![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Towards Practical RAM Based Secure Computation
Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...
-
Chapter and Conference Paper
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
A major challenge in computer security is about establishing the trustworthiness of remote platforms. Remote attestation is the most common approach to this challenge. It allows a remote platform to measure an...
-
Chapter and Conference Paper
Correcting Finite Sampling Issues in Entropy l-diversity
In statistical disclosure control (SDC) anonymized versions of a database table are obtained via generalization and suppression to reduce de-anonymization attacks, ideally with minimal utility loss. This amoun...
-
Chapter and Conference Paper
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
Mesh networked low-end embedded devices are increasingly used in various scenarios, including industrial control, wireless sensing, robot swarm communication, or building automation. Recently, more and more so...
-
Chapter and Conference Paper
Compiling Low Depth Circuits for Practical Secure Computation
With the rise of practical Secure Multi-party Computation (MPC) protocols, compilers have been developed that create Boolean or Arithmetic circuits for MPC from functionality descriptions in a high-level langu...
-
Chapter and Conference Paper
PUF-Based Software Protection for Low-End Embedded Devices
In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable t...
-
Chapter and Conference Paper
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs
This paper presents a lightweight anti-counterfeiting solution using intrinsic Physically Unclonable Functions (PUFs), which are already embedded in most commodity hardware platforms. The presented solution is...
-
Chapter and Conference Paper
Towards Secure Bioinformatics Services (Short Paper)
In this paper we show how privacy of genomic sequences can be protected while they are analyzed using Hidden Markov Models (HMM), which is commonly done in bioinformatics to detect certain non-beneficial patte...
-
Chapter and Conference Paper
Detecting Computer Worms in the Cloud
Computer worms are very active and new sophisticated versions continuously appear. Signature-based detection methods work with a low false-positive rate, but previously knowledge about the threat is needed. An...
-
Chapter and Conference Paper
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardw...
-
Chapter and Conference Paper
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation
A hybrid cloud combines a trusted private cloud with a public cloud owned by an untrusted cloud provider. This is problematic: When a hybrid cloud shifts computation from its private to its public part, it mus...
-
Chapter and Conference Paper
Hiding the Policy in Cryptographic Access Control
Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor b...
-
Chapter and Conference Paper
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited
We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decry...
-
Chapter and Conference Paper
Converse PUF-Based Authentication
Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradi...
-
Chapter and Conference Paper
Oblivious Outsourced Storage with Delegation
In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In ...
-
Chapter and Conference Paper
Physically Uncloneable Functions in the Universal Composition Framework
Recently, there have been numerous works about hardwareassisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions...
-
Chapter and Conference Paper
On the Reliability of Cell Phone Camera Fingerprint Recognition
Multiple multimedia forensic algorithms have been introduced allowing tracing back media copies back to its source by matching artifacts to fingerprint databases. While this offers new possibilities for invest...
-
Chapter and Conference Paper
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs propose to derive uncloneability...
-
Chapter and Conference Paper
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platform is in a certain trustworthy state. While in principle this functionality can be achieved by the remote at...
-
Chapter and Conference Paper
Privacy-Preserving Face Recognition
Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, in particular if the biometric matching ...