Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    The Future of IT in Peace and Security

    Not only today, but also in the future information technology and the advances in the field of computer science will have a high relevance for peace and security. Naturally, a textbook like this can only cover...

    Christian Reuter, Konstantin Aal in Information Technology for Peace and Secur… (2019)

  2. No Access

    Chapter

    Resilient Critical Infrastructures

    Critical infrastructures, such as the electric grid or transportation systems, empower our modern society. Their disruption can seriously impair the daily lives of millions of people. Due to this fact, they ar...

    Matthias Hollick, Stefan Katzenbeisser in Information Technology for Peace and Security (2019)

  3. Chapter and Conference Paper

    Towards Practical RAM Based Secure Computation

    Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...

    Niklas Buescher, Alina Weber, Stefan Katzenbeisser in Computer Security (2018)

  4. Chapter and Conference Paper

    Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors

    A major challenge in computer security is about establishing the trustworthiness of remote platforms. Remote attestation is the most common approach to this challenge. It allows a remote platform to measure an...

    Steffen Schulz, André Schaller, Florian Kohnhäuser in Computer Security – ESORICS 2017 (2017)

  5. No Access

    Book and Conference Proceedings

    ICT Systems Security and Privacy Protection

    31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings

    Jaap-Henk Hoepman in IFIP Advances in Information and Communication Technology (2016)

  6. No Access

    Chapter and Conference Paper

    Correcting Finite Sampling Issues in Entropy l-diversity

    In statistical disclosure control (SDC) anonymized versions of a database table are obtained via generalization and suppression to reduce de-anonymization attacks, ideally with minimal utility loss. This amoun...

    Sebastian Stammler, Stefan Katzenbeisser, Kay Hamacher in Privacy in Statistical Databases (2016)

  7. Chapter and Conference Paper

    Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices

    Mesh networked low-end embedded devices are increasingly used in various scenarios, including industrial control, wireless sensing, robot swarm communication, or building automation. Recently, more and more so...

    Florian Kohnhäuser, Stefan Katzenbeisser in Computer Security – ESORICS 2016 (2016)

  8. Chapter and Conference Paper

    Compiling Low Depth Circuits for Practical Secure Computation

    With the rise of practical Secure Multi-party Computation (MPC) protocols, compilers have been developed that create Boolean or Arithmetic circuits for MPC from functionality descriptions in a high-level langu...

    Niklas Buescher, Andreas Holzer, Alina Weber in Computer Security – ESORICS 2016 (2016)

  9. No Access

    Chapter and Conference Paper

    PUF-Based Software Protection for Low-End Embedded Devices

    In recent years, low-end embedded devices have been used increasingly in various scenarios, ranging from consumer electronics to industrial equipment. However, this evolution made embedded devices profitable t...

    Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser in Trust and Trustworthy Computing (2015)

  10. No Access

    Chapter and Conference Paper

    Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs

    This paper presents a lightweight anti-counterfeiting solution using intrinsic Physically Unclonable Functions (PUFs), which are already embedded in most commodity hardware platforms. The presented solution is...

    André Schaller, Tolga Arul, Vincent van der Leest in Trust and Trustworthy Computing (2014)

  11. No Access

    Book and Conference Proceedings

    Trust and Trustworthy Computing

    5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings

    Stefan Katzenbeisser, Edgar Weippl in Lecture Notes in Computer Science (2012)

  12. No Access

    Chapter and Conference Paper

    Towards Secure Bioinformatics Services (Short Paper)

    In this paper we show how privacy of genomic sequences can be protected while they are analyzed using Hidden Markov Models (HMM), which is commonly done in bioinformatics to detect certain non-beneficial patte...

    Martin Franz, Björn Deiseroth, Kay Hamacher in Financial Cryptography and Data Security (2012)

  13. Chapter and Conference Paper

    Detecting Computer Worms in the Cloud

    Computer worms are very active and new sophisticated versions continuously appear. Signature-based detection methods work with a low false-positive rate, but previously knowledge about the threat is needed. An...

    Sebastian Biedermann, Stefan Katzenbeisser in Open Problems in Network Security (2012)

  14. No Access

    Chapter and Conference Paper

    Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs

    RFID-based tokens are increasingly used in electronic payment and ticketing systems for mutual authentication of tickets and terminals. These systems typically use cost-effective tokens without expensive hardw...

    Anthony Van Herrewege, Stefan Katzenbeisser in Financial Cryptography and Data Security (2012)

  15. No Access

    Chapter and Conference Paper

    Dynamic Anomaly Detection for More Trustworthy Outsourced Computation

    A hybrid cloud combines a trusted private cloud with a public cloud owned by an untrusted cloud provider. This is problematic: When a hybrid cloud shifts computation from its private to its public part, it mus...

    Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini in Information Security (2012)

  16. No Access

    Chapter and Conference Paper

    Hiding the Policy in Cryptographic Access Control

    Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor b...

    Sascha Müller, Stefan Katzenbeisser in Security and Trust Management (2012)

  17. No Access

    Chapter and Conference Paper

    Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited

    We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PKE), which allows for additions in the encrypted domain while having a master decryption procedure that can decry...

    Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser in Information Security (2012)

  18. No Access

    Chapter and Conference Paper

    Converse PUF-Based Authentication

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradi...

    Ünal Kocabaş, Andreas Peter, Stefan Katzenbeisser in Trust and Trustworthy Computing (2012)

  19. No Access

    Chapter and Conference Paper

    Oblivious Outsourced Storage with Delegation

    In the past few years, outsourcing private data to untrusted servers has become an important challenge. This raises severe questions concerning the security and privacy of the data on the external storage. In ...

    Martin Franz, Peter Williams, Bogdan Carbunar in Financial Cryptography and Data Security (2012)

  20. Chapter and Conference Paper

    Physically Uncloneable Functions in the Universal Composition Framework

    Recently, there have been numerous works about hardwareassisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions...

    Christina Brzuska, Marc Fischlin, Heike Schröder in Advances in Cryptology – CRYPTO 2011 (2011)

previous disabled Page of 2