BibTeX records: Florian Kerschbaum

download as .bib file

@article{DBLP:journals/corr/abs-2402-14937,
  author       = {Lucas Fenaux and
                  Florian Kerschbaum},
  title        = {SoK: Analyzing Adversarial Examples: {A} Framework to Study Adversary
                  Knowledge},
  journal      = {CoRR},
  volume       = {abs/2402.14937},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14937},
  doi          = {10.48550/ARXIV.2402.14937},
  eprinttype    = {arXiv},
  eprint       = {2402.14937},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Sun, 24 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KerschbaumL23,
  author       = {Florian Kerschbaum and
                  Nils Lukas},
  title        = {Privacy-Preserving Machine Learning [Cryptography]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {6},
  pages        = {90--94},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2023.3315944},
  doi          = {10.1109/MSEC.2023.3315944},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KerschbaumL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmmod/MaiyyaVAAK23,
  author       = {Sujaya Maiyya and
                  Sharath Chandra Vemula and
                  Divyakant Agrawal and
                  Amr El Abbadi and
                  Florian Kerschbaum},
  title        = {Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns},
  journal      = {Proc. {ACM} Manag. Data},
  volume       = {1},
  number       = {4},
  pages        = {266:1--266:25},
  year         = {2023},
  url          = {https://doi.org/10.1145/3626760},
  doi          = {10.1145/3626760},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmmod/MaiyyaVAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FarajiK23,
  author       = {Sina Faraji and
                  Florian Kerschbaum},
  title        = {Trifecta: Faster High-Throughput Three-Party Computation over {WAN}
                  Using Multi-Fan-In Logic Gates},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {224--237},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0107},
  doi          = {10.56553/POPETS-2023-0107},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FarajiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HumphriesK23,
  author       = {Thomas Humphries and
                  Florian Kerschbaum},
  title        = {Differentially Private Simple Genetic Algorithms},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {540--558},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0124},
  doi          = {10.56553/POPETS-2023-0124},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HumphriesK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/WeiK23,
  author       = {Ruidi Wei and
                  Florian Kerschbaum},
  title        = {Cryptographically Secure Private Record Linkage Using Locality-Sensitive
                  Hashing},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {17},
  number       = {2},
  pages        = {79--91},
  year         = {2023},
  url          = {https://www.vldb.org/pvldb/vol17/p79-kerschbaum.pdf},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/WeiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KacsmarDTUK23,
  author       = {Bailey Kacsmar and
                  Vasisht Duddu and
                  Kyle Tilbury and
                  Blase Ur and
                  Florian Kerschbaum},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Comprehension from Chaos: Towards Informed Consent for Private Computation},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {210--224},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623152},
  doi          = {10.1145/3576915.3623152},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KacsmarDTUK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MahdaviNLK23,
  author       = {Rasoul Akhavan Mahdavi and
                  Haoyan Ni and
                  Dimitry Linkov and
                  Florian Kerschbaum},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled
                  Homomorphic Encryption},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2945--2958},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623095},
  doi          = {10.1145/3576915.3623095},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MahdaviNLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HumphriesOTRGHK23,
  author       = {Thomas Humphries and
                  Simon Oya and
                  Lindsey Tulloch and
                  Matthew Rafuse and
                  Ian Goldberg and
                  Urs Hengartner and
                  Florian Kerschbaum},
  title        = {Investigating Membership Inference Attacks under Data Dependencies},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {473--488},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00013},
  doi          = {10.1109/CSF57540.2023.00013},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HumphriesOTRGHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/FenauxHK23,
  author       = {Lucas Fenaux and
                  Thomas Humphries and
                  Florian Kerschbaum},
  editor       = {Sara Silva and
                  Lu{\'{\i}}s Paquete},
  title        = {Gaggle: Genetic Algorithms on the {GPU} using PyTorch},
  booktitle    = {Companion Proceedings of the Conference on Genetic and Evolutionary
                  Computation, {GECCO} 2023, Companion Volume, Lisbon, Portugal, July
                  15-19, 2023},
  pages        = {2358--2361},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583133.3596356},
  doi          = {10.1145/3583133.3596356},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/FenauxHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KerschbaumBM23,
  author       = {Florian Kerschbaum and
                  Erik{-}Oliver Blass and
                  Rasoul Akhavan Mahdavi},
  title        = {Faster Secure Comparisons with Offline Phase for Efficient Private
                  Set Intersection},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/faster-secure-comparisons-with-offline-phase-for-efficient-private-set-intersection/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/KerschbaumBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlassK23,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Private Collaborative Data Cleaning via Non-Equi {PSI}},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1419--1434},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179396},
  doi          = {10.1109/SP46215.2023.10179396},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlassK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlassK23a,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Private Collaborative Data Cleaning via Non-Equi {PSI}},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1419--1434},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179337},
  doi          = {10.1109/SP46215.2023.10179337},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlassK23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LukasK23,
  author       = {Nils Lukas and
                  Florian Kerschbaum},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{PTW:} Pivotal Tuning Watermarking for Pre-Trained Image Generators},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {2241--2258},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/lukas},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/LukasK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-09043,
  author       = {Rasoul Akhavan Mahdavi and
                  Abdulrahman Diaa and
                  Florian Kerschbaum},
  title        = {{HE} is all you need: Compressing {FHE} Ciphertexts using Additive
                  {HE}},
  journal      = {CoRR},
  volume       = {abs/2303.09043},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.09043},
  doi          = {10.48550/ARXIV.2303.09043},
  eprinttype    = {arXiv},
  eprint       = {2303.09043},
  timestamp    = {Mon, 20 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-09043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-07361,
  author       = {Nils Lukas and
                  Florian Kerschbaum},
  title        = {{PTW:} Pivotal Tuning Watermarking for Pre-Trained Image Generators},
  journal      = {CoRR},
  volume       = {abs/2304.07361},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.07361},
  doi          = {10.48550/ARXIV.2304.07361},
  eprinttype    = {arXiv},
  eprint       = {2304.07361},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-07361.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09671,
  author       = {Nils Lukas and
                  Florian Kerschbaum},
  title        = {Pick your Poison: Undetectability versus Robustness in Data Poisoning
                  Attacks against Deep Image Classification},
  journal      = {CoRR},
  volume       = {abs/2305.09671},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09671},
  doi          = {10.48550/ARXIV.2305.09671},
  eprinttype    = {arXiv},
  eprint       = {2305.09671},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09671.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08538,
  author       = {Abdulrahman Diaa and
                  Lucas Fenaux and
                  Thomas Humphries and
                  Marian Dietz and
                  Faezeh Ebrahimianghazani and
                  Bailey Kacsmar and
                  Xinda Li and
                  Nils Lukas and
                  Rasoul Akhavan Mahdavi and
                  Simon Oya and
                  Ehsan Amjadian and
                  Florian Kerschbaum},
  title        = {Fast and Private Inference of Deep Neural Networks by Co-designing
                  Activation Functions},
  journal      = {CoRR},
  volume       = {abs/2306.08538},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08538},
  doi          = {10.48550/ARXIV.2306.08538},
  eprinttype    = {arXiv},
  eprint       = {2306.08538},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08538.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10718,
  author       = {Yutong Wu and
                  Jie Zhang and
                  Florian Kerschbaum and
                  Tianwei Zhang},
  title        = {Backdooring Textual Inversion for Concept Censorship},
  journal      = {CoRR},
  volume       = {abs/2308.10718},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10718},
  doi          = {10.48550/ARXIV.2308.10718},
  eprinttype    = {arXiv},
  eprint       = {2308.10718},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14840,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Ellie Burzstein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {CoRR},
  volume       = {abs/2308.14840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14840},
  doi          = {10.48550/ARXIV.2308.14840},
  eprinttype    = {arXiv},
  eprint       = {2308.14840},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-06496,
  author       = {Rasoul Akhavan Mahdavi and
                  Haoyan Ni and
                  Dimitry Linkov and
                  Florian Kerschbaum},
  title        = {Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled
                  Homomorphic Encryption},
  journal      = {CoRR},
  volume       = {abs/2309.06496},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.06496},
  doi          = {10.48550/ARXIV.2309.06496},
  eprinttype    = {arXiv},
  eprint       = {2309.06496},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-06496.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-16952,
  author       = {Nils Lukas and
                  Abdulrahman Diaa and
                  Lucas Fenaux and
                  Florian Kerschbaum},
  title        = {Leveraging Optimization for Adaptive Attacks on Image Watermarks},
  journal      = {CoRR},
  volume       = {abs/2309.16952},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.16952},
  doi          = {10.48550/ARXIV.2309.16952},
  eprinttype    = {arXiv},
  eprint       = {2309.16952},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-16952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11548,
  author       = {Shubhankar Mohapatra and
                  Jianqiao Zong and
                  Florian Kerschbaum and
                  Xi He},
  title        = {Differentially Private Data Generation with Missing Data},
  journal      = {CoRR},
  volume       = {abs/2310.11548},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11548},
  doi          = {10.48550/ARXIV.2310.11548},
  eprinttype    = {arXiv},
  eprint       = {2310.11548},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11548.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-14565,
  author       = {Rasoul Akhavan Mahdavi and
                  Nils Lukas and
                  Faezeh Ebrahimianghazani and
                  Thomas Humphries and
                  Bailey Kacsmar and
                  John A. Premkumar and
                  Xinda Li and
                  Simon Oya and
                  Ehsan Amjadian and
                  Florian Kerschbaum},
  title        = {{PEPSI:} Practically Efficient Private Set Intersection in the Unbalanced
                  Setting},
  journal      = {CoRR},
  volume       = {abs/2310.14565},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.14565},
  doi          = {10.48550/ARXIV.2310.14565},
  eprinttype    = {arXiv},
  eprint       = {2310.14565},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-14565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00157,
  author       = {Benjamin Schneider and
                  Nils Lukas and
                  Florian Kerschbaum},
  title        = {Universal Backdoor Attacks},
  journal      = {CoRR},
  volume       = {abs/2312.00157},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00157},
  doi          = {10.48550/ARXIV.2312.00157},
  eprinttype    = {arXiv},
  eprint       = {2312.00157},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00157.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaiyyaVAAK23,
  author       = {Sujaya Maiyya and
                  Sharath Chandra Vemula and
                  Divyakant Agrawal and
                  Amr El Abbadi and
                  Florian Kerschbaum},
  title        = {Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1285},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1285},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MaiyyaVAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KerschbaumM22,
  author       = {Florian Kerschbaum and
                  Michelle L. Mazurek},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0001},
  doi          = {10.2478/POPETS-2022-0001},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KerschbaumM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KerschbaumM22a,
  author       = {Florian Kerschbaum and
                  Michelle L. Mazurek},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {2},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0032},
  doi          = {10.2478/POPETS-2022-0032},
  timestamp    = {Sat, 12 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KerschbaumM22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KerschbaumM22b,
  author       = {Florian Kerschbaum and
                  Michelle L. Mazurek},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0059},
  doi          = {10.56553/POPETS-2022-0059},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KerschbaumM22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KerschbaumM22c,
  author       = {Florian Kerschbaum and
                  Michelle L. Mazurek},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {1--5},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0095},
  doi          = {10.56553/POPETS-2022-0095},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KerschbaumM22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FischerFKJKB22,
  author       = {Andreas Fischer and
                  Benny Fuhry and
                  J{\"{o}}rn Ku{\ss}maul and
                  Jonas Janneck and
                  Florian Kerschbaum and
                  Eric Bodden},
  title        = {Computation on Encrypted Data Using Dataflow Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {21:1--21:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3513005},
  doi          = {10.1145/3513005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FischerFKJKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BlassKM22,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum and
                  Travis Mayberry},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Iterative Oblivious Pseudo-Random Functions and Applications},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {28--41},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517403},
  doi          = {10.1145/3488932.3517403},
  timestamp    = {Tue, 24 May 2022 13:40:31 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BlassKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HumphriesMVK22,
  author       = {Thomas Humphries and
                  Rasoul Akhavan Mahdavi and
                  Shannon Veitch and
                  Florian Kerschbaum},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Selective {MPC:} Distributed Computation of Differentially Private
                  Key-Value Statistics},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1459--1472},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560559},
  doi          = {10.1145/3548606.3560559},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HumphriesMVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BernauRK22,
  author       = {Daniel Bernau and
                  Jonas Robl and
                  Florian Kerschbaum},
  editor       = {Shamik Sural and
                  Haibing Lu},
  title        = {Assessing Differentially Private Variational Autoencoders Under Membership
                  Inference},
  booktitle    = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13383},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10684-2\_1},
  doi          = {10.1007/978-3-031-10684-2\_1},
  timestamp    = {Thu, 14 Jul 2022 17:34:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BernauRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlassK22,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Mixed-Technique Multi-Party Computations Composed of Two-Party Computations},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {295--319},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_15},
  doi          = {10.1007/978-3-031-17143-7\_15},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlassK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/ShafieinejadGLK22,
  author       = {Masoumeh Shafieinejad and
                  Suraj Gupta and
                  Jin Yang Liu and
                  Koray Karabina and
                  Florian Kerschbaum},
  title        = {Equi-Joins over Encrypted Data for Series of Queries},
  booktitle    = {38th {IEEE} International Conference on Data Engineering, {ICDE} 2022,
                  Kuala Lumpur, Malaysia, May 9-12, 2022},
  pages        = {1635--1648},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDE53745.2022.00168},
  doi          = {10.1109/ICDE53745.2022.00168},
  timestamp    = {Fri, 05 Aug 2022 16:24:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/ShafieinejadGLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/naacl/MatternWK22,
  author       = {Justus Mattern and
                  Benjamin Weggenmann and
                  Florian Kerschbaum},
  editor       = {Marine Carpuat and
                  Marie{-}Catherine de Marneffe and
                  Iv{\'{a}}n Vladimir Meza Ru{\'{\i}}z},
  title        = {The Limits of Word Level Differential Privacy},
  booktitle    = {Findings of the Association for Computational Linguistics: {NAACL}
                  2022, Seattle, WA, United States, July 10-15, 2022},
  pages        = {867--881},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-naacl.65},
  doi          = {10.18653/V1/2022.FINDINGS-NAACL.65},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/naacl/MatternWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LukasJLK22,
  author       = {Nils Lukas and
                  Edward Jiang and
                  Xinda Li and
                  Florian Kerschbaum},
  title        = {SoK: How Robust is Image Classification Deep Neural Network Watermarking?},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {787--804},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833693},
  doi          = {10.1109/SP46214.2022.9833693},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LukasJLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KacsmarTMK22,
  author       = {Bailey Kacsmar and
                  Kyle Tilbury and
                  Miti Mazmudar and
                  Florian Kerschbaum},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Caring about Sharing: User Perceptions of Multiparty Data Sharing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {899--916},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/kacsmar},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/KacsmarTMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MahdaviK22,
  author       = {Rasoul Akhavan Mahdavi and
                  Florian Kerschbaum},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Constant-weight {PIR:} Single-round Keyword {PIR} via Constant-weight
                  Equality Operators},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1723--1740},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/mahdavi},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MahdaviK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OyaK22,
  author       = {Simon Oya and
                  Florian Kerschbaum},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{IHOP:} Improved Statistical Query Recovery against Searchable Symmetric
                  Encryption through Quadratic Optimization},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {2407--2424},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/oya},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OyaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WeggenmannRAMK22,
  author       = {Benjamin Weggenmann and
                  Valentin Rublack and
                  Michael Andrejczuk and
                  Justus Mattern and
                  Florian Kerschbaum},
  editor       = {Fr{\'{e}}d{\'{e}}rique Laforest and
                  Rapha{\"{e}}l Troncy and
                  Elena Simperl and
                  Deepak Agarwal and
                  Aristides Gionis and
                  Ivan Herman and
                  Lionel M{\'{e}}dini},
  title        = {{DP-VAE:} Human-Readable Text Anonymization for Online Reviews with
                  Differentially Private Variational Autoencoders},
  booktitle    = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France,
                  April 25 - 29, 2022},
  pages        = {721--731},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485447.3512232},
  doi          = {10.1145/3485447.3512232},
  timestamp    = {Thu, 23 Jun 2022 19:54:34 +0200},
  biburl       = {https://dblp.org/rec/conf/www/WeggenmannRAMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-07569,
  author       = {Rasoul Akhavan Mahdavi and
                  Florian Kerschbaum},
  title        = {Constant-weight {PIR:} Single-round Keyword {PIR} via Constant-weight
                  Equality Operators},
  journal      = {CoRR},
  volume       = {abs/2202.07569},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.07569},
  eprinttype    = {arXiv},
  eprint       = {2202.07569},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-07569.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-07877,
  author       = {Daniel Bernau and
                  Jonas Robl and
                  Florian Kerschbaum},
  title        = {Assessing Differentially Private Variational Autoencoders under Membership
                  Inference},
  journal      = {CoRR},
  volume       = {abs/2204.07877},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.07877},
  doi          = {10.48550/ARXIV.2204.07877},
  eprinttype    = {arXiv},
  eprint       = {2204.07877},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-07877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-02130,
  author       = {Justus Mattern and
                  Benjamin Weggenmann and
                  Florian Kerschbaum},
  title        = {The Limits of Word Level Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2205.02130},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.02130},
  doi          = {10.48550/ARXIV.2205.02130},
  eprinttype    = {arXiv},
  eprint       = {2205.02130},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-02130.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-13913,
  author       = {Florian Kerschbaum and
                  Erik{-}Oliver Blass and
                  Rasoul Akhavan Mahdavi},
  title        = {Faster Secure Comparisons with Offline Phase for Efficient Private
                  Set Intersection},
  journal      = {CoRR},
  volume       = {abs/2209.13913},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.13913},
  doi          = {10.48550/ARXIV.2209.13913},
  eprinttype    = {arXiv},
  eprint       = {2209.13913},
  timestamp    = {Thu, 06 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-13913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-07026,
  author       = {Bailey Kacsmar and
                  Vasisht Duddu and
                  Kyle Tilbury and
                  Blase Ur and
                  Florian Kerschbaum},
  title        = {Comprehension from Chaos: What Users Understand and Expect from Private
                  Computation},
  journal      = {CoRR},
  volume       = {abs/2211.07026},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.07026},
  doi          = {10.48550/ARXIV.2211.07026},
  eprinttype    = {arXiv},
  eprint       = {2211.07026},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-07026.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-10752,
  author       = {Yihan Wu and
                  Xinda Li and
                  Florian Kerschbaum and
                  Heng Huang and
                  Hongyang Zhang},
  title        = {Towards Robust Dataset Learning},
  journal      = {CoRR},
  volume       = {abs/2211.10752},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.10752},
  doi          = {10.48550/ARXIV.2211.10752},
  eprinttype    = {arXiv},
  eprint       = {2211.10752},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-10752.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK22,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Private Collaborative Data Cleaning via Non-Equi {PSI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1465},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1465},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JohnsonK21,
  author       = {Aaron Johnson and
                  Florian Kerschbaum},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {1--4},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0001},
  doi          = {10.2478/POPETS-2021-0001},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JohnsonK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JohnsonK21a,
  author       = {Aaron Johnson and
                  Florian Kerschbaum},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {2},
  pages        = {1--4},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0014},
  doi          = {10.2478/POPETS-2021-0014},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JohnsonK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JohnsonK21b,
  author       = {Aaron Johnson and
                  Florian Kerschbaum},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {3},
  pages        = {1--4},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0034},
  doi          = {10.2478/POPETS-2021-0034},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JohnsonK21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JohnsonK21c,
  author       = {Aaron Johnson and
                  Florian Kerschbaum},
  title        = {Editors' Introduction},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {4},
  pages        = {1--5},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0057},
  doi          = {10.2478/POPETS-2021-0057},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JohnsonK21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/BernauEGKK21,
  author       = {Daniel Bernau and
                  G{\"{u}}nther Eibl and
                  Philip{-}William Grassal and
                  Hannah Keller and
                  Florian Kerschbaum},
  title        = {Quantifying identifiability to choose and audit epsilon in differentially
                  private deep learning},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {14},
  number       = {13},
  pages        = {3335--3347},
  year         = {2021},
  url          = {http://www.vldb.org/pvldb/vol14/p3335-bernau.pdf},
  doi          = {10.14778/3484224.3484231},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/BernauEGKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/SepehriK21,
  author       = {Maryam Sepehri and
                  Florian Kerschbaum},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Low-Cost Hiding of the Query Pattern},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {593--603},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3453103},
  doi          = {10.1145/3433210.3453103},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/SepehriK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeggenmannK21,
  author       = {Benjamin Weggenmann and
                  Florian Kerschbaum},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Differential Privacy for Directional Data},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1205--1222},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484734},
  doi          = {10.1145/3460120.3484734},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WeggenmannK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BohlerK21,
  author       = {Jonas B{\"{o}}hler and
                  Florian Kerschbaum},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Secure Multi-party Computation of Differentially Private Heavy Hitters},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2361--2377},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484557},
  doi          = {10.1145/3460120.3484557},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BohlerK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BernauRGSK21,
  author       = {Daniel Bernau and
                  Jonas Robl and
                  Philip{-}William Grassal and
                  Steffen Schneider and
                  Florian Kerschbaum},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Comparing Local and Central Differential Privacy Using Membership
                  Inference Attacks},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_2},
  doi          = {10.1007/978-3-030-81242-3\_2},
  timestamp    = {Fri, 25 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BernauRGSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/FuhryAK21,
  author       = {Benny Fuhry and
                  Jayanth Jain H. A and
                  Florian Kerschbaum},
  title        = {EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database
                  Using Enclaves},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {438--450},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00054},
  doi          = {10.1109/DSN48987.2021.00054},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/FuhryAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NgoMKW21,
  author       = {Chan Nam Ngo and
                  Fabio Massacci and
                  Florian Kerschbaum and
                  Julian Williams},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial
                  Trading},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {579--598},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_30},
  doi          = {10.1007/978-3-662-64331-0\_30},
  timestamp    = {Thu, 16 Mar 2023 14:52:53 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/NgoMKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/LukasZK21,
  author       = {Nils Lukas and
                  Yuxuan Zhang and
                  Florian Kerschbaum},
  title        = {Deep Neural Network Fingerprinting by Conferrable Adversarial Examples},
  booktitle    = {9th International Conference on Learning Representations, {ICLR} 2021,
                  Virtual Event, Austria, May 3-7, 2021},
  publisher    = {OpenReview.net},
  year         = {2021},
  url          = {https://openreview.net/forum?id=VqzVhqxkjH1},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iclr/LukasZK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ShafieinejadLWL21,
  author       = {Masoumeh Shafieinejad and
                  Nils Lukas and
                  Jiaqi Wang and
                  Xinda Li and
                  Florian Kerschbaum},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {On the Robustness of Backdoor-based Watermarking in Deep Neural Networks},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {177--188},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460401},
  doi          = {10.1145/3437880.3460401},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ShafieinejadLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShangOPK21,
  author       = {Zhiwei Shang and
                  Simon Oya and
                  Andreas Peter and
                  Florian Kerschbaum},
  title        = {Obfuscated Access and Search Patterns in Searchable Encryption},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/obfuscated-access-and-search-patterns-in-searchable-encryption/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ShangOPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/ShafieinejadKI21,
  author       = {Masoumeh Shafieinejad and
                  Florian Kerschbaum and
                  Ihab F. Ilyas},
  editor       = {Guoliang Li and
                  Zhanhuai Li and
                  Stratos Idreos and
                  Divesh Srivastava},
  title        = {{PCOR:} Private Contextual Outlier Release via Differentially Private
                  Search},
  booktitle    = {{SIGMOD} '21: International Conference on Management of Data, Virtual
                  Event, China, June 20-25, 2021},
  pages        = {1571--1583},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448016.3452812},
  doi          = {10.1145/3448016.3452812},
  timestamp    = {Mon, 21 Jun 2021 11:48:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/ShafieinejadKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/Kerschbaum21,
  author       = {Florian Kerschbaum},
  title        = {Towards Privacy in Deep Learning},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {279--280},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00031},
  doi          = {10.1109/TPSISA52974.2021.00031},
  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/Kerschbaum21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OyaK21,
  author       = {Simon Oya and
                  Florian Kerschbaum},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern
                  Leakage in Searchable Encryption},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {127--142},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/oya},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OyaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/0006K21,
  author       = {Tianhao Wang and
                  Florian Kerschbaum},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {{RIGA:} Covert and Robust White-Box Watermarking of Deep Neural Networks},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {993--1004},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450000},
  doi          = {10.1145/3442381.3450000},
  timestamp    = {Mon, 07 Jun 2021 12:37:30 +0200},
  biburl       = {https://dblp.org/rec/conf/www/0006K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-09651,
  author       = {Zhiwei Shang and
                  Simon Oya and
                  Andreas Peter and
                  Florian Kerschbaum},
  title        = {Obfuscated Access and Search Patterns in Searchable Encryption},
  journal      = {CoRR},
  volume       = {abs/2102.09651},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.09651},
  eprinttype    = {arXiv},
  eprint       = {2102.09651},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-09651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-02913,
  author       = {Daniel Bernau and
                  G{\"{u}}nther Eibl and
                  Philip{-}William Grassal and
                  Hannah Keller and
                  Florian Kerschbaum},
  title        = {Quantifying identifiability to choose and audit {\(\epsilon\)} in
                  differentially private deep learning},
  journal      = {CoRR},
  volume       = {abs/2103.02913},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.02913},
  eprinttype    = {arXiv},
  eprint       = {2103.02913},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-02913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05173,
  author       = {Masoumeh Shafieinejad and
                  Florian Kerschbaum and
                  Ihab F. Ilyas},
  title        = {{PCOR:} Private Contextual Outlier Release via Differentially Private
                  Search},
  journal      = {CoRR},
  volume       = {abs/2103.05173},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05173},
  eprinttype    = {arXiv},
  eprint       = {2103.05173},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05173.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-05792,
  author       = {Masoumeh Shafieinejad and
                  Suraj Gupta and
                  Jin Yang Liu and
                  Koray Karabina and
                  Florian Kerschbaum},
  title        = {Equi-Joins Over Encrypted Data for Series of Queries},
  journal      = {CoRR},
  volume       = {abs/2103.05792},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.05792},
  eprinttype    = {arXiv},
  eprint       = {2103.05792},
  timestamp    = {Tue, 16 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-05792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-12407,
  author       = {Thomas Humphries and
                  Rasoul Akhavan Mahdavi and
                  Shannon Veitch and
                  Florian Kerschbaum},
  title        = {Selective {MPC:} Distributed Computation of Differentially Private
                  Key Value Statistics},
  journal      = {CoRR},
  volume       = {abs/2107.12407},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.12407},
  eprinttype    = {arXiv},
  eprint       = {2107.12407},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-12407.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-04974,
  author       = {Nils Lukas and
                  Edward Jiang and
                  Xinda Li and
                  Florian Kerschbaum},
  title        = {SoK: How Robust is Image Classification Deep Neural Network Watermarking?
                  (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2108.04974},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.04974},
  eprinttype    = {arXiv},
  eprint       = {2108.04974},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-04974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-04180,
  author       = {Simon Oya and
                  Florian Kerschbaum},
  title        = {{IHOP:} Improved Statistical Query Recovery against Searchable Symmetric
                  Encryption through Quadratic Optimization},
  journal      = {CoRR},
  volume       = {abs/2110.04180},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.04180},
  eprinttype    = {arXiv},
  eprint       = {2110.04180},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-04180.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-05524,
  author       = {Jiaxiang Liu and
                  Simon Oya and
                  Florian Kerschbaum},
  title        = {Generalization Techniques Empirically Outperform Differential Privacy
                  against Membership Inference},
  journal      = {CoRR},
  volume       = {abs/2110.05524},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.05524},
  eprinttype    = {arXiv},
  eprint       = {2110.05524},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05524.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassKM21,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum and
                  Travis Mayberry},
  title        = {Iterative Oblivious Pseudo-Random Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1013},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/0011FKB20,
  author       = {Andreas Fischer and
                  Benny Fuhry and
                  Florian Kerschbaum and
                  Eric Bodden},
  title        = {Computation on Encrypted Data using Dataflow Authentication},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {1},
  pages        = {5--25},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0002},
  doi          = {10.2478/POPETS-2020-0002},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/0011FKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KacsmarKKG20,
  author       = {Bailey Kacsmar and
                  Chelsea Komlo and
                  Florian Kerschbaum and
                  Ian Goldberg},
  title        = {Mind the Gap: Ceremonies for Applied Secret Sharing},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {2},
  pages        = {397--415},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0033},
  doi          = {10.2478/POPETS-2020-0033},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KacsmarKKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/KrastnikovKS20,
  author       = {Simeon Krastnikov and
                  Florian Kerschbaum and
                  Douglas Stebila},
  title        = {Efficient Oblivious Database Joins},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {13},
  number       = {11},
  pages        = {2132--2145},
  year         = {2020},
  url          = {http://www.vldb.org/pvldb/vol13/p2132-krastnikov.pdf},
  timestamp    = {Mon, 17 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/KrastnikovKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MahdaviHKKLPSOK20,
  author       = {Rasoul Akhavan Mahdavi and
                  Thomas Humphries and
                  Bailey Kacsmar and
                  Simeon Krastnikov and
                  Nils Lukas and
                  John A. Premkumar and
                  Masoumeh Shafieinejad and
                  Simon Oya and
                  Florian Kerschbaum and
                  Erik{-}Oliver Blass},
  title        = {Practical Over-Threshold Multi-Party Private Set Intersection},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {772--783},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427267},
  doi          = {10.1145/3427228.3427267},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MahdaviHKKLPSOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TuenoK20,
  author       = {Anselme Tueno and
                  Florian Kerschbaum},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Efficient Secure Computation of Order-Preserving Encryption},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {193--207},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384739},
  doi          = {10.1145/3320269.3384739},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TuenoK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlassK20,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{BOREALIS:} Building Block for Sealed Bid Auctions on Blockchains},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {558--571},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384752},
  doi          = {10.1145/3320269.3384752},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlassK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/0011JKKKB20,
  author       = {Andreas Fischer and
                  Jonas Janneck and
                  J{\"{o}}rn Kussmaul and
                  Nikolas Kr{\"{a}}tzschmar and
                  Florian Kerschbaum and
                  Eric Bodden},
  title        = {{PASAPTO:} Policy-aware Security and Performance Trade-off Analysis-Computation
                  on Encrypted Data with Restricted Leakage},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {230--245},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00024},
  doi          = {10.1109/CSF49147.2020.00024},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/0011JKKKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/TuenoBK20,
  author       = {Anselme Tueno and
                  Yordan Boev and
                  Florian Kerschbaum},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Non-interactive Private Decision Tree Evaluation},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {174--194},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_10},
  doi          = {10.1007/978-3-030-49669-2\_10},
  timestamp    = {Thu, 18 Jun 2020 13:44:27 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/TuenoBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/FuhryHKK20,
  author       = {Benny Fuhry and
                  Lina Hirschoff and
                  Samuel Koesnadi and
                  Florian Kerschbaum},
  title        = {SeGShare: Secure Group File Sharing in the Cloud using Enclaves},
  booktitle    = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020},
  pages        = {476--488},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSN48063.2020.00061},
  doi          = {10.1109/DSN48063.2020.00061},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/FuhryHKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KacsmarKLNSSBSO20,
  author       = {Bailey Kacsmar and
                  Basit Khurram and
                  Nils Lukas and
                  Alexander Norton and
                  Masoumeh Shafieinejad and
                  Zhiwei Shang and
                  Yaser Baseri and
                  Maryam Sepehri and
                  Simon Oya and
                  Florian Kerschbaum},
  title        = {Differentially Private Two-Party Set Operations},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {390--404},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00032},
  doi          = {10.1109/EUROSP48549.2020.00032},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/KacsmarKLNSSBSO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuenoK0BQ20,
  author       = {Anselme Tueno and
                  Florian Kerschbaum and
                  Stefan Katzenbeisser and
                  Yordan Boev and
                  Mubashir Qureshi},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Secure Computation of the k\({}^{\mbox{th}}\)-Ranked Element in a
                  Star Network},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {386--403},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_21},
  doi          = {10.1007/978-3-030-51280-4\_21},
  timestamp    = {Wed, 22 Jul 2020 12:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TuenoK0BQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/KhurramK20,
  author       = {Basit Khurram and
                  Florian Kerschbaum},
  title        = {SFour: {A} Protocol for Cryptographically Secure Record Linkage at
                  Scale},
  booktitle    = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020,
                  Dallas, TX, USA, April 20-24, 2020},
  pages        = {277--288},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDE48307.2020.00031},
  doi          = {10.1109/ICDE48307.2020.00031},
  timestamp    = {Fri, 05 Jun 2020 17:54:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/KhurramK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BohlerK20,
  author       = {Jonas B{\"{o}}hler and
                  Florian Kerschbaum},
  title        = {Secure Sublinear Time Differentially Private Median Computation},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/secure-sublinear-time-differentially-private-median-computation/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BohlerK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/Hackenjos0K20,
  author       = {Timon Hackenjos and
                  Florian Hahn and
                  Florian Kerschbaum},
  editor       = {David Maier and
                  Rachel Pottinger and
                  AnHai Doan and
                  Wang{-}Chiew Tan and
                  Abdussalam Alawini and
                  Hung Q. Ngo},
  title        = {{SAGMA:} Secure Aggregation Grouped by Multiple Attributes},
  booktitle    = {Proceedings of the 2020 International Conference on Management of
                  Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA],
                  June 14-19, 2020},
  pages        = {587--601},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3318464.3380569},
  doi          = {10.1145/3318464.3380569},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/Hackenjos0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BohlerK20,
  author       = {Jonas B{\"{o}}hler and
                  Florian Kerschbaum},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Secure Multi-party Computation of Differentially Private Median},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2147--2164},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/boehler},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BohlerK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05097,
  author       = {Benny Fuhry and
                  Jayanth Jain H. A and
                  Florian Kerschbaum},
  title        = {EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database
                  using Enclaves},
  journal      = {CoRR},
  volume       = {abs/2002.05097},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.05097},
  eprinttype    = {arXiv},
  eprint       = {2002.05097},
  timestamp    = {Fri, 14 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-05097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-09481,
  author       = {Simeon Krastnikov and
                  Florian Kerschbaum and
                  Douglas Stebila},
  title        = {Efficient Oblivious Database Joins},
  journal      = {CoRR},
  volume       = {abs/2003.09481},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.09481},
  eprinttype    = {arXiv},
  eprint       = {2003.09481},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-09481.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-03465,
  author       = {Simon Oya and
                  Florian Kerschbaum},
  title        = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern
                  Leakage in Searchable Encryption},
  journal      = {CoRR},
  volume       = {abs/2010.03465},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.03465},
  eprinttype    = {arXiv},
  eprint       = {2010.03465},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-03465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12112,
  author       = {Thomas Humphries and
                  Matthew Rafuse and
                  Lindsey Tulloch and
                  Simon Oya and
                  Ian Goldberg and
                  Florian Kerschbaum},
  title        = {Differentially Private Learning Does Not Bound Membership Inference},
  journal      = {CoRR},
  volume       = {abs/2010.12112},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12112},
  eprinttype    = {arXiv},
  eprint       = {2010.12112},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12112.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK20,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/636},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/TuenoKK19,
  author       = {Anselme Tueno and
                  Florian Kerschbaum and
                  Stefan Katzenbeisser},
  title        = {Private Evaluation of Decision Trees using Sublinear Cost},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {1},
  pages        = {266--286},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0015},
  doi          = {10.2478/POPETS-2019-0015},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/TuenoKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/0002IK19,
  author       = {Chang Ge and
                  Ihab F. Ilyas and
                  Florian Kerschbaum},
  title        = {Secure Multi-Party Functional Dependency Discovery},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {13},
  number       = {2},
  pages        = {184--196},
  year         = {2019},
  url          = {http://www.vldb.org/pvldb/vol13/p184-ge.pdf},
  doi          = {10.14778/3364324.3364332},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/0002IK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KerschbaumT19,
  author       = {Florian Kerschbaum and
                  Anselme Tueno},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {An Efficiently Searchable Encrypted Data Structure for Range Queries},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {344--364},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_17},
  doi          = {10.1007/978-3-030-29962-0\_17},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KerschbaumT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WangK19,
  author       = {Tianhao Wang and
                  Florian Kerschbaum},
  title        = {Attacks on Digital Watermarks for Deep Neural Networks},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019},
  pages        = {2622--2626},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICASSP.2019.8682202},
  doi          = {10.1109/ICASSP.2019.8682202},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/WangK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/0001LK19,
  author       = {Florian Hahn and
                  Nicolas Loza and
                  Florian Kerschbaum},
  title        = {Joins Over Encrypted Data with Fine Granular Security},
  booktitle    = {35th {IEEE} International Conference on Data Engineering, {ICDE} 2019,
                  Macao, China, April 8-11, 2019},
  pages        = {674--685},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDE.2019.00066},
  doi          = {10.1109/ICDE.2019.00066},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/0001LK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2019,
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://dl.acm.org/citation.cfm?id=3322431},
  isbn         = {978-1-4503-6753-0},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-07745,
  author       = {Masoumeh Shafieinejad and
                  Jiaqi Wang and
                  Nils Lukas and
                  Florian Kerschbaum},
  title        = {On the Robustness of the Backdoor-based Watermarking in Deep Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1906.07745},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.07745},
  eprinttype    = {arXiv},
  eprint       = {1906.07745},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-07745.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-08347,
  author       = {Anselme Tueno and
                  Florian Kerschbaum and
                  Stefan Katzenbeisser and
                  Yordan Boev and
                  Mubashir Qureshi},
  title        = {Secure Computation of the kth-Ranked Element in a Star Network},
  journal      = {CoRR},
  volume       = {abs/1909.08347},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.08347},
  eprinttype    = {arXiv},
  eprint       = {1909.08347},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-08347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-08362,
  author       = {Anselme Tueno and
                  Yordan Boev and
                  Florian Kerschbaum},
  title        = {Non-Interactive Private Decision Tree Evaluation},
  journal      = {CoRR},
  volume       = {abs/1909.08362},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.08362},
  eprinttype    = {arXiv},
  eprint       = {1909.08362},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-08362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-14268,
  author       = {Tianhao Wang and
                  Florian Kerschbaum},
  title        = {Robust and Undetectable White-Box Watermarks for Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1910.14268},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.14268},
  eprinttype    = {arXiv},
  eprint       = {1910.14268},
  timestamp    = {Mon, 04 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-14268.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-00888,
  author       = {Nils Lukas and
                  Yuxuan Zhang and
                  Florian Kerschbaum},
  title        = {Deep Neural Network Fingerprinting by Conferrable Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1912.00888},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.00888},
  eprinttype    = {arXiv},
  eprint       = {1912.00888},
  timestamp    = {Mon, 14 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-00888.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-11328,
  author       = {Daniel Bernau and
                  Philip{-}William Grassal and
                  Jonas Robl and
                  Florian Kerschbaum},
  title        = {Assessing differentially private deep learning with Membership Inference},
  journal      = {CoRR},
  volume       = {abs/1912.11328},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.11328},
  eprinttype    = {arXiv},
  eprint       = {1912.11328},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-11328.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK19,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Secure Computation of the k\({}^{\mbox{th}}\)-ranked Integer on Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FuhryBBHKS18,
  author       = {Benny Fuhry and
                  Raad Bahmani and
                  Ferdinand Brasser and
                  Florian Hahn and
                  Florian Kerschbaum and
                  Ahmad{-}Reza Sadeghi},
  title        = {HardIDX: Practical and secure index with {SGX} in a malicious environment},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {677--706},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171103},
  doi          = {10.3233/JCS-171103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FuhryBBHKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/KarnouskosK18,
  author       = {Stamatis Karnouskos and
                  Florian Kerschbaum},
  title        = {Privacy and Integrity Considerations in Hyperconnected Autonomous
                  Vehicles},
  journal      = {Proc. {IEEE}},
  volume       = {106},
  number       = {1},
  pages        = {160--170},
  year         = {2018},
  url          = {https://doi.org/10.1109/JPROC.2017.2725339},
  doi          = {10.1109/JPROC.2017.2725339},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/KarnouskosK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlassK18,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Strain: {A} Secure Auction for Blockchains},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {87--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_5},
  doi          = {10.1007/978-3-319-99073-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlassK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/WeggenmannK18,
  author       = {Benjamin Weggenmann and
                  Florian Kerschbaum},
  editor       = {Kevyn Collins{-}Thompson and
                  Qiaozhu Mei and
                  Brian D. Davison and
                  Yiqun Liu and
                  Emine Yilmaz},
  title        = {SynTF: Synthetic and Differentially Private Term Frequency Vectors
                  for Privacy-Preserving Text Mining},
  booktitle    = {The 41st International {ACM} {SIGIR} Conference on Research {\&}
                  Development in Information Retrieval, {SIGIR} 2018, Ann Arbor, MI,
                  USA, July 08-12, 2018},
  pages        = {305--314},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3209978.3210008},
  doi          = {10.1145/3209978.3210008},
  timestamp    = {Wed, 16 Sep 2020 13:34:22 +0200},
  biburl       = {https://dblp.org/rec/conf/sigir/WeggenmannK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/0001LK18,
  author       = {Florian Hahn and
                  Nicolas Loza and
                  Florian Kerschbaum},
  editor       = {Gautam Das and
                  Christopher M. Jermaine and
                  Philip A. Bernstein},
  title        = {Practical and Secure Substring Search},
  booktitle    = {Proceedings of the 2018 International Conference on Management of
                  Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018},
  pages        = {163--176},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183713.3183754},
  doi          = {10.1145/3183713.3183754},
  timestamp    = {Wed, 21 Nov 2018 12:44:08 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/0001LK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2018,
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6},
  doi          = {10.1007/978-3-319-95729-6},
  isbn         = {978-3-319-95728-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-01138,
  author       = {Anselme Tueno and
                  Florian Kerschbaum},
  title        = {Secure Range Queries for Multiple Users},
  journal      = {CoRR},
  volume       = {abs/1802.01138},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.01138},
  eprinttype    = {arXiv},
  eprint       = {1802.01138},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-01138.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00904,
  author       = {Benjamin Weggenmann and
                  Florian Kerschbaum},
  title        = {SynTF: Synthetic and Differentially Private Term Frequency Vectors
                  for Privacy-Preserving Text Mining},
  journal      = {CoRR},
  volume       = {abs/1805.00904},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.00904},
  eprinttype    = {arXiv},
  eprint       = {1805.00904},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-00904.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuenoKBF17,
  author       = {Anselme Tueno and
                  Florian Kerschbaum and
                  Daniel Bernau and
                  Sara Foresti},
  title        = {Selective access for supply chain management in the cloud},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {476--482},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228710},
  doi          = {10.1109/CNS.2017.8228710},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TuenoKBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BohlerBK17,
  author       = {Jonas B{\"{o}}hler and
                  Daniel Bernau and
                  Florian Kerschbaum},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Privacy-Preserving Outlier Detection for Data Streams},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {225--238},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_12},
  doi          = {10.1007/978-3-319-61176-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BohlerBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumH17,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Searchable Encryption to Reduce Encryption Degradation in Adjustably
                  Encrypted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {325--336},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_18},
  doi          = {10.1007/978-3-319-61176-1\_18},
  timestamp    = {Mon, 10 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KerschbaumH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FuhryBB0KS17,
  author       = {Benny Fuhry and
                  Raad Bahmani and
                  Ferdinand Brasser and
                  Florian Hahn and
                  Florian Kerschbaum and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {HardIDX: Practical and Secure Index with {SGX}},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {386--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_22},
  doi          = {10.1007/978-3-319-61176-1\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FuhryBB0KS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FuhryBB0KS17,
  author       = {Benny Fuhry and
                  Raad Bahmani and
                  Ferdinand Brasser and
                  Florian Hahn and
                  Florian Kerschbaum and
                  Ahmad{-}Reza Sadeghi},
  title        = {HardIDX: Practical and Secure Index with {SGX}},
  journal      = {CoRR},
  volume       = {abs/1703.04583},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.04583},
  eprinttype    = {arXiv},
  eprint       = {1703.04583},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FuhryBB0KS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-09314,
  author       = {Florian Kerschbaum and
                  Anselme Tueno},
  title        = {An Efficiently Searchable Encrypted Data Structure for Range Queries},
  journal      = {CoRR},
  volume       = {abs/1709.09314},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.09314},
  eprinttype    = {arXiv},
  eprint       = {1709.09314},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-09314.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00390,
  author       = {Andreas Fischer and
                  Benny Fuhry and
                  Florian Kerschbaum and
                  Eric Bodden},
  title        = {Computation on Encrypted Data using Data Flow Authentication},
  journal      = {CoRR},
  volume       = {abs/1710.00390},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.00390},
  eprinttype    = {arXiv},
  eprint       = {1710.00390},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-00390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK17,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Strain: {A} Secure Auction for Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HahnK16,
  author       = {Florian Hahn and
                  Florian Kerschbaum},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996437},
  doi          = {10.1145/2996429.2996437},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HahnK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FuhryTK16,
  author       = {Benny Fuhry and
                  Walter Tighzert and
                  Florian Kerschbaum},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Encrypting Analytical Web Applications},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {35--46},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996438},
  doi          = {10.1145/2996429.2996438},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FuhryTK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumBS16,
  author       = {Florian Kerschbaum and
                  Erik{-}Oliver Blass and
                  Tomas Sander},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {WISCS'16: The 3rd {ACM} Workshop on Information Sharing and Collaborative
                  Security},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1877--1878},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990490},
  doi          = {10.1145/2976749.2990490},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016wiscs,
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  title        = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and
                  Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24
                  - 28, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994539},
  doi          = {10.1145/2994539},
  isbn         = {978-1-4503-4565-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2016,
  editor       = {X. Sean Wang and
                  Lujo Bauer and
                  Florian Kerschbaum},
  title        = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2914642},
  doi          = {10.1145/2914642},
  isbn         = {978-1-4503-3802-8},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum15,
  author       = {Florian Kerschbaum},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Frequency-Hiding Order-Preserving Encryption},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {656--667},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813629},
  doi          = {10.1145/2810103.2813629},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumNR15,
  author       = {Florian Kerschbaum and
                  Cristina Nita{-}Rotaru and
                  Indrajit Ray},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{CCSW} 2015: The 7th {ACM} Cloud Computing Security Workshop},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1703--1704},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812620},
  doi          = {10.1145/2810103.2812620},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumNR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KerschbaumL15,
  author       = {Florian Kerschbaum and
                  Hoon Wei Lim},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Privacy-Preserving Observation in Public Spaces},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_5},
  doi          = {10.1007/978-3-319-24177-7\_5},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KerschbaumL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuanRZKY15,
  author       = {Chaowen Guan and
                  Kui Ren and
                  Fangguo Zhang and
                  Florian Kerschbaum and
                  Jia Yu},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_11},
  doi          = {10.1007/978-3-319-24174-6\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GuanRZKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Kerschbaum15,
  author       = {Florian Kerschbaum},
  editor       = {Roger L. Wainwright and
                  Juan Manuel Corchado and
                  Alessio Bechini and
                  Jiman Hong},
  title        = {Oblivious outsourcing of garbled circuit generation},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
                  Salamanca, Spain, April 13-17, 2015},
  pages        = {2134--2140},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2695664.2695665},
  doi          = {10.1145/2695664.2695665},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Kerschbaum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/HangKD15,
  author       = {Isabelle Hang and
                  Florian Kerschbaum and
                  Ernesto Damiani},
  editor       = {Timos K. Sellis and
                  Susan B. Davidson and
                  Zachary G. Ives},
  title        = {{ENKI:} Access Control for Encrypted Query Processing},
  booktitle    = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on
                  Management of Data, Melbourne, Victoria, Australia, May 31 - June
                  4, 2015},
  pages        = {183--196},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2723372.2749439},
  doi          = {10.1145/2723372.2749439},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/HangKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015ccsw,
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren and
                  Florian Kerschbaum and
                  Cristina Nita{-}Rotaru},
  title        = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
                  Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808425},
  doi          = {10.1145/2808425},
  isbn         = {978-1-4503-3825-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2015,
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952},
  doi          = {10.1145/2752952},
  isbn         = {978-1-4503-3556-0},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Kerschbaum0S14,
  author       = {Florian Kerschbaum and
                  Thomas Schneider and
                  Axel Schr{\"{o}}pfer},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Automatic Protocol Selection in Secure Two-Party Computations},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {566--584},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_33},
  doi          = {10.1007/978-3-319-07536-5\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Kerschbaum0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/GrofigHHKKSST14,
  author       = {Patrick Grofig and
                  Isabelle Hang and
                  Martin H{\"{a}}rterich and
                  Florian Kerschbaum and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy by Encrypted Databases},
  booktitle    = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
                  2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8450},
  pages        = {56--69},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06749-0\_4},
  doi          = {10.1007/978-3-319-06749-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/GrofigHHKKSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumS14,
  author       = {Florian Kerschbaum and
                  Axel Schr{\"{o}}pfer},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Optimal Average-Complexity Ideal-Security Order-Preserving Encryption},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {275--286},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660277},
  doi          = {10.1145/2660267.2660277},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HahnK14,
  author       = {Florian Hahn and
                  Florian Kerschbaum},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Searchable Encryption with Secure and Efficient Updates},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {310--320},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660297},
  doi          = {10.1145/2660267.2660297},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HahnK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum14,
  author       = {Florian Kerschbaum},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Client-Controlled Cloud Encryption},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1542--1543},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660577},
  doi          = {10.1145/2660267.2660577},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BauerK14,
  author       = {Lujo Bauer and
                  Florian Kerschbaum},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {What are the most important challenges for access control in new computing
                  domains, such as mobile, cloud and cyber-physical systems?},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {127--128},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613090},
  doi          = {10.1145/2613087.2613090},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BauerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14,
  author       = {Andreas Schaad and
                  Anis Bkakria and
                  Florian Kerschbaum and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  David Gross{-}Amblard},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Optimized and controlled provisioning of encrypted outsourced data},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613100},
  doi          = {10.1145/2613087.2613100},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14,
  author       = {Patrick Grofig and
                  Martin H{\"{a}}rterich and
                  Isabelle Hang and
                  Florian Kerschbaum and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Experiences and observations on the industrial implementation of a
                  system to search over outsourced encrypted data},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {115--125},
  publisher    = {{GI}},
  year         = {2014},
  url          = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html},
  timestamp    = {Wed, 13 Jan 2021 11:09:44 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KerschbaumBS14,
  author       = {Florian Kerschbaum and
                  Martin Beck and
                  Dagmar Sch{\"{o}}nfeld},
  title        = {Inference Control for Privacy-Preserving Genome Matching},
  journal      = {CoRR},
  volume       = {abs/1405.0205},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.0205},
  eprinttype    = {arXiv},
  eprint       = {1405.0205},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KerschbaumBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BartheHKU14,
  author       = {Gilles Barthe and
                  Michael Hicks and
                  Florian Kerschbaum and
                  Dominique Unruh},
  title        = {The Synergy Between Programming Languages and Cryptography (Dagstuhl
                  Seminar 14492)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {12},
  pages        = {29--47},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.12.29},
  doi          = {10.4230/DAGREP.4.12.29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BartheHKU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kerschbaum0S14,
  author       = {Florian Kerschbaum and
                  Thomas Schneider and
                  Axel Schr{\"{o}}pfer},
  title        = {Automatic Protocol Selection in Secure Two-Party Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kerschbaum0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/BeckK13,
  author       = {Martin Beck and
                  Florian Kerschbaum},
  title        = {Approximate Two-Party Privacy-Preserving String Matching with Linear
                  Complexity},
  booktitle    = {{IEEE} International Congress on Big Data, BigData Congress 2013,
                  Santa Clara, CA, USA, June 27 2013-July 2, 2013},
  pages        = {31--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BigData.Congress.2013.14},
  doi          = {10.1109/BIGDATA.CONGRESS.2013.14},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdata/BeckK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrmoneitK13,
  author       = {Raphael Urmoneit and
                  Florian Kerschbaum},
  editor       = {Martin Franz and
                  Andreas Holzer and
                  Rupak Majumdar and
                  Bryan Parno and
                  Helmut Veith},
  title        = {Efficient secure computation optimization},
  booktitle    = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
                  for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
                  4, 2013, Berlin, Germany},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517872.2517873},
  doi          = {10.1145/2517872.2517873},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/UrmoneitK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClaussSK13,
  author       = {Sebastian Clau{\ss} and
                  Stefan Schiffner and
                  Florian Kerschbaum},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {\emph{k}-anonymous reputation},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {359--368},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484361},
  doi          = {10.1145/2484313.2484361},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ClaussSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum13,
  author       = {Florian Kerschbaum},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {An information-flow type-system for mixed protocol secure computation},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {393--404},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484364},
  doi          = {10.1145/2484313.2484364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JawurekKO13,
  author       = {Marek Jawurek and
                  Florian Kerschbaum and
                  Claudio Orlandi},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Zero-knowledge using garbled circuits: how to prove non-algebraic
                  statements efficiently},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {955--966},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516662},
  doi          = {10.1145/2508859.2516662},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JawurekKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13,
  author       = {Florian Kerschbaum and
                  Patrick Grofig and
                  Isabelle Hang and
                  Martin H{\"{a}}rterich and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Adjustably encrypted in-memory column-store},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1325--1328},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512491},
  doi          = {10.1145/2508859.2512491},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumGHHKSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Kerschbaum13,
  author       = {Florian Kerschbaum},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Expression rewriting for optimizing secure computation},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435356},
  doi          = {10.1145/2435349.2435356},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Kerschbaum13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Patrick Grofig and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Optimal Re-encryption Strategy for Joins in Encrypted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_13},
  doi          = {10.1007/978-3-642-39256-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Mathias Kohler and
                  Isabelle Hang and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {An Encrypted In-Memory Column-Store: The Onion Selection Problem},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_2},
  doi          = {10.1007/978-3-642-45204-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/KerschbaumHKHSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Kerschbaum0S13,
  author       = {Florian Kerschbaum and
                  Thomas Schneider and
                  Axel Schr{\"{o}}pfer},
  title        = {Automatic Protocol Selection in Secure Two-Party Computations},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/automatic-protocol-selection-secure-two-party-computations},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Kerschbaum0S13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Kerschbaum13,
  author       = {Florian Kerschbaum},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Searching over encrypted data in cloud systems},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {87--88},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462888},
  doi          = {10.1145/2462410.2462888},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Kerschbaum13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchropferSKBJ13,
  author       = {Axel Schr{\"{o}}pfer and
                  Andreas Schaad and
                  Florian Kerschbaum and
                  Heiko Boehm and
                  Joerg Jooss},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Secure benchmarking in the cloud},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {197--200},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462430},
  doi          = {10.1145/2462410.2462430},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SchropferSKBJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KerschbaumLG13,
  author       = {Florian Kerschbaum and
                  Hoon Wei Lim and
                  Ivan Gudymenko},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Privacy-preserving billing for e-ticketing systems in public transportation},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {143--154},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517848},
  doi          = {10.1145/2517840.2517848},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/KerschbaumLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawurekKO13,
  author       = {Marek Jawurek and
                  Florian Kerschbaum and
                  Claudio Orlandi},
  title        = {Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic
                  Statements Efficiently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JawurekKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerschbaumLG13,
  author       = {Florian Kerschbaum and
                  Hoon Wei Lim and
                  Ivan Gudymenko},
  title        = {Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerschbaumLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LimKW12,
  author       = {Hoon Wei Lim and
                  Florian Kerschbaum and
                  Huaxiong Wang},
  title        = {Workflow Signatures for Business Process Compliance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {756--769},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.38},
  doi          = {10.1109/TDSC.2012.38},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LimKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/Kerschbaum12,
  author       = {Florian Kerschbaum},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy-Preserving Computation - (Position Paper)},
  booktitle    = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
                  2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8319},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-54069-1\_3},
  doi          = {10.1007/978-3-642-54069-1\_3},
  timestamp    = {Sat, 19 Oct 2019 20:10:28 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/Kerschbaum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum12,
  author       = {Florian Kerschbaum},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Outsourced private set intersection using homomorphic encryption},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {85--86},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414506},
  doi          = {10.1145/2414456.2414506},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/StrukerK12,
  author       = {Jens Str{\"{u}}ker and
                  Florian Kerschbaum},
  title        = {From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012},
  publisher    = {Association for Information Systems},
  year         = {2012},
  url          = {http://aisel.aisnet.org/icis2012/proceedings/BreakthroughIdeas/2},
  timestamp    = {Tue, 29 Jan 2013 19:04:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/StrukerK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/KerschbaumC12,
  author       = {Florian Kerschbaum and
                  Leonardo Weiss Ferreira Chaves},
  editor       = {Karl Aberer and
                  Anupam Joshi and
                  Sougata Mukherjea and
                  Dipanjan Chakraborty and
                  Hua Lu and
                  Nalini Venkatasubramanian and
                  Salil S. Kanhere},
  title        = {Encrypted Searchable Storage of {RFID} Tracking Data},
  booktitle    = {13th {IEEE} International Conference on Mobile Data Management, {MDM}
                  2012, Bengaluru, India, July 23-26, 2012},
  pages        = {176--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MDM.2012.27},
  doi          = {10.1109/MDM.2012.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/KerschbaumC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/JawurekK12,
  author       = {Marek Jawurek and
                  Florian Kerschbaum},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {Fault-Tolerant Privacy-Preserving Statistics},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_12},
  doi          = {10.1007/978-3-642-31680-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/JawurekK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Kerschbaum12,
  author       = {Florian Kerschbaum},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {Collusion-resistant outsourcing of private set intersection},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {1451--1456},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2232008},
  doi          = {10.1145/2245276.2232008},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/Kerschbaum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KerschbaumC12,
  author       = {Florian Kerschbaum and
                  Leonardo Weiss Ferreira Chaves},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Encryption-enforced access control for an {RFID} discovery service},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {127--130},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295161},
  doi          = {10.1145/2295136.2295161},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KerschbaumC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/OliveiraKLY12,
  author       = {Anderson Santana de Oliveira and
                  Florian Kerschbaum and
                  Hoon Wei Lim and
                  Su{-}Yang Yu},
  title        = {Privacy-Preserving Techniques and System for Streaming Databases},
  booktitle    = {2012 International Conference on Privacy, Security, Risk and Trust,
                  {PASSAT} 2012, and 2012 International Confernece on Social Computing,
                  SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages        = {728--733},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SocialCom-PASSAT.2012.85},
  doi          = {10.1109/SOCIALCOM-PASSAT.2012.85},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/OliveiraKLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-5208,
  author       = {Martin Beck and
                  Florian Kerschbaum},
  title        = {Approximate Two-Party Privacy-Preserving String Matching with Linear
                  Complexity},
  journal      = {CoRR},
  volume       = {abs/1209.5208},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.5208},
  eprinttype    = {arXiv},
  eprint       = {1209.5208},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-5208.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/Kerschbaum11,
  author       = {Florian Kerschbaum},
  title        = {Secure and Sustainable Benchmarking in Clouds - {A} Multi-Party Cloud
                  Application with an Untrusted Service Provider},
  journal      = {Bus. Inf. Syst. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {135--143},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12599-011-0153-9},
  doi          = {10.1007/S12599-011-0153-9},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bise/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KerschbaumSZPCHSCD11,
  author       = {Florian Kerschbaum and
                  Axel Schr{\"{o}}pfer and
                  Antonio Zilli and
                  Richard Pibernik and
                  Octavian Catrina and
                  Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {Secure Collaborative Supply-Chain Management},
  journal      = {Computer},
  volume       = {44},
  number       = {9},
  pages        = {38--43},
  year         = {2011},
  url          = {https://doi.org/10.1109/MC.2011.224},
  doi          = {10.1109/MC.2011.224},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KerschbaumSZPCHSCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/PibernikZKS11,
  author       = {Richard Pibernik and
                  Yingying Zhang and
                  Florian Kerschbaum and
                  Axel Schr{\"{o}}pfer},
  title        = {Secure collaborative supply chain planning and inverse optimization
                  - The {JELS} model},
  journal      = {Eur. J. Oper. Res.},
  volume       = {208},
  number       = {1},
  pages        = {75--85},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ejor.2010.08.018},
  doi          = {10.1016/J.EJOR.2010.08.018},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/PibernikZKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Kerschbaum11,
  author       = {Florian Kerschbaum},
  title        = {Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung
                  ohne vertrauensw{\"{u}}rdigen Dienstanbieter},
  journal      = {Wirtschaftsinf.},
  volume       = {53},
  number       = {3},
  pages        = {129--138},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11576-011-0267-1},
  doi          = {10.1007/S11576-011-0267-1},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wi/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KerschbaumC11,
  author       = {Florian Kerschbaum and
                  Leonardo Weiss Ferreira Chaves},
  editor       = {Ling Liu and
                  Manish Parashar},
  title        = {Secure Sharing of Item-Level Data in the Cloud},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
                  Washington, DC, USA, 4-9 July, 2011},
  pages        = {756--757},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CLOUD.2011.78},
  doi          = {10.1109/CLOUD.2011.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/KerschbaumC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum11,
  author       = {Florian Kerschbaum},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Automatically optimizing secure computation},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {703--714},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046786},
  doi          = {10.1145/2046707.2046786},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchropferK11,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Demo: secure computation in JavaScript},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {849--852},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093509},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchropferK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GoodrichK11,
  author       = {Michael T. Goodrich and
                  Florian Kerschbaum},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Privacy-enhanced reputation-feedback methods to reduce feedback extortion
                  in online auctions},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {273--282},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943550},
  doi          = {10.1145/1943513.1943550},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GoodrichK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SchropferKM11,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {298--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.46},
  doi          = {10.1109/COMPSAC.2011.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SchropferKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Kerschbaum11,
  author       = {Florian Kerschbaum},
  editor       = {Yingjiu Li},
  title        = {Public-Key Encrypted Bloom Filters with Applications to Supply Chain
                  Integrity},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {60--75},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_7},
  doi          = {10.1007/978-3-642-22348-8\_7},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/debs/Kerschbaum11,
  author       = {Florian Kerschbaum},
  editor       = {David M. Eyers and
                  Opher Etzion and
                  Avigdor Gal and
                  Stanley B. Zdonik and
                  Paul Vincent},
  title        = {Securely disseminating {RFID} events},
  booktitle    = {Proceedings of the Fifth {ACM} International Conference on Distributed
                  Event-Based Systems, {DEBS} 2011, New York, NY, USA, July 11-15, 2011},
  pages        = {327--334},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2002259.2002302},
  doi          = {10.1145/2002259.2002302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/debs/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/KerschbaumSK11,
  author       = {Florian Kerschbaum and
                  Jens Str{\"{u}}ker and
                  Thomas G. Koslowski},
  editor       = {Dennis F. Galletta and
                  Ting{-}Peng Liang},
  title        = {Confidential Information-Sharing for Automated Sustainability Benchmarks},
  booktitle    = {Proceedings of the International Conference on Information Systems,
                  {ICIS} 2011, Shanghai, China, December 4-7, 2011},
  publisher    = {Association for Information Systems},
  year         = {2011},
  url          = {http://aisel.aisnet.org/icis2011/proceedings/breakthroughideas/4},
  timestamp    = {Sun, 25 Oct 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/KerschbaumSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/JensenK11,
  author       = {Meiko Jensen and
                  Florian Kerschbaum},
  title        = {Towards Privacy-Preserving {XML} Transformation},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
                  DC, USA, July 4-9, 2011},
  pages        = {65--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICWS.2011.10},
  doi          = {10.1109/ICWS.2011.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/JensenK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Kerschbaum11,
  author       = {Florian Kerschbaum},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Secure conjunctive keyword searches for unstructured text},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {285--289},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060016},
  doi          = {10.1109/ICNSS.2011.6060016},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Kerschbaum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/JawurekJK11,
  author       = {Marek Jawurek and
                  Martin Johns and
                  Florian Kerschbaum},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {Plug-In Privacy for Smart Metering Billing},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {192--210},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_11},
  doi          = {10.1007/978-3-642-22263-4\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/JawurekJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/SchropferK11,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum},
  title        = {Forecasting Run-Times of Secure Two-Party Computation},
  booktitle    = {Eighth International Conference on Quantitative Evaluation of Systems,
                  {QEST} 2011, Aachen, Germany, 5-8 September, 2011},
  pages        = {181--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/QEST.2011.33},
  doi          = {10.1109/QEST.2011.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/SchropferK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/DreierK11,
  author       = {Jannik Dreier and
                  Florian Kerschbaum},
  title        = {Practical Privacy-Preserving Multiparty Linear Programming Based on
                  Problem Transformation},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {916--924},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.19},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/DreierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosp/BiswasBK11,
  author       = {Debmalya Biswas and
                  Kathryn Bean and
                  Florian Kerschbaum},
  editor       = {Samuel Kounev and
                  Vittorio Cortellessa and
                  Raffaela Mirandola and
                  David J. Lilja},
  title        = {NAT/Firewall traversal cost model for publish-subscribe systems},
  booktitle    = {ICPE'11 - Second Joint {WOSP/SIPEW} International Conference on Performance
                  Engineering, Karlsruhe, Germany, March 14-16, 2011},
  pages        = {487--492},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1958746.1958820},
  doi          = {10.1145/1958746.1958820},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wosp/BiswasBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-4602,
  author       = {Michael T. Goodrich and
                  Florian Kerschbaum},
  title        = {Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion
                  in Online Auctions},
  journal      = {CoRR},
  volume       = {abs/1102.4602},
  year         = {2011},
  url          = {http://arxiv.org/abs/1102.4602},
  eprinttype    = {arXiv},
  eprint       = {1102.4602},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1102-4602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DreierK11,
  author       = {Jannik Dreier and
                  Florian Kerschbaum},
  title        = {Practical Secure and Efficient Multiparty Linear Programming Based
                  on Problem Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DreierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Kerschbaum2010,
  author       = {Florian Kerschbaum},
  title        = {A privacy-preserving benchmarking platform},
  school       = {Karlsruhe Institute of Technology},
  year         = {2010},
  url          = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000019077},
  urn          = {urn:nbn:de:swb:90-190771},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Kerschbaum2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KerschbaumS10,
  author       = {Florian Kerschbaum and
                  Alessandro Sorniotti},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {Searchable Encryption for Outsourced Data Analytics},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_5},
  doi          = {10.1007/978-3-642-22633-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KerschbaumS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/WibmerBK10,
  author       = {Michael Wibmer and
                  Debmalya Biswas and
                  Florian Kerschbaum},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {Leakage Quantification of Cryptographic Operations},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated
                  International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos,
                  Crete, Greece, October 25-29, 2010, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6426},
  pages        = {685--700},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16934-2\_50},
  doi          = {10.1007/978-3-642-16934-2\_50},
  timestamp    = {Thu, 14 Oct 2021 10:28:29 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/WibmerBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/FunkeK10,
  author       = {Daniel Funke and
                  Florian Kerschbaum},
  editor       = {Robert Schaefer and
                  Carlos Cotta and
                  Joanna Kolodziej and
                  G{\"{u}}nter Rudolph},
  title        = {Privacy-Preserving Multi-Objective Evolutionary Algorithms},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International
                  Conference, Krak{\'{o}}w, Poland, September 11-15, 2010. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6239},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15871-1\_5},
  doi          = {10.1007/978-3-642-15871-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/FunkeK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KerschbaumO10,
  author       = {Florian Kerschbaum and
                  Nina Oertel},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {Privacy-Preserving Pattern Matching for Anomaly Detection in {RFID}
                  Anti-Counterfeiting},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_12},
  doi          = {10.1007/978-3-642-16822-2\_12},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/KerschbaumO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Kerschbaum10,
  author       = {Florian Kerschbaum},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {An access control model for mobile physical objects},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {193--202},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809873},
  doi          = {10.1145/1809842.1809873},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Kerschbaum10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/BiswasHK10,
  author       = {Debmalya Biswas and
                  Stephan Haller and
                  Florian Kerschbaum},
  editor       = {Kuo{-}Ming Chao and
                  Christian Huemer and
                  Birgit Hofreiter and
                  Yinsheng Li and
                  Nazaraf Shah},
  title        = {Privacy-Preserving Outsourced Profiling},
  booktitle    = {12th {IEEE} Conference on Commerce and Enterprise Computing, {CEC}
                  2010, Shanghai, China, November 10-12, 2010},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CEC.2010.39},
  doi          = {10.1109/CEC.2010.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/BiswasHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumOC10,
  author       = {Florian Kerschbaum and
                  Nina Oertel and
                  Leonardo Weiss Ferreira Chaves},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Privacy-preserving computation of benchmarks on item-level data using
                  {RFID}},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741884},
  doi          = {10.1145/1741866.1741884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KerschbaumOC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelKMMWL10,
  author       = {Ulrich Flegel and
                  Florian Kerschbaum and
                  Philip Miseldine and
                  Ganna Monakova and
                  Richard Wacker and
                  Frank Leymann},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Legally Sustainable Solutions for Privacy Issues in Collaborative
                  Fraud Detection},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {139--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_7},
  doi          = {10.1007/978-1-4419-7133-3\_7},
  timestamp    = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2248,
  author       = {Marek Jawurek and
                  Martin Johns and
                  Florian Kerschbaum},
  title        = {Plug-in privacy for Smart Metering billing},
  journal      = {CoRR},
  volume       = {abs/1012.2248},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2248},
  eprinttype    = {arXiv},
  eprint       = {1012.2248},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2248.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FunkeK10,
  author       = {Daniel Funke and
                  Florian Kerschbaum},
  title        = {Privacy-Preserving Multi-Objective Evolutionary Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FunkeK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchropferKM10,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  G{\"{u}}nter M{\"{u}}ller},
  title        = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/DeitosK09,
  author       = {Rafael Deitos and
                  Florian Kerschbaum},
  title        = {Parallelizing secure linear programming},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {21},
  number       = {10},
  pages        = {1321--1350},
  year         = {2009},
  url          = {https://doi.org/10.1002/cpe.1424},
  doi          = {10.1002/CPE.1424},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/DeitosK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/KerschbaumR09,
  author       = {Florian Kerschbaum and
                  Philip Robinson},
  title        = {Security architecture for virtual organizations of business web services},
  journal      = {J. Syst. Archit.},
  volume       = {55},
  number       = {4},
  pages        = {224--232},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.sysarc.2008.10.001},
  doi          = {10.1016/J.SYSARC.2008.10.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/KerschbaumR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/SchropferKSP09,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  Christoph G. Sch{\"{u}}tz and
                  Richard Pibernik},
  title        = {Optimizations for Risk-Aware Secure Supply Chain Master Planning},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {15},
  number       = {15},
  pages        = {3019--3037},
  year         = {2009},
  url          = {https://doi.org/10.3217/jucs-015-15-3019},
  doi          = {10.3217/JUCS-015-15-3019},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/SchropferKSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/Kerschbaum09,
  author       = {Florian Kerschbaum},
  title        = {Adapting Privacy-Preserving Computation to the Service Provider Model},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {34--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.261},
  doi          = {10.1109/CSE.2009.261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/Kerschbaum09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/DeitosK09,
  author       = {Rafael Deitos and
                  Florian Kerschbaum},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {Improving Practical Performance on Secure and Private Collaborative
                  Linear Programming},
  booktitle    = {Database and Expert Systems Applications, DEXA, International Workshops,
                  Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages        = {122--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DEXA.2009.32},
  doi          = {10.1109/DEXA.2009.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/DeitosK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/KerschbaumBH09,
  author       = {Florian Kerschbaum and
                  Debmalya Biswas and
                  Sebastiaan de Hoogh},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {Performance Comparison of Secure Comparison Protocols},
  booktitle    = {Database and Expert Systems Applications, DEXA, International Workshops,
                  Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages        = {133--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DEXA.2009.37},
  doi          = {10.1109/DEXA.2009.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/KerschbaumBH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AccorsiDIK09,
  author       = {Rafael Accorsi and
                  Ernesto Damiani and
                  Frank Innerhofer{-}Oberperfler and
                  Florian Kerschbaum},
  title        = {Editorial to the second workshop on Security and Privacy in Enterprise
                  Computing (InSPEC09)},
  booktitle    = {Workshops Proceedings of the 12th {IEEE} International Enterprise
                  Distributed Object Computing Conference, EDOCw 2009, 1-4 September
                  2009, Auckland, New Zealand},
  pages        = {166--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/EDOCW.2009.5331995},
  doi          = {10.1109/EDOCW.2009.5331995},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/edoc/AccorsiDIK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KerschbaumSB09,
  author       = {Florian Kerschbaum and
                  Andreas Schaad and
                  Debmalya Biswas},
  title        = {Practical privacy-preserving protocols for criminal investigations},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},
  pages        = {197--199},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISI.2009.5137301},
  doi          = {10.1109/ISI.2009.5137301},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KerschbaumSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KerschbaumDSB09,
  author       = {Florian Kerschbaum and
                  Daniel Dahlmeier and
                  Axel Schr{\"{o}}pfer and
                  Debmalya Biswas},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski},
  title        = {On the practical importance of communication complexity for secure
                  multi-party computation protocols},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
                  Honolulu, Hawaii, USA, March 9-12, 2009},
  pages        = {2008--2015},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1529282.1529730},
  doi          = {10.1145/1529282.1529730},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/KerschbaumDSB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/SchropferKSP09,
  author       = {Axel Schr{\"{o}}pfer and
                  Florian Kerschbaum and
                  Dagmar Sadkowiak and
                  Richard Pibernik},
  editor       = {Alfonso Rodr{\'{\i}}guez and
                  Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Risk-Aware Secure Supply Chain Master Planning},
  booktitle    = {Security in Information Systems, Proceedings of the 7th International
                  Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction
                  with {ICEIS} 2009, Milan, Italy, May 2009},
  pages        = {46--56},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 03 Dec 2019 11:56:05 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/SchropferKSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumS09,
  author       = {Florian Kerschbaum and
                  Alessandro Sorniotti},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {RFID-based supply chain partner authentication and key agreement},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514281},
  doi          = {10.1145/1514274.1514281},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Kerschbaum09,
  author       = {Florian Kerschbaum},
  editor       = {Ehab Al{-}Shaer and
                  Stefano Paraboschi},
  title        = {A verifiable, centralized, coercion-free reputation system},
  booktitle    = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655188.1655197},
  doi          = {10.1145/1655188.1655197},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/Kerschbaum09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/Kerschbaum08,
  author       = {Florian Kerschbaum},
  title        = {Building a privacy-preserving benchmarking enterprise system},
  journal      = {Enterp. Inf. Syst.},
  volume       = {2},
  number       = {4},
  pages        = {421--441},
  year         = {2008},
  url          = {https://doi.org/10.1080/17517570802372468},
  doi          = {10.1080/17517570802372468},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/Kerschbaum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CatrinaK08,
  author       = {Octavian Catrina and
                  Florian Kerschbaum},
  title        = {Fostering the Uptake of Secure Multiparty Computation in E-Commerce},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {693--700},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.49},
  doi          = {10.1109/ARES.2008.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CatrinaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/ChavesK08,
  author       = {Leonardo Weiss Ferreira Chaves and
                  Florian Kerschbaum},
  editor       = {Marten van Sinderen and
                  Jo{\~{a}}o Paulo A. Almeida and
                  Lu{\'{\i}}s Ferreira Pires and
                  Maarten Steen},
  title        = {Industrial Privacy in RFID-based Batch Recalls},
  booktitle    = {Workshops Proceedings of the 12th International {IEEE} Enterprise
                  Distributed Object Computing Conference, {ECOCW} 2008, 16 September
                  2008, Munich, Germany},
  pages        = {192--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EDOCW.2008.37},
  doi          = {10.1109/EDOCW.2008.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/ChavesK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Kerschbaum08,
  author       = {Florian Kerschbaum},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Practical Privacy-Preserving Benchmarking},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_2},
  doi          = {10.1007/978-0-387-09699-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Kerschbaum08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/KerschbaumD08,
  author       = {Florian Kerschbaum and
                  Rafael Deitos},
  editor       = {Ernesto Damiani and
                  Seth Proctor},
  title        = {Security against the business partner},
  booktitle    = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
                  2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456492.1456493},
  doi          = {10.1145/1456492.1456493},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/KerschbaumD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/KerschbaumV08,
  author       = {Florian Kerschbaum and
                  Julien Vayssi{\`{e}}re},
  editor       = {Ernesto Damiani and
                  Seth Proctor},
  title        = {Privacy-preserving data analytics as an outsourced service},
  booktitle    = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
                  2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {87--96},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456492.1456506},
  doi          = {10.1145/1456492.1456506},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/KerschbaumV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KerschbaumS08,
  author       = {Florian Kerschbaum and
                  Andreas Schaad},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Privacy-preserving social network analysis for criminal investigations},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {9--14},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456406},
  doi          = {10.1145/1456403.1456406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/KerschbaumS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/FlegelKW08,
  author       = {Ulrich Flegel and
                  Florian Kerschbaum and
                  Richard Wacker},
  editor       = {Matt Bishop and
                  Dieter Gollmann and
                  Jeffrey Hunker and
                  Christian W. Probst},
  title        = {Collaborative Fraud Detection in Outsourcing Scenarios: Issues of
                  and Solutions for Privacy and Confidentiality},
  booktitle    = {Countering Insider Threats, 20.07. - 25.07.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08302},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1794/},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/FlegelKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/Kerschbaum07,
  author       = {Florian Kerschbaum},
  title        = {Building a Privacy-Preserving Benchmarking Enterprise System},
  booktitle    = {11th {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
                  {USA}},
  pages        = {87--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/EDOC.2007.13},
  doi          = {10.1109/EDOC.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/Kerschbaum07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/KerschbaumV07,
  author       = {Florian Kerschbaum and
                  Julien Vayssi{\`{e}}re},
  title        = {Privacy-preserving logical vector clocks using secure computation
                  techniques},
  booktitle    = {13th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICPADS.2007.4447773},
  doi          = {10.1109/ICPADS.2007.4447773},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/KerschbaumV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Kerschbaum07,
  author       = {Florian Kerschbaum},
  title        = {Simple cross-site attack prevention},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {464--472},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550368},
  doi          = {10.1109/SECCOM.2007.4550368},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Kerschbaum07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/Kerschbaum07,
  author       = {Florian Kerschbaum},
  editor       = {Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {A New Way to Think About Secure Computation: Language-based Secure
                  Computation},
  booktitle    = {Security in Information Systems, Proceedings of the 5th International
                  Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction
                  with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007},
  pages        = {33--42},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Thu, 24 Jan 2008 19:53:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/Kerschbaum07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KerschbaumDR07,
  author       = {Florian Kerschbaum and
                  Rafael Deitos and
                  Philip Robinson},
  editor       = {Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul and
                  A Min Tjoa},
  title        = {Securing {VO} Management},
  booktitle    = {Trust, Privacy and Security in Digital Business, 4th International
                  Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4657},
  pages        = {14--23},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74409-2\_4},
  doi          = {10.1007/978-3-540-74409-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/KerschbaumDR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Kerschbaum07,
  author       = {Florian Kerschbaum},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Distance-preserving pseudonymization for timestamps and spatial data},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {68--71},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314346},
  doi          = {10.1145/1314333.1314346},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/Kerschbaum07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RobinsonKS06,
  author       = {Philip Robinson and
                  Florian Kerschbaum and
                  Andreas Schaad},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {From Business Process Choreography to Authorization Policies},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_21},
  doi          = {10.1007/11805588\_21},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/RobinsonKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/KerschbaumT06,
  author       = {Florian Kerschbaum and
                  Orestis Terzidis},
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Filtering for Private Collaborative Benchmarking},
  booktitle    = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  pages        = {409--422},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155\_29},
  doi          = {10.1007/11766155\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/KerschbaumT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/KerschbaumHKR06,
  author       = {Florian Kerschbaum and
                  Jochen Haller and
                  Y{\"{u}}cel Karabulut and
                  Philip Robinson},
  editor       = {Ketil St{\o}len and
                  William H. Winsborough and
                  Fabio Martinelli and
                  Fabio Massacci},
  title        = {PathTrust: {A} Trust-Based Reputation Service for Virtual Organization
                  Formation},
  booktitle    = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
                  Italy, May 16-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3986},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11755593\_15},
  doi          = {10.1007/11755593\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/KerschbaumHKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Kerschbaum06,
  author       = {Florian Kerschbaum},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Practical Private Regular Expression Matching},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {461--470},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_43},
  doi          = {10.1007/0-387-33406-8\_43},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/Kerschbaum06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/DeitosKR06,
  author       = {Rafael Deitos and
                  Florian Kerschbaum and
                  Philip Robinson},
  editor       = {Ari Juels and
                  Ernesto Damiani and
                  Alban Gabillon},
  title        = {A comprehensive security architecture for dynamic, web service based
                  virtual organizations for businesses},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
                  2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {103--104},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180367.1180386},
  doi          = {10.1145/1180367.1180386},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/DeitosKR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KarabulutKMRY07,
  author       = {Y{\"{u}}cel Karabulut and
                  Florian Kerschbaum and
                  Fabio Massacci and
                  Philip Robinson and
                  Artsiom Yautsiukhin},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Security and Trust in {IT} Business Outsourcing: a Manifesto},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {47--58},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.030},
  doi          = {10.1016/J.ENTCS.2006.08.030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/KarabulutKMRY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icba/KerschbaumAMR04,
  author       = {Florian Kerschbaum and
                  Mikhail J. Atallah and
                  David M'Ra{\"{\i}}hi and
                  John R. Rice},
  editor       = {David Zhang and
                  Anil K. Jain},
  title        = {Private Fingerprint Verification without Local Storage},
  booktitle    = {Biometric Authentication, First International Conference, {ICBA} 2004,
                  Hong Kong, China, July 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3072},
  pages        = {387--394},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25948-0\_54},
  doi          = {10.1007/978-3-540-25948-0\_54},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icba/KerschbaumAMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KamaraFSKF03,
  author       = {Seny Kamara and
                  Sonia Fahmy and
                  E. Eugene Schultz and
                  Florian Kerschbaum and
                  Michael Frantzen},
  title        = {Analysis of vulnerabilities in Internet firewalls},
  journal      = {Comput. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {214--232},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-4048(03)00310-9},
  doi          = {10.1016/S0167-4048(03)00310-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KamaraFSKF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AtallahKD03,
  author       = {Mikhail J. Atallah and
                  Florian Kerschbaum and
                  Wenliang Du},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Paul F. Syverson},
  title        = {Secure and private sequence comparisons},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1005140.1005147},
  doi          = {10.1145/1005140.1005147},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/AtallahKD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KerschbaumSZ02,
  author       = {Florian Kerschbaum and
                  Eugene H. Spafford and
                  Diego Zamboni},
  title        = {Using Internal Sensors and Embedded Detectors for Intrusion Detection},
  journal      = {J. Comput. Secur.},
  volume       = {10},
  number       = {1/2},
  pages        = {23--70},
  year         = {2002},
  url          = {https://doi.org/10.3233/jcs-2002-101-203},
  doi          = {10.3233/JCS-2002-101-203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KerschbaumSZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrantzenKSF01,
  author       = {Michael Frantzen and
                  Florian Kerschbaum and
                  E. Eugene Schultz and
                  Sonia Fahmy},
  title        = {A Framework for Understanding Vulnerabilities in Firewalls Using a
                  Dataflow Model of Firewall Internals},
  journal      = {Comput. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {263--270},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-4048(01)00314-5},
  doi          = {10.1016/S0167-4048(01)00314-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrantzenKSF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AtallahRCHKMN01,
  author       = {Mikhail J. Atallah and
                  Victor Raskin and
                  Michael Crogan and
                  Christian Hempelmann and
                  Florian Kerschbaum and
                  Dina Mohamed and
                  Sanket Naik},
  editor       = {Ira S. Moskowitz},
  title        = {Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept
                  Implementation},
  booktitle    = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
                  PA, USA, April 25-27, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2137},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45496-9\_14},
  doi          = {10.1007/3-540-45496-9\_14},
  timestamp    = {Wed, 16 Mar 2022 23:55:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/AtallahRCHKMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics