Hermann, Ben (2015)
Design Your Analysis: A Case Study on Implementation Reusability of Data-flow Functions.
Proceedings of the 4th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis. New York, NY, USA
Conference or Workshop Item, Bibliographie

Lerch, Johannes ; Hermann, Ben ; Bodden, Eric ; Mezini, Mira (2014)
FlowTwist: Efficient Context-sensitive Inside-out Taint Analysis for Large Codebases.
Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering.
Conference or Workshop Item, Bibliographie

Li, Li ; Bartel, Alexandre ; Klein, Jacques ; Le Traon, Yves ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick (2014)
I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
Report, Bibliographie

Lam, Patrick ; Bodden, Eric ; Lhotak, Ondrej ; Hendren, Laurie (2011)
The Soot framework for Java program analysis: a retrospective.
Cetus Users and Compiler Infastructure Workshop (CETUS 2011).
Conference or Workshop Item, Bibliographie

M

Mittelbach, Arno (2013)
Cryptophia’s Short Combiner for Collision-Resistant Hash Functions (best student paper).
Conference or Workshop Item, Bibliographie

N

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017)
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23075
Conference or Workshop Item, Bibliographie

Nadi, Sarah ; Krüger, Stefan (2016)
Variability Modeling of Cryptographic Components (Clafer Experience Report).
Tenth International Workshop on Variability Modelling of Software-intensive Systems. Salvador, Brazil (27. - 29.1.2016)
Conference or Workshop Item, Bibliographie

P

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Conference or Workshop Item, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Article, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Conference or Workshop Item, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (August 20–22, 2014)
Conference or Workshop Item, Bibliographie

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas (2012)
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
Report, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. (2009)
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009. Tokyo, Japan (06.12.2009-10.12.2009)
doi: 10.1007/978-3-642-10366-7_15
Conference or Workshop Item, Bibliographie

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09). Paris, France (02.06.2009 - 05.06.2009)
doi: 10.1007/978-3-642-01957-9_6
Conference or Workshop Item, Bibliographie

R

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196522
Conference or Workshop Item, Bibliographie

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017)
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Conference or Workshop Item, Bibliographie

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Article, Bibliographie

Rasthofer, Siegfried (2017)
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Conference or Workshop Item, Bibliographie

Rasthofer, Siegfried ; Arzt, Steven ; Bodden, Eric (2014)
A machine-learning approach for classifying and categorizing android sources and sinks.
In: 2014 Network and Distributed System Security Symposium (NDSS)
Article, Bibliographie

Rasthofer, Siegfried ; Arzt, Steven ; Lovat, Enrico ; Bodden, Eric (2014)
DROIDFORCE: Enforcing Complex, Data-Centric, System-Wide Policies in Android.
In: Proceedings of the International Conference on Availability, Reliability and Security (ARES)
Article, Bibliographie

Robillard, Martin P. ; Bodden, Eric ; Kawrykow, David ; Mezini, Mira ; Ratchford, Tristan (2012)
Automated API Property Inference Techniques.
In: IEEE Transactions on Software Engineering (TSE)
Article, Bibliographie

S

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Conference or Workshop Item, Bibliographie

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Conference or Workshop Item, Bibliographie

Schneider, Matthias ; Schneider, Thomas (2014)
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (June 11 - 13, 2014)
doi: 10.1145/2600918.2600927
Conference or Workshop Item, Bibliographie

Schneider, Thomas ; Zohner, Michael (2013)
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13). Okinawa, Japan (April 1-5,2013)
doi: 10.1007/978-3-642-39884-1_23
Conference or Workshop Item, Bibliographie

Schneider, Thomas ; Zohner, Michael (2012)
Efficient Secure Two-Party Computation.
Conference or Workshop Item, Bibliographie

Schneider, Thomas (2012)
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
doi: 10.1007/978-3-642-30042-4
Book, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (full version).
Report, Bibliographie

Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Varadharajan, Vijay
eds.: Foresti, Sara ; Yung, Moti ; Martinelli, Fabio (2012)
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
In: European Symposium on Research in Computer Science (ESORICS)
Book Section, Bibliographie

Schneider, Thomas (2011)
Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-Universität Bochum
Ph.D. Thesis, Bibliographie

Schneider, Thomas (2011)
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. Bonn-Bad Godesberg (10.-05.2011-12.05.2011)
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). Mannheim (08.09.2010-08.09.2010)
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. Berlin (21.06.2010-23.06.2010)
doi: 10.1007/978-3-642-13869-0_30
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009)
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09). Seoul, Korea (02.12.2009-04.12.2009)
doi: 10.1007/978-3-642-14423-3_16
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
3rd Section Days of Ruhr-University Bochum Research School. Bochum, Germany (04.11.2009 - 06.11.2009)
Conference or Workshop Item, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008)
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08)
doi: 10.1007/978-3-642-00730-9_21
Book Section, Bibliographie

Schneider, Thomas (2008)
Practical secure function evaluation.
Informatiktage 2008 - Fachwissenschaftlicher Informatik-Kongress. Bonn, Germany (14.03.2008 - 15.03.2008)
Conference or Workshop Item, Bibliographie

Schneider, Thomas (2008)
Practical Secure Function Evaluation.
Friedrich-Alexander-Universität Erlangen-Nürnberg
Diploma Thesis or Magisterarbeit, Bibliographie

Schneider, Thomas (2007)
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
Bachelor Thesis, Bibliographie

T

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Conference or Workshop Item, Bibliographie

Thies, Andreas ; Bodden, Eric (2012)
RefaFlex: Safer Refactorings for Reflective Java Programs [forthcoming].
International Symposium on Software Testing and Analysis (ISSTA 2012).
Conference or Workshop Item, Bibliographie

W

Wickert, Anna-Katharina ; Baumgärtner, Lars ; Schlichtig, Michael ; Narasimhan, Krishna ; Mezini, Mira (2022)
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild.
21st International Conference on Trust, Security and Privacy in Computing and Communications. Wuhan, Peoples Republik of China (09.-11.12.2022)
doi: 10.1109/TrustCom56396.2022.00051
Conference or Workshop Item, Bibliographie

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017)
MoPS: A Modular Protection Scheme for Long-Term Storage.
12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17). Abu Dhabi United Arab Emirates (02.04.2017-06.04.2017)
doi: 10.1145/3052973.3053025
Conference or Workshop Item, Bibliographie

Z

Zohner, Michael (2017)
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Technische Universität Darmstadt
Ph.D. Thesis, Primary publication

This list was generated on Sun Oct 6 01:16:36 2024 CEST.