Browse by Person
![]() | Up a level |
Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops,
Springer, Oslo, Norway, [Conference or Workshop Item]
Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (eds.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), pp. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Conference or Workshop Item]
Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, pp. 25-35,
Scottsdale, AZ, USA, DOI: 10.1145/2665943.2665962,
[Conference or Workshop Item]
Biedermann, Sebastian ; Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2014):
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]
Armknecht, Frederik ; Gagliardoni, Tommaso ; Katzenbeisser, Stefan ; Peter, Andreas (2014):
General Impossibility of Group Homomorphic Encryption in the Quantum World.
In: Lecture Notes in Computer Science, 8383, In: Public-Key Cryptography PKC 2014, pp. 556-573,
[Conference or Workshop Item]
Günther, Felix ; Manulis, Mark ; Peter, Andreas (2014):
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
In: IACR Cryptology ePrint Archive 2014,
[Conference or Workshop Item]
Biedermann, Sebastian ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Strufe, Thorsten ; Peter, Andreas (2014):
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
In: SOFSEM 2014: Theory and Practice of Computer Science, 8327, pp. 114-125. [Article]
Peter, Andreas ; Tews, Erik ; Katzenbeisser, Stefan (2013):
Efficiently Outsourcing Multiparty Computation under Multiple Keys.
In: Cryptology ePrint Archive, 2013 (13), pp. 1-24. International Association for Cryptologic Research (IACR), [Article]
Peter, Andreas (2013):
Securely Outsourcing Computations using Homomorphic Encryption.
TU Darmstadt,
[Ph.D. Thesis]
Peter, Andreas ; Hartmann, T. ; Müller, S. ; Katzenbeisser, Stefan (2012):
Privacy-Preserving Architecture for Forensic Image Recognition.
In: International Workshop on Information Forensics and Security (WIFS 2012), pp. 79-84,
IEEE, ISBN 978-1-4673-2285-0,
DOI: 10.1109/WIFS.2012.6412629,
[Conference or Workshop Item]
Peter, Andreas ; Kronberg, M. ; Trei, W. ; Katzenbeisser, Stefan (2012):
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
In: International Conference on Information Security (ISC 2012), pp. 242-257,
Springer, [Conference or Workshop Item]
Franz, M. ; Carbunar, B. ; Sion, R. ; Katzenbeisser, Stefan ; Sotakova, M. ; Williams, P. ; Peter, Andreas (2011):
Oblivious Outsourced Storage with Delegation.
In: Financial Cryptography and Data Security (FC 2011), pp. 127-140,
Springer, [Conference or Workshop Item]
Hülsing, Andreas ; Buchmann, J. ; Weber, Stefan G. ; Petzoldt, Albrecht ; Thomae, Enrico ; Krämer, Juliane ; Cayrel, Pierre-Louis ; Barreto, Paulo ; Heuser, Annelie
Peter, Andreas ; Katzenbeisser, Stefan Technische Universität Darmstadt (eds.) (2010):
Tagungsband des 13. Kryptotags. Workshop der Fachgruppe "Angewandte Kryptographie" der "Gesellschaft für Informatik e.V.".
Darmstadt, Security Engineering Group (TU Darmstadt), [Book]
Brzuska, Christina ; Busch, Heike ; Dagdelen, Özgür ; Fischlin, Marc ; Franz, Martin ; Katzenbeisser, Stefan ; Manulis, Mark ; Onete, Cristina ; Peter, Andreas ; Poettering, Bertram ; Schröder, Dominique (2010):
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
In: Lecture Notes in Computer Science, 6055, In: Applied Cryptography and Network Security (ACNS) 2010, pp. 333-350,
Springer, [Conference or Workshop Item]