TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 14.

Schaller, A. ; Schulz, S. ; Kohnhäuser, F. ; Katzenbeisser, S. (2017)
Boot Attestation: Secure Reporting for Off-The-Shelf IoT Sensors.
Conference or Workshop Item

Kohnhäuser, F. ; Büscher, N. ; Gabmeyer, S. ; Katzenbeisser, S. (2017)
SCAPI: A Scalable Attestation Protocol to Detect Software and Physical Attacks.
Conference or Workshop Item

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017)
ORAMs in a Quantum World.
Utrecht, The Netherlands
Conference or Workshop Item

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2013)
Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications.
In: Designs, Codes and Cryptography, 67 (2)

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013)
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3)

Alsouri, S. ; Feller, T. ; Malipatlolla, S. ; Katzenbeisser, S. (2013)
Hardware-based Security for Virtual Trusted Platform Modules.

Ober, M. ; Katzenbeisser, S. ; Hamacher, Kay (2013)
Structure and Anonymity of the Bitcoin Transaction Graph.
In: Future Internet, 5 (2)

Armknecht, F. ; Katzenbeisser, S. ; Peter, A. (2012)
Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption.
Conference or Workshop Item

Kinder, J. ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. (2010)
Proactive Detection of Computer Worms Using Model Checking.
In: IEEE Transactions on Dependable and Secure Computing

Liu, Y. ; Ghosal, D. ; Armknecht, F. ; Sadeghi, A. ; Schulz, S. ; Katzenbeisser, S. (2010)
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Conference or Workshop Item

Jha, Somesh ; Katzenbeisser, S. ; Schallhart, C. ; Veith, H. ; Chenney, S. (2010)
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10 (1)

Reker, D. ; Katzenbeisser, S. ; Hamacher, Kay (2010)
Computation of mutual information from Hidden Markov Models.
In: Computational biology and chemistry, 34 (5-6)

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2009)
On Multi-Authority Ciphertext-Policy Attribute-Based Encryption.
In: Bulletin of the Korean Mathematical Society, 46 (4)
doi: 10.4134/BKMS.2009.46.4.803

Müller, S. ; Katzenbeisser, S. ; Eckert, C. (2008)
Distributed Attribute-Based Encryption.
11th International Conference on lnformation Security and Cryptology (ICISC 2008). Seoul, South Korea (03.-05.12.2008)
doi: 10.1007/978-3-642-00730-9_2
Conference or Workshop Item

This list was generated on Sat Dec 2 00:24:30 2023 CET.