Browse by Person
Up a level |
Schaller, A. ; Schulz, S. ; Kohnhäuser, F. ; Katzenbeisser, S. (2017)
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
In: European Symposium on Research in Computer Security (ESORICS)
Book Section, Bibliographie
Kohnhäuser, F. ; Büscher, N. ; Gabmeyer, S. ; Katzenbeisser, S. (2017)
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
Conference or Workshop Item, Bibliographie
Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017)
ORAMs in a Quantum World.
Utrecht, The Netherlands
Conference or Workshop Item, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)
Article, Bibliographie
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)
Article, Bibliographie
Alsouri, S. ; Feller, T. ; Malipatlolla, S. ; Katzenbeisser, S. (2013)
Hardware-based Security for Virtual Trusted Platform Modules.
Article, Bibliographie
Ober, M. ; Katzenbeisser, S. ; Hamacher, Kay (2013)
Structure and Anonymity of the Bitcoin Transaction Graph.
In: Future Internet, 5 (2)
Article, Bibliographie
Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item, Bibliographie
Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010)
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing
Article, Bibliographie
Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item, Bibliographie
Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010)
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)
Article, Bibliographie
Reker, D. ; Katzenbeisser, S. ; Hamacher, Kay (2010)
Computation of mutual information from Hidden Markov Models.
In: Computational biology and chemistry, 34 (5-6)
Article, Bibliographie
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009)
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4)
doi: 10.4134/BKMS.2009.46.4.803
Article, Bibliographie
Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008)
Distributed Attribute-Based Encryption.
11th International Conference on lnformation Security and Cryptology (ICISC 2008). Seoul, South Korea (03.12.2008-05.12.2008)
doi: 10.1007/978-3-642-00730-9_2
Conference or Workshop Item, Bibliographie