Skip to main content

previous disabled Page of 2
and
Your search also matched 105 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Cybersicherheit für die Industrie 4.0 – Aktuelle Herausforderungen

Include preview-only content
  1. Article

    Open Access

    The ASHES 2021 special issue at JCEN

    This brief editorial gives a short, two-page overview of the ASHES 2021 workshop. It shall serve as an introduction for this special issue at JCEN.

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2023)

  2. Article

    Open Access

    The ASHES 2020 special issue at JCEN

    This editorial provides its readers with a brief introductory overview of the ASHES workshop series in general, and of this special ASHES 2020 issue at the Journal of Cryptographic Engineering (JCEN) in partic...

    Chip-Hong Chang, Stefan Katzenbeisser in Journal of Cryptographic Engineering (2022)

  3. Article

    Open Access

    ELSA: efficient long-term secure storage of large datasets (full version)

    An increasing amount of information today is generated, exchanged, and stored digitally. This also includes long-lived and highly sensitive information (e.g., electronic health records, governmental documents)...

    Philipp Muth, Matthias Geihs, Tolga Arul in EURASIP Journal on Information Security (2020)

  4. Article

    Open Access

    Long-term integrity protection of genomic data

    Genomic data is crucial in the understanding of many diseases and for the guidance of medical treatments. Pharmacogenomics and cancer genomics are just two areas in precision medicine of rapidly growing utiliz...

    Johannes Buchmann, Matthias Geihs, Kay Hamacher in EURASIP Journal on Information Security (2019)

  5. Chapter and Conference Paper

    Towards Practical RAM Based Secure Computation

    Secure multi-party computation (MPC) protocols are powerful privacy enhancing technologies. Yet, their scalability is limited for data intensive applications due to the circuit computation model. Therefore, RA...

    Niklas Buescher, Alina Weber, Stefan Katzenbeisser in Computer Security (2018)

  6. Chapter and Conference Paper

    Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors

    A major challenge in computer security is about establishing the trustworthiness of remote platforms. Remote attestation is the most common approach to this challenge. It allows a remote platform to measure an...

    Steffen Schulz, André Schaller, Florian Kohnhäuser in Computer Security – ESORICS 2017 (2017)

  7. Chapter and Conference Paper

    Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices

    Mesh networked low-end embedded devices are increasingly used in various scenarios, including industrial control, wireless sensing, robot swarm communication, or building automation. Recently, more and more so...

    Florian Kohnhäuser, Stefan Katzenbeisser in Computer Security – ESORICS 2016 (2016)

  8. Chapter and Conference Paper

    Compiling Low Depth Circuits for Practical Secure Computation

    With the rise of practical Secure Multi-party Computation (MPC) protocols, compilers have been developed that create Boolean or Arithmetic circuits for MPC from functionality descriptions in a high-level langu...

    Niklas Buescher, Andreas Holzer, Alina Weber in Computer Security – ESORICS 2016 (2016)

  9. Chapter and Conference Paper

    Run-Time Accessible DRAM PUFs in Commodity Devices

    A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, which emerges due to variations in the fabrication processes. Prior works have demonstrated that PU...

    Wenjie **ong, André Schaller in Cryptographic Hardware and Embedded System… (2016)

  10. Chapter and Conference Paper

    CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations

    Secure two-party computation (STC) is a computer security paradigm where two parties can jointly evaluate a program with sensitive input data, provided in parts from both parties. By the security guarantees of...

    Martin Franz, Andreas Holzer, Stefan Katzenbeisser in Compiler Construction (2014)

  11. Chapter and Conference Paper

    General Impossibility of Group Homomorphic Encryption in the Quantum World

    Group homomorphic encryption represents one of the most important building blocks in modern cryptography. It forms the basis of widely-used, more sophisticated primitives, such as CCA2-secure encryption or sec...

    Frederik Armknecht, Tommaso Gagliardoni in Public-Key Cryptography – PKC 2014 (2014)

  12. Chapter and Conference Paper

    Detecting Resized Double JPEG Compressed Images – Using Support Vector Machine

    Since JPEG is the most widely used compression standard, detection of forgeries in JPEG images is necessary. In order to create a forged JPEG image, the image is usually loaded into a photo editing software, m...

    Hieu Cuong Nguyen, Stefan Katzenbeisser in Communications and Multimedia Security (2013)

  13. Chapter and Conference Paper

    Robust Resampling Detection in Digital Images

    To create convincing forged images, manipulated images or parts of them are usually exposed to some geometric operations which require a resampling step. Therefore, detecting traces of resampling became an imp...

    Hieu Cuong Nguyen, Stefan Katzenbeisser in Communications and Multimedia Security (2012)

  14. Chapter and Conference Paper

    Detecting Computer Worms in the Cloud

    Computer worms are very active and new sophisticated versions continuously appear. Signature-based detection methods work with a low false-positive rate, but previously knowledge about the threat is needed. An...

    Sebastian Biedermann, Stefan Katzenbeisser in Open Problems in Network Security (2012)

  15. Chapter and Conference Paper

    PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon

    Physically Unclonable Functions (PUFs) are an emerging technology and have been proposed as central building blocks in a variety of cryptographic protocols and security architectures. However, the security fea...

    Stefan Katzenbeisser, Ünal Kocabaş in Cryptographic Hardware and Embedded System… (2012)

  16. Chapter and Conference Paper

    Recyclable PUFs: Logically Reconfigurable PUFs

    We introduce the concept of Logically Reconfigurable Physical Unclonable Functions (LR-PUFs). In contrast to classical Physically Unclonable Functions (PUFs) LR-PUFs can be dynamically ‘reconfigured’ after dep...

    Stefan Katzenbeisser, Ünal Koçabas in Cryptographic Hardware and Embedded System… (2011)

  17. Chapter and Conference Paper

    Physically Uncloneable Functions in the Universal Composition Framework

    Recently, there have been numerous works about hardwareassisted cryptographic protocols, either improving previous constructions in terms of efficiency, or in terms of security. In particular, many suggestions...

    Christina Brzuska, Marc Fischlin, Heike Schröder in Advances in Cryptology – CRYPTO 2011 (2011)

  18. Chapter and Conference Paper

    Watermark-Based Authentication and Key Exchange in Teleconferencing Systems

    In this paper we propose an architecture which combines watermarking with traditional cryptographic key agreement protocols to establish an authenticated or encrypted channel in teleconferencing systems. Techn...

    Ulrich Rührmair, Stefan Katzenbeisser in Communications and Multimedia Security (2010)

  19. Chapter and Conference Paper

    Redactable Signatures for Tree-Structured Data: Definitions and Constructions

    Kundu and Bertino (VLDB 2008) recently introduced the idea of structural signatures for trees which support public redaction of subtrees (by third-party distributors) while pertaining the integrity of the rema...

    Christina Brzuska, Heike Busch in Applied Cryptography and Network Security (2010)

  20. Chapter and Conference Paper

    Hide and Seek in Time — Robust Covert Timing Channels

    Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Previous results used encoding mechanisms...

    Yali Liu, Dipak Ghosal, Frederik Armknecht in Computer Security – ESORICS 2009 (2009)

previous disabled Page of 2