Search

Order:
Type:
Year:
You may leave fields blank to get a list of all publications.
 

Displaying results 1 to 20 out of 117

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Next >
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates
Marc Fischlin, Felix Günther
In: IEEE: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017), April 2017.
www.ieee-security.org/TC/EuroSP2017/.

AS³: Adaptive Social Secret Sharing for Distributed Storage Systems
Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
In: 2016 Privacy, Security and Trust Conference, IEEE, December 2016.
pst2016.unitec.ac.nz/.

Efficient Proactive Secret Sharing
Jacqueline Brendel, Denise Demirel
In: 2016 Privacy, Security and Trust Conference, IEEE, December 2016.
pst2016.unitec.ac.nz/.

A security analysis of techniques for long-term integrity protection
Matthias Geihs, Denise Demirel, Johannes Buchmann
In: 2016 Privacy, Security and Trust Conference, December 2016.
pst2016.unitec.ac.nz/.

An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins
Rachid El Bansarkhani, Jan Sturm
In: 15th International Conference on Cryptology and Network Security - CANS 2016, November 2016.
cans2016.di.unimi.it/.

On Probe-Response Attacks in Collaborative Intrusion Detection Systems
Emmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser
In: IEEE Conference on Communications and Network Security, IEEE, October 2016.
http://cns2016.ieee-cns.org/.

An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data
Lucas Schabhüser, Denise Demirel, Johannes Buchmann
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), October 2016.
cns2016.ieee-cns.org/workshop/2nd-workshop-security-and-privacy-cloud-spc.

Analyzing TETRA Location Privacy and Network Availability
Martin Pfeiffer, Jan-Pascal Kwiotek, Jiska Classen, Robin Klose, Matthias Hollick
In: SPSM '16, 6th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, p. 117--122, ACM, October 2016. ISBN 978-1-4503-4564-4.
http://dx.doi.org/10.1145/2994459.2994463.

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer
Jiska Classen, Daniel Steinmetzer, Matthias Hollick
In: 3rd ACM Workshop on Visible Light Communication Systems, October 2016.

Secure Logging Schemes and Certificate Transparency
Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, September 2016.
www.ics.forth.gr/esorics2016/.

Compiling Low Depth Circuits for Practical Secure Computation
Niklas Buescher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), Springer, September 2016.
www.ics.forth.gr/esorics2016/.

Efficient Third Party Auditing for a Distributed Storage System
Denise Demirel, Stephan Krenn, Thomas Loruenser, Giulia Traverso
In: International Conference on Availability, Reliability and Security - ARES 2016, IEEE, September 2016.
https://www.ares-conference.eu/conference/.

Formal Policy-based Provenance Audit
Denis Butin, Denise Demirel, Johannes Buchmann
In: The 11th International Workshop on Security - IWSEC 2016, September 2016.
www.iwsec.org/2016/.

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
Florian Kohnhäuser, Stefan Katzenbeisser
In: 21st European Symposium on Research in Computer Security - ESORICS 2016, p. 320-338, Springer, September 2016.
www.ics.forth.gr/esorics2016/.

Efficient single-photon absorption by a trapped moving atom
Nils Trautmann, Gernot Alber, Gerd Leuchs
In: Physical Review A, p. 8, American Physical Society, September 2016.
journals.aps.org/pra/abstract/10.1103/PhysRevA.94.033832.

Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks
Nina Bindel, Johannes Buchmann, Juliane Krämer
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography, IEEE Conference Publication, August 2016.
http://conferenze.dei.polimi.it/FDTC16/index.html.

A QKD-based digital archiving solution providing everlasting confidentiality and integrity
Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
Cryptology ePrint Archive, Report 2016/742, August 2016.

More Efficient Oblivious Transfer Extensions
Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
In: Journal of Cryptology, August 2016.

Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso, Denise Demirel, Johannes Buchmann
In: 9th International Conference on Information Theoretic Security - ICITS 2016, Springer, August 2016.
www.icits2016.com/.

Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality
Thomas Klir
August 2016.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Next >
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang