Publications

Publications

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
  • TU Darmstadt (92264)
Group by: Date | Creator(s) | Item type
Jump to: 2021 | 2020 | 2019 | 2018 | 2017 | 2016
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 79.

2021

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
k. A., Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Conference item]

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Conference item]

2020

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Conference item]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Conference item]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Conference item]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference item]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Conference item]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Conference item]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Conference item]

Grube, Tim ; Heinrich, Alexander ; Stroscher, Jan-Philipp ; Schomberg, Sabrina (2020):
Datensicherheit von Corona-Apps nach der DSGVO.
In: Datenschutz und Datensicherheit (DuD), 44 (8), S. 501-505. Springer Nature, ISSN 1862-2607,
DOI: 10.1007/s11623-020-1314-0,
[Article]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Conference item]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Simunic (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: arXiv/Computer Science/Cryptography and Security, Version 1, [Report]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Conference item]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Article]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Conference item]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Article]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Article]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Conference item]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Conference item]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Conference item]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Conference item]

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Conference item]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Conference item]

2019

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelor thesis]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference item]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Conference item]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), S. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Article]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Conference item]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Conference item]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Article]

Gedeon, Julien ; Brandherm, Florian ; Egert, Rolf ; Grube, Tim ; Mühlhäuser, Max (2019):
What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges.
In: IEEE Access, 7, S. 152847-152878. IEEE, ISSN 2169-3536,
DOI: 10.1109/ACCESS.2019.2948399,
[Article]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[PhD thesis]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Conference item]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Conference item]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
S. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Conference item]

Boukoros, Spyros ; Humbert, Mathias ; Katzenbeisser, Stefan ; Troncoso, Carmela (2019):
On (The Lack Of) Location Privacy in Crowdsourcing Applications.
USENIX Security Symposium, Santa Clara, CA, USA, August 14–16, 2019, [Conference item]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Conference item]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Conference item]

Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Conference item]

Maass, Max ; Schwär, Stephan ; Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: LNCS, In: Privacy Technologies and Policy,
Annual Privacy Forum 2019, Rome, Italy, June 7th and 8th, 2019, DOI: 10.1007/978-3-030-21752-5_2,
[Conference item]

Maass, Max ; Schwär, Stephan ; Hollick, Matthias (2019):
Towards Transparency in Email Tracking.
In: Annual Privacy Forum (LNCS), In: Proceedings of the Annual Privacy Forum 2019,
Rome, Italy, Rome, [Conference item]

Boukoros, Spyridon (2019):
Multidimensional Privacy Quantification for User Empowerment.
Darmstadt, Technische Universität,
[PhD thesis]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
43, In: Datenschutz und Datensicherheit - DuD, (5), S. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Article]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Conference item]

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
3, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), (1), ACM, DOI: 10.1145/3314397,
[Article]

Maass, Max ; Walter, Nicolas ; Herrmann, Dominik ; Hollick, Matthias (2019):
On the Difficulties of Incentivizing Online Privacy through Transparency: A Qualitative Survey of the German Health Insurance Market.
Wirtschaftsinformatik 2019, Siegen, Germany, 25-27.2.2019, [Conference item]

Grube, Tim ; Daubert, Jörg ; Mühlhäuser, Max (2019):
Asymmetric DCnets for Effective and Efficient Sender Anonymity.
Abu Dhabi, UAE, IEEE, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9-13 Dec. 2018, ISSN 25766813, ISBN 9781538647271,
DOI: 10.1109/GLOCOM.2018.8647607,
[Conference item]

Schürmann, Tim (2019):
Evaluation bayesianischer kognitiver Modelle in der Vorhersage menschlichen Verhaltens.
Darmstadt, Technische Universität,
[PhD thesis]

2018

Weiler, Michael (2018):
Measuring Real-World Tie Strength with Digital Footprint Data: An Assessment of Convergent Validity.
San Francisco, CA, USA, December 13-16, 2018, [Conference item]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[PhD thesis]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Conference item]

Daubert, Jörg ; Boopalan, Dhanasekar ; Mühlhäuser, Max ; Vasilomanolakis, Emmanouil (2018):
HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot.
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, S. 1-6,
IEEE, Taipei, Taiwan, DOI: 10.1109/NOMS.2018.8406315,
[Conference item]

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Master thesis]

Aragon, Santiago ; Tiloca, Marco ; Maass, Max ; Hollick, Matthias ; Raza, Shahid (2018):
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control.
In: 2018 IEEE Conference on Communications and Network Security (CNS), IEEE, ISSN 978-1-5386-4586-4,
DOI: 10.1109/CNS.2018.8433209,
[Article]

Weiler, Michael ; Hinz, Oliver (2018):
Without each other, we have nothing: a state-of-the-art analysis on how to operationalize social capital.
In: Review of Managerial Science, ISSN 1863-6691,
DOI: 10.1007/s11846-018-0280-5,
[Article]

Grube, Tim (2018):
Efficient Anonymous Group Communication.
Darmstadt, Technische Universität,
[PhD thesis]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
S. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Conference item]

2017

Stute, Milan ; Maass, Max ; Schons, Tom ; Hollick, Matthias (2017):
Reverse Engineering Human Mobility in Large-scale Natural Disasters.
In: Proceedings of MSWiM '17,
2. updated version, The 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Miami, FL, November 21-25, 2017, [Conference item]

Grube, Tim ; Volk, Florian ; Mühlhäuser, Max ; Bhairav, Suhas ; Sachidananda, Vinay ; Elovici, Yuval (2017):
Complexity Reduction in Graphs: A User Centric Approach to Graph Exploration.
In: 10th International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, S. 24-31,
Athens, Greece, IARIA, [Conference item]

Maass, Max (2017):
Web-Privacy: Lustwandeln im Trackergarten.
MRMCD 2017,
[Other]

Brendel, Jacqueline ; Fischlin, Marc Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, S. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Book section]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
20, In: IEEE Communications Surveys & Tutorials, (1), S. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Article]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), S. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Conference item]

Grube, Tim ; Thummerer, Markus ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Cover Traffic: A Trade of Anonymity and Efficiency.
In: Lecture Notes in Computer Science, 10547, In: Security and Trust Management. STM 2017., S. 213-223,
Oslo, Norway, Springer, 13th International Workshop on Security and Trust Management, Oslo, Norway, DOI: 10.1007/978-3-319-68063-7_15,
[Conference item]

Maass, Max ; Laubach, Anne ; Herrmann, Dominik (2017):
PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme - Konzept und rechtliche Zulässigkeit.
In: Proceedings of INFORMATIK 2017,
Leipzig, Deutschland, [Conference item]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Book]

Büscher, Niklas ; Boukoros, Spyros ; Bauregger, Stefan ; Katzenbeisser, Stefan (2017):
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering.
2017, In: Proceedings on Privacy Enhancing Technologies, S. 118–134,
De Gruyter, Minneapolis, USA, DOI: 10.1515/popets-2017-0030,
[Conference item]

Daubert, Jörg (2017):
GRK 2050: D.4 AlterEgo.
Schloß Dagstuhl, Germany, Schloß Dagstuhl, [Report]

Funke, Sebastian Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, S. 1-10,
München, DACH Security 2017, [Conference item]

Maass, Max ; Wichmann, Pascal ; Pridöhl, Henning ; Herrmann, Dominik (2017):
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites.
In: Proceedings of the Annual Privacy Forum 2017,
Springer, Annual Privacy Forum 2017, Vienna, ISBN 978-3-319-67280-9,
DOI: 10.1007/978-3-319-67280-9_10,
[Conference item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colonies for Efficient and Anonymous Group Communication Systems.
In: 2017 International Conference on Networked Systems (NetSys), S. 1-8,
Göttingen, Germany, IEEE, DOI: 10.1109/NetSys.2017.7903958,
[Conference item]

Grube, Tim ; Hauke, Sascha ; Daubert, Jörg ; Mühlhäuser, Max (2017):
Ant Colony Optimisation - A Solution to Efficient Anonymous Group Communication?
In: 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), S. 337-340,
Las Vegas, NV, USA, IEEE, Las Vegas (USA), DOI: 10.1109/CCNC.2017.7983129,
[Conference item]

Boukoros, Spyros ; Katzenbeisser, Stefan (2017):
Measuring privacy in high dimensional microdata collections.
S. 15:1-15:8, Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017, DOI: 10.1145/3098954.3098977,
[Conference item]

2016

Brendel, J. ; Demirel, D. (2016):
Efficient proactive secret sharing.
S. 543-550, 2016 14th Annual Conference on Privacy, Security and Trust (PST), DOI: 10.1109/PST.2016.7907013,
[Conference item]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), S. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Conference item]

Strohbach, Martin ; Daubert, Jörg ; Ravkin, Herman ; Lischka, Mario Curry, Edward ; Wahlster, Wolfgang (Hrsg.) (2016):
Big Data Storage.
In: New Horizons for a Data-Driven Economy - A Roadmap for Usage and Exploitation of Big Data in Europe, S. 119-141, Springer, ISBN 978-3-319-21568-6,
DOI: 10.1007/978-3-319-21569-3,
[Book section]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[PhD thesis]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
76, In: Elsevier Computer Communications (ComCom), S. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Article]

This list was generated on Mon Nov 30 02:21:54 2020 CET.