Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Florian Kerschbaum
@article{DBLP:journals/corr/abs-2402-14937, author = {Lucas Fenaux and Florian Kerschbaum}, title = {SoK: Analyzing Adversarial Examples: {A} Framework to Study Adversary Knowledge}, journal = {CoRR}, volume = {abs/2402.14937}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.14937}, doi = {10.48550/ARXIV.2402.14937}, eprinttype = {arXiv}, eprint = {2402.14937}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-14937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KerschbaumL23, author = {Florian Kerschbaum and Nils Lukas}, title = {Privacy-Preserving Machine Learning [Cryptography]}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {6}, pages = {90--94}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3315944}, doi = {10.1109/MSEC.2023.3315944}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KerschbaumL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmmod/MaiyyaVAAK23, author = {Sujaya Maiyya and Sharath Chandra Vemula and Divyakant Agrawal and Amr El Abbadi and Florian Kerschbaum}, title = {Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns}, journal = {Proc. {ACM} Manag. Data}, volume = {1}, number = {4}, pages = {266:1--266:25}, year = {2023}, url = {https://doi.org/10.1145/3626760}, doi = {10.1145/3626760}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmmod/MaiyyaVAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/FarajiK23, author = {Sina Faraji and Florian Kerschbaum}, title = {Trifecta: Faster High-Throughput Three-Party Computation over {WAN} Using Multi-Fan-In Logic Gates}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {224--237}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0107}, doi = {10.56553/POPETS-2023-0107}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/FarajiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HumphriesK23, author = {Thomas Humphries and Florian Kerschbaum}, title = {Differentially Private Simple Genetic Algorithms}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {540--558}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0124}, doi = {10.56553/POPETS-2023-0124}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HumphriesK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/WeiK23, author = {Ruidi Wei and Florian Kerschbaum}, title = {Cryptographically Secure Private Record Linkage Using Locality-Sensitive Hashing}, journal = {Proc. {VLDB} Endow.}, volume = {17}, number = {2}, pages = {79--91}, year = {2023}, url = {https://www.vldb.org/pvldb/vol17/p79-kerschbaum.pdf}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/WeiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KacsmarDTUK23, author = {Bailey Kacsmar and Vasisht Duddu and Kyle Tilbury and Blase Ur and Florian Kerschbaum}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Comprehension from Chaos: Towards Informed Consent for Private Computation}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {210--224}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623152}, doi = {10.1145/3576915.3623152}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KacsmarDTUK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MahdaviNLK23, author = {Rasoul Akhavan Mahdavi and Haoyan Ni and Dimitry Linkov and Florian Kerschbaum}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2945--2958}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623095}, doi = {10.1145/3576915.3623095}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MahdaviNLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HumphriesOTRGHK23, author = {Thomas Humphries and Simon Oya and Lindsey Tulloch and Matthew Rafuse and Ian Goldberg and Urs Hengartner and Florian Kerschbaum}, title = {Investigating Membership Inference Attacks under Data Dependencies}, booktitle = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik, Croatia, July 10-14, 2023}, pages = {473--488}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSF57540.2023.00013}, doi = {10.1109/CSF57540.2023.00013}, timestamp = {Tue, 05 Sep 2023 20:33:27 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HumphriesOTRGHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/FenauxHK23, author = {Lucas Fenaux and Thomas Humphries and Florian Kerschbaum}, editor = {Sara Silva and Lu{\'{\i}}s Paquete}, title = {Gaggle: Genetic Algorithms on the {GPU} using PyTorch}, booktitle = {Companion Proceedings of the Conference on Genetic and Evolutionary Computation, {GECCO} 2023, Companion Volume, Lisbon, Portugal, July 15-19, 2023}, pages = {2358--2361}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583133.3596356}, doi = {10.1145/3583133.3596356}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/FenauxHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KerschbaumBM23, author = {Florian Kerschbaum and Erik{-}Oliver Blass and Rasoul Akhavan Mahdavi}, title = {Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/faster-secure-comparisons-with-offline-phase-for-efficient-private-set-intersection/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KerschbaumBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlassK23, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Private Collaborative Data Cleaning via Non-Equi {PSI}}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1419--1434}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179396}, doi = {10.1109/SP46215.2023.10179396}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlassK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlassK23a, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Private Collaborative Data Cleaning via Non-Equi {PSI}}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1419--1434}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179337}, doi = {10.1109/SP46215.2023.10179337}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlassK23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LukasK23, author = {Nils Lukas and Florian Kerschbaum}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{PTW:} Pivotal Tuning Watermarking for Pre-Trained Image Generators}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2241--2258}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/lukas}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/LukasK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-09043, author = {Rasoul Akhavan Mahdavi and Abdulrahman Diaa and Florian Kerschbaum}, title = {{HE} is all you need: Compressing {FHE} Ciphertexts using Additive {HE}}, journal = {CoRR}, volume = {abs/2303.09043}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.09043}, doi = {10.48550/ARXIV.2303.09043}, eprinttype = {arXiv}, eprint = {2303.09043}, timestamp = {Mon, 20 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-09043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-07361, author = {Nils Lukas and Florian Kerschbaum}, title = {{PTW:} Pivotal Tuning Watermarking for Pre-Trained Image Generators}, journal = {CoRR}, volume = {abs/2304.07361}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.07361}, doi = {10.48550/ARXIV.2304.07361}, eprinttype = {arXiv}, eprint = {2304.07361}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-07361.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09671, author = {Nils Lukas and Florian Kerschbaum}, title = {Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks against Deep Image Classification}, journal = {CoRR}, volume = {abs/2305.09671}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09671}, doi = {10.48550/ARXIV.2305.09671}, eprinttype = {arXiv}, eprint = {2305.09671}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09671.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08538, author = {Abdulrahman Diaa and Lucas Fenaux and Thomas Humphries and Marian Dietz and Faezeh Ebrahimianghazani and Bailey Kacsmar and Xinda Li and Nils Lukas and Rasoul Akhavan Mahdavi and Simon Oya and Ehsan Amjadian and Florian Kerschbaum}, title = {Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions}, journal = {CoRR}, volume = {abs/2306.08538}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08538}, doi = {10.48550/ARXIV.2306.08538}, eprinttype = {arXiv}, eprint = {2306.08538}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08538.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10718, author = {Yutong Wu and Jie Zhang and Florian Kerschbaum and Tianwei Zhang}, title = {Backdooring Textual Inversion for Concept Censorship}, journal = {CoRR}, volume = {abs/2308.10718}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10718}, doi = {10.48550/ARXIV.2308.10718}, eprinttype = {arXiv}, eprint = {2308.10718}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-06496, author = {Rasoul Akhavan Mahdavi and Haoyan Ni and Dimitry Linkov and Florian Kerschbaum}, title = {Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption}, journal = {CoRR}, volume = {abs/2309.06496}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.06496}, doi = {10.48550/ARXIV.2309.06496}, eprinttype = {arXiv}, eprint = {2309.06496}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-06496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-16952, author = {Nils Lukas and Abdulrahman Diaa and Lucas Fenaux and Florian Kerschbaum}, title = {Leveraging Optimization for Adaptive Attacks on Image Watermarks}, journal = {CoRR}, volume = {abs/2309.16952}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.16952}, doi = {10.48550/ARXIV.2309.16952}, eprinttype = {arXiv}, eprint = {2309.16952}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-16952.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11548, author = {Shubhankar Mohapatra and Jianqiao Zong and Florian Kerschbaum and Xi He}, title = {Differentially Private Data Generation with Missing Data}, journal = {CoRR}, volume = {abs/2310.11548}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11548}, doi = {10.48550/ARXIV.2310.11548}, eprinttype = {arXiv}, eprint = {2310.11548}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11548.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-14565, author = {Rasoul Akhavan Mahdavi and Nils Lukas and Faezeh Ebrahimianghazani and Thomas Humphries and Bailey Kacsmar and John A. Premkumar and Xinda Li and Simon Oya and Ehsan Amjadian and Florian Kerschbaum}, title = {{PEPSI:} Practically Efficient Private Set Intersection in the Unbalanced Setting}, journal = {CoRR}, volume = {abs/2310.14565}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.14565}, doi = {10.48550/ARXIV.2310.14565}, eprinttype = {arXiv}, eprint = {2310.14565}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-14565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00157, author = {Benjamin Schneider and Nils Lukas and Florian Kerschbaum}, title = {Universal Backdoor Attacks}, journal = {CoRR}, volume = {abs/2312.00157}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00157}, doi = {10.48550/ARXIV.2312.00157}, eprinttype = {arXiv}, eprint = {2312.00157}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00157.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaiyyaVAAK23, author = {Sujaya Maiyya and Sharath Chandra Vemula and Divyakant Agrawal and Amr El Abbadi and Florian Kerschbaum}, title = {Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1285}, year = {2023}, url = {https://eprint.iacr.org/2023/1285}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MaiyyaVAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KerschbaumM22, author = {Florian Kerschbaum and Michelle L. Mazurek}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0001}, doi = {10.2478/POPETS-2022-0001}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/KerschbaumM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KerschbaumM22a, author = {Florian Kerschbaum and Michelle L. Mazurek}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0032}, doi = {10.2478/POPETS-2022-0032}, timestamp = {Sat, 12 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/KerschbaumM22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KerschbaumM22b, author = {Florian Kerschbaum and Michelle L. Mazurek}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0059}, doi = {10.56553/POPETS-2022-0059}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KerschbaumM22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KerschbaumM22c, author = {Florian Kerschbaum and Michelle L. Mazurek}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {1--5}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0095}, doi = {10.56553/POPETS-2022-0095}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KerschbaumM22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FischerFKJKB22, author = {Andreas Fischer and Benny Fuhry and J{\"{o}}rn Ku{\ss}maul and Jonas Janneck and Florian Kerschbaum and Eric Bodden}, title = {Computation on Encrypted Data Using Dataflow Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {25}, number = {3}, pages = {21:1--21:36}, year = {2022}, url = {https://doi.org/10.1145/3513005}, doi = {10.1145/3513005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FischerFKJKB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BlassKM22, author = {Erik{-}Oliver Blass and Florian Kerschbaum and Travis Mayberry}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Iterative Oblivious Pseudo-Random Functions and Applications}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {28--41}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517403}, doi = {10.1145/3488932.3517403}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BlassKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HumphriesMVK22, author = {Thomas Humphries and Rasoul Akhavan Mahdavi and Shannon Veitch and Florian Kerschbaum}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Selective {MPC:} Distributed Computation of Differentially Private Key-Value Statistics}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1459--1472}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560559}, doi = {10.1145/3548606.3560559}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HumphriesMVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BernauRK22, author = {Daniel Bernau and Jonas Robl and Florian Kerschbaum}, editor = {Shamik Sural and Haibing Lu}, title = {Assessing Differentially Private Variational Autoencoders Under Membership Inference}, booktitle = {Data and Applications Security and Privacy {XXXVI} - 36th Annual {IFIP} {WG} 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13383}, pages = {3--14}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10684-2\_1}, doi = {10.1007/978-3-031-10684-2\_1}, timestamp = {Thu, 14 Jul 2022 17:34:57 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BernauRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlassK22, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Mixed-Technique Multi-Party Computations Composed of Two-Party Computations}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {295--319}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_15}, doi = {10.1007/978-3-031-17143-7\_15}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlassK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/ShafieinejadGLK22, author = {Masoumeh Shafieinejad and Suraj Gupta and Jin Yang Liu and Koray Karabina and Florian Kerschbaum}, title = {Equi-Joins over Encrypted Data for Series of Queries}, booktitle = {38th {IEEE} International Conference on Data Engineering, {ICDE} 2022, Kuala Lumpur, Malaysia, May 9-12, 2022}, pages = {1635--1648}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDE53745.2022.00168}, doi = {10.1109/ICDE53745.2022.00168}, timestamp = {Fri, 05 Aug 2022 16:24:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/ShafieinejadGLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/naacl/MatternWK22, author = {Justus Mattern and Benjamin Weggenmann and Florian Kerschbaum}, editor = {Marine Carpuat and Marie{-}Catherine de Marneffe and Iv{\'{a}}n Vladimir Meza Ru{\'{\i}}z}, title = {The Limits of Word Level Differential Privacy}, booktitle = {Findings of the Association for Computational Linguistics: {NAACL} 2022, Seattle, WA, United States, July 10-15, 2022}, pages = {867--881}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-naacl.65}, doi = {10.18653/V1/2022.FINDINGS-NAACL.65}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/naacl/MatternWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LukasJLK22, author = {Nils Lukas and Edward Jiang and Xinda Li and Florian Kerschbaum}, title = {SoK: How Robust is Image Classification Deep Neural Network Watermarking?}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {787--804}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833693}, doi = {10.1109/SP46214.2022.9833693}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/LukasJLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KacsmarTMK22, author = {Bailey Kacsmar and Kyle Tilbury and Miti Mazmudar and Florian Kerschbaum}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Caring about Sharing: User Perceptions of Multiparty Data Sharing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {899--916}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/kacsmar}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/KacsmarTMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MahdaviK22, author = {Rasoul Akhavan Mahdavi and Florian Kerschbaum}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Constant-weight {PIR:} Single-round Keyword {PIR} via Constant-weight Equality Operators}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1723--1740}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/mahdavi}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MahdaviK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OyaK22, author = {Simon Oya and Florian Kerschbaum}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{IHOP:} Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {2407--2424}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/oya}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/OyaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WeggenmannRAMK22, author = {Benjamin Weggenmann and Valentin Rublack and Michael Andrejczuk and Justus Mattern and Florian Kerschbaum}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {{DP-VAE:} Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {721--731}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512232}, doi = {10.1145/3485447.3512232}, timestamp = {Thu, 23 Jun 2022 19:54:34 +0200}, biburl = {https://dblp.org/rec/conf/www/WeggenmannRAMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-07569, author = {Rasoul Akhavan Mahdavi and Florian Kerschbaum}, title = {Constant-weight {PIR:} Single-round Keyword {PIR} via Constant-weight Equality Operators}, journal = {CoRR}, volume = {abs/2202.07569}, year = {2022}, url = {https://arxiv.org/abs/2202.07569}, eprinttype = {arXiv}, eprint = {2202.07569}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-07569.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-07877, author = {Daniel Bernau and Jonas Robl and Florian Kerschbaum}, title = {Assessing Differentially Private Variational Autoencoders under Membership Inference}, journal = {CoRR}, volume = {abs/2204.07877}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.07877}, doi = {10.48550/ARXIV.2204.07877}, eprinttype = {arXiv}, eprint = {2204.07877}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-07877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-02130, author = {Justus Mattern and Benjamin Weggenmann and Florian Kerschbaum}, title = {The Limits of Word Level Differential Privacy}, journal = {CoRR}, volume = {abs/2205.02130}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.02130}, doi = {10.48550/ARXIV.2205.02130}, eprinttype = {arXiv}, eprint = {2205.02130}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-02130.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-13913, author = {Florian Kerschbaum and Erik{-}Oliver Blass and Rasoul Akhavan Mahdavi}, title = {Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection}, journal = {CoRR}, volume = {abs/2209.13913}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.13913}, doi = {10.48550/ARXIV.2209.13913}, eprinttype = {arXiv}, eprint = {2209.13913}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-13913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-07026, author = {Bailey Kacsmar and Vasisht Duddu and Kyle Tilbury and Blase Ur and Florian Kerschbaum}, title = {Comprehension from Chaos: What Users Understand and Expect from Private Computation}, journal = {CoRR}, volume = {abs/2211.07026}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.07026}, doi = {10.48550/ARXIV.2211.07026}, eprinttype = {arXiv}, eprint = {2211.07026}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-07026.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-10752, author = {Yihan Wu and Xinda Li and Florian Kerschbaum and Heng Huang and Hongyang Zhang}, title = {Towards Robust Dataset Learning}, journal = {CoRR}, volume = {abs/2211.10752}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.10752}, doi = {10.48550/ARXIV.2211.10752}, eprinttype = {arXiv}, eprint = {2211.10752}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-10752.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassK22, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Private Collaborative Data Cleaning via Non-Equi {PSI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1465}, year = {2022}, url = {https://eprint.iacr.org/2022/1465}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BlassK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JohnsonK21, author = {Aaron Johnson and Florian Kerschbaum}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {1--4}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0001}, doi = {10.2478/POPETS-2021-0001}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JohnsonK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JohnsonK21a, author = {Aaron Johnson and Florian Kerschbaum}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {1--4}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0014}, doi = {10.2478/POPETS-2021-0014}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JohnsonK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JohnsonK21b, author = {Aaron Johnson and Florian Kerschbaum}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {1--4}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0034}, doi = {10.2478/POPETS-2021-0034}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JohnsonK21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JohnsonK21c, author = {Aaron Johnson and Florian Kerschbaum}, title = {Editors' Introduction}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {4}, pages = {1--5}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0057}, doi = {10.2478/POPETS-2021-0057}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JohnsonK21c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/BernauEGKK21, author = {Daniel Bernau and G{\"{u}}nther Eibl and Philip{-}William Grassal and Hannah Keller and Florian Kerschbaum}, title = {Quantifying identifiability to choose and audit epsilon in differentially private deep learning}, journal = {Proc. {VLDB} Endow.}, volume = {14}, number = {13}, pages = {3335--3347}, year = {2021}, url = {http://www.vldb.org/pvldb/vol14/p3335-bernau.pdf}, doi = {10.14778/3484224.3484231}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/BernauEGKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/SepehriK21, author = {Maryam Sepehri and Florian Kerschbaum}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Low-Cost Hiding of the Query Pattern}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {593--603}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3453103}, doi = {10.1145/3433210.3453103}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/SepehriK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeggenmannK21, author = {Benjamin Weggenmann and Florian Kerschbaum}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Differential Privacy for Directional Data}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1205--1222}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484734}, doi = {10.1145/3460120.3484734}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeggenmannK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BohlerK21, author = {Jonas B{\"{o}}hler and Florian Kerschbaum}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Secure Multi-party Computation of Differentially Private Heavy Hitters}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2361--2377}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484557}, doi = {10.1145/3460120.3484557}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BohlerK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BernauRGSK21, author = {Daniel Bernau and Jonas Robl and Philip{-}William Grassal and Steffen Schneider and Florian Kerschbaum}, editor = {Ken Barker and Kambiz Ghazinour}, title = {Comparing Local and Central Differential Privacy Using Membership Inference Attacks}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {22--42}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_2}, doi = {10.1007/978-3-030-81242-3\_2}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BernauRGSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/FuhryAK21, author = {Benny Fuhry and Jayanth Jain H. A and Florian Kerschbaum}, title = {EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {438--450}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00054}, doi = {10.1109/DSN48987.2021.00054}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/FuhryAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NgoMKW21, author = {Chan Nam Ngo and Fabio Massacci and Florian Kerschbaum and Julian Williams}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {579--598}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_30}, doi = {10.1007/978-3-662-64331-0\_30}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/NgoMKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/LukasZK21, author = {Nils Lukas and Yuxuan Zhang and Florian Kerschbaum}, title = {Deep Neural Network Fingerprinting by Conferrable Adversarial Examples}, booktitle = {9th International Conference on Learning Representations, {ICLR} 2021, Virtual Event, Austria, May 3-7, 2021}, publisher = {OpenReview.net}, year = {2021}, url = {https://openreview.net/forum?id=VqzVhqxkjH1}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iclr/LukasZK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ShafieinejadLWL21, author = {Masoumeh Shafieinejad and Nils Lukas and Jiaqi Wang and Xinda Li and Florian Kerschbaum}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {On the Robustness of Backdoor-based Watermarking in Deep Neural Networks}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {177--188}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460401}, doi = {10.1145/3437880.3460401}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ShafieinejadLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShangOPK21, author = {Zhiwei Shang and Simon Oya and Andreas Peter and Florian Kerschbaum}, title = {Obfuscated Access and Search Patterns in Searchable Encryption}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/obfuscated-access-and-search-patterns-in-searchable-encryption/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ShangOPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/ShafieinejadKI21, author = {Masoumeh Shafieinejad and Florian Kerschbaum and Ihab F. Ilyas}, editor = {Guoliang Li and Zhanhuai Li and Stratos Idreos and Divesh Srivastava}, title = {{PCOR:} Private Contextual Outlier Release via Differentially Private Search}, booktitle = {{SIGMOD} '21: International Conference on Management of Data, Virtual Event, China, June 20-25, 2021}, pages = {1571--1583}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448016.3452812}, doi = {10.1145/3448016.3452812}, timestamp = {Mon, 21 Jun 2021 11:48:16 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/ShafieinejadKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/Kerschbaum21, author = {Florian Kerschbaum}, title = {Towards Privacy in Deep Learning}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {279--280}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00031}, doi = {10.1109/TPSISA52974.2021.00031}, timestamp = {Thu, 21 Apr 2022 16:21:01 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/Kerschbaum21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OyaK21, author = {Simon Oya and Florian Kerschbaum}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {127--142}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/oya}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/OyaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/0006K21, author = {Tianhao Wang and Florian Kerschbaum}, editor = {Jure Leskovec and Marko Grobelnik and Marc Najork and Jie Tang and Leila Zia}, title = {{RIGA:} Covert and Robust White-Box Watermarking of Deep Neural Networks}, booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021}, pages = {993--1004}, publisher = {{ACM} / {IW3C2}}, year = {2021}, url = {https://doi.org/10.1145/3442381.3450000}, doi = {10.1145/3442381.3450000}, timestamp = {Mon, 07 Jun 2021 12:37:30 +0200}, biburl = {https://dblp.org/rec/conf/www/0006K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-09651, author = {Zhiwei Shang and Simon Oya and Andreas Peter and Florian Kerschbaum}, title = {Obfuscated Access and Search Patterns in Searchable Encryption}, journal = {CoRR}, volume = {abs/2102.09651}, year = {2021}, url = {https://arxiv.org/abs/2102.09651}, eprinttype = {arXiv}, eprint = {2102.09651}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-09651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02913, author = {Daniel Bernau and G{\"{u}}nther Eibl and Philip{-}William Grassal and Hannah Keller and Florian Kerschbaum}, title = {Quantifying identifiability to choose and audit {\(\epsilon\)} in differentially private deep learning}, journal = {CoRR}, volume = {abs/2103.02913}, year = {2021}, url = {https://arxiv.org/abs/2103.02913}, eprinttype = {arXiv}, eprint = {2103.02913}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05173, author = {Masoumeh Shafieinejad and Florian Kerschbaum and Ihab F. Ilyas}, title = {{PCOR:} Private Contextual Outlier Release via Differentially Private Search}, journal = {CoRR}, volume = {abs/2103.05173}, year = {2021}, url = {https://arxiv.org/abs/2103.05173}, eprinttype = {arXiv}, eprint = {2103.05173}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05173.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-05792, author = {Masoumeh Shafieinejad and Suraj Gupta and Jin Yang Liu and Koray Karabina and Florian Kerschbaum}, title = {Equi-Joins Over Encrypted Data for Series of Queries}, journal = {CoRR}, volume = {abs/2103.05792}, year = {2021}, url = {https://arxiv.org/abs/2103.05792}, eprinttype = {arXiv}, eprint = {2103.05792}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-05792.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-12407, author = {Thomas Humphries and Rasoul Akhavan Mahdavi and Shannon Veitch and Florian Kerschbaum}, title = {Selective {MPC:} Distributed Computation of Differentially Private Key Value Statistics}, journal = {CoRR}, volume = {abs/2107.12407}, year = {2021}, url = {https://arxiv.org/abs/2107.12407}, eprinttype = {arXiv}, eprint = {2107.12407}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-12407.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-04974, author = {Nils Lukas and Edward Jiang and Xinda Li and Florian Kerschbaum}, title = {SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version)}, journal = {CoRR}, volume = {abs/2108.04974}, year = {2021}, url = {https://arxiv.org/abs/2108.04974}, eprinttype = {arXiv}, eprint = {2108.04974}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-04974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-04180, author = {Simon Oya and Florian Kerschbaum}, title = {{IHOP:} Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization}, journal = {CoRR}, volume = {abs/2110.04180}, year = {2021}, url = {https://arxiv.org/abs/2110.04180}, eprinttype = {arXiv}, eprint = {2110.04180}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-04180.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-05524, author = {Jiaxiang Liu and Simon Oya and Florian Kerschbaum}, title = {Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference}, journal = {CoRR}, volume = {abs/2110.05524}, year = {2021}, url = {https://arxiv.org/abs/2110.05524}, eprinttype = {arXiv}, eprint = {2110.05524}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-05524.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassKM21, author = {Erik{-}Oliver Blass and Florian Kerschbaum and Travis Mayberry}, title = {Iterative Oblivious Pseudo-Random Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2021}, url = {https://eprint.iacr.org/2021/1013}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/0011FKB20, author = {Andreas Fischer and Benny Fuhry and Florian Kerschbaum and Eric Bodden}, title = {Computation on Encrypted Data using Dataflow Authentication}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {1}, pages = {5--25}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0002}, doi = {10.2478/POPETS-2020-0002}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/0011FKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KacsmarKKG20, author = {Bailey Kacsmar and Chelsea Komlo and Florian Kerschbaum and Ian Goldberg}, title = {Mind the Gap: Ceremonies for Applied Secret Sharing}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {2}, pages = {397--415}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0033}, doi = {10.2478/POPETS-2020-0033}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KacsmarKKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/KrastnikovKS20, author = {Simeon Krastnikov and Florian Kerschbaum and Douglas Stebila}, title = {Efficient Oblivious Database Joins}, journal = {Proc. {VLDB} Endow.}, volume = {13}, number = {11}, pages = {2132--2145}, year = {2020}, url = {http://www.vldb.org/pvldb/vol13/p2132-krastnikov.pdf}, timestamp = {Mon, 17 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/KrastnikovKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MahdaviHKKLPSOK20, author = {Rasoul Akhavan Mahdavi and Thomas Humphries and Bailey Kacsmar and Simeon Krastnikov and Nils Lukas and John A. Premkumar and Masoumeh Shafieinejad and Simon Oya and Florian Kerschbaum and Erik{-}Oliver Blass}, title = {Practical Over-Threshold Multi-Party Private Set Intersection}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {772--783}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427267}, doi = {10.1145/3427228.3427267}, timestamp = {Tue, 15 Dec 2020 12:22:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MahdaviHKKLPSOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TuenoK20, author = {Anselme Tueno and Florian Kerschbaum}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Efficient Secure Computation of Order-Preserving Encryption}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {193--207}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384739}, doi = {10.1145/3320269.3384739}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TuenoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlassK20, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{BOREALIS:} Building Block for Sealed Bid Auctions on Blockchains}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {558--571}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384752}, doi = {10.1145/3320269.3384752}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlassK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/0011JKKKB20, author = {Andreas Fischer and Jonas Janneck and J{\"{o}}rn Kussmaul and Nikolas Kr{\"{a}}tzschmar and Florian Kerschbaum and Eric Bodden}, title = {{PASAPTO:} Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {230--245}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00024}, doi = {10.1109/CSF49147.2020.00024}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/0011JKKKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/TuenoBK20, author = {Anselme Tueno and Yordan Boev and Florian Kerschbaum}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Non-interactive Private Decision Tree Evaluation}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {174--194}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_10}, doi = {10.1007/978-3-030-49669-2\_10}, timestamp = {Thu, 18 Jun 2020 13:44:27 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/TuenoBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/FuhryHKK20, author = {Benny Fuhry and Lina Hirschoff and Samuel Koesnadi and Florian Kerschbaum}, title = {SeGShare: Secure Group File Sharing in the Cloud using Enclaves}, booktitle = {50th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2020, Valencia, Spain, June 29 - July 2, 2020}, pages = {476--488}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSN48063.2020.00061}, doi = {10.1109/DSN48063.2020.00061}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/FuhryHKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KacsmarKLNSSBSO20, author = {Bailey Kacsmar and Basit Khurram and Nils Lukas and Alexander Norton and Masoumeh Shafieinejad and Zhiwei Shang and Yaser Baseri and Maryam Sepehri and Simon Oya and Florian Kerschbaum}, title = {Differentially Private Two-Party Set Operations}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {390--404}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00032}, doi = {10.1109/EUROSP48549.2020.00032}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/KacsmarKLNSSBSO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TuenoK0BQ20, author = {Anselme Tueno and Florian Kerschbaum and Stefan Katzenbeisser and Yordan Boev and Mubashir Qureshi}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Secure Computation of the k\({}^{\mbox{th}}\)-Ranked Element in a Star Network}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {386--403}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_21}, doi = {10.1007/978-3-030-51280-4\_21}, timestamp = {Wed, 22 Jul 2020 12:13:31 +0200}, biburl = {https://dblp.org/rec/conf/fc/TuenoK0BQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/KhurramK20, author = {Basit Khurram and Florian Kerschbaum}, title = {SFour: {A} Protocol for Cryptographically Secure Record Linkage at Scale}, booktitle = {36th {IEEE} International Conference on Data Engineering, {ICDE} 2020, Dallas, TX, USA, April 20-24, 2020}, pages = {277--288}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDE48307.2020.00031}, doi = {10.1109/ICDE48307.2020.00031}, timestamp = {Fri, 05 Jun 2020 17:54:38 +0200}, biburl = {https://dblp.org/rec/conf/icde/KhurramK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BohlerK20, author = {Jonas B{\"{o}}hler and Florian Kerschbaum}, title = {Secure Sublinear Time Differentially Private Median Computation}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/secure-sublinear-time-differentially-private-median-computation/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BohlerK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/Hackenjos0K20, author = {Timon Hackenjos and Florian Hahn and Florian Kerschbaum}, editor = {David Maier and Rachel Pottinger and AnHai Doan and Wang{-}Chiew Tan and Abdussalam Alawini and Hung Q. Ngo}, title = {{SAGMA:} Secure Aggregation Grouped by Multiple Attributes}, booktitle = {Proceedings of the 2020 International Conference on Management of Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020}, pages = {587--601}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3318464.3380569}, doi = {10.1145/3318464.3380569}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/Hackenjos0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BohlerK20, author = {Jonas B{\"{o}}hler and Florian Kerschbaum}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Secure Multi-party Computation of Differentially Private Median}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2147--2164}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/boehler}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/BohlerK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-05097, author = {Benny Fuhry and Jayanth Jain H. A and Florian Kerschbaum}, title = {EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves}, journal = {CoRR}, volume = {abs/2002.05097}, year = {2020}, url = {https://arxiv.org/abs/2002.05097}, eprinttype = {arXiv}, eprint = {2002.05097}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-09481, author = {Simeon Krastnikov and Florian Kerschbaum and Douglas Stebila}, title = {Efficient Oblivious Database Joins}, journal = {CoRR}, volume = {abs/2003.09481}, year = {2020}, url = {https://arxiv.org/abs/2003.09481}, eprinttype = {arXiv}, eprint = {2003.09481}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-09481.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-03465, author = {Simon Oya and Florian Kerschbaum}, title = {Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption}, journal = {CoRR}, volume = {abs/2010.03465}, year = {2020}, url = {https://arxiv.org/abs/2010.03465}, eprinttype = {arXiv}, eprint = {2010.03465}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-03465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12112, author = {Thomas Humphries and Matthew Rafuse and Lindsey Tulloch and Simon Oya and Ian Goldberg and Florian Kerschbaum}, title = {Differentially Private Learning Does Not Bound Membership Inference}, journal = {CoRR}, volume = {abs/2010.12112}, year = {2020}, url = {https://arxiv.org/abs/2010.12112}, eprinttype = {arXiv}, eprint = {2010.12112}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12112.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassK20, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2020}, url = {https://eprint.iacr.org/2020/636}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/TuenoKK19, author = {Anselme Tueno and Florian Kerschbaum and Stefan Katzenbeisser}, title = {Private Evaluation of Decision Trees using Sublinear Cost}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {1}, pages = {266--286}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0015}, doi = {10.2478/POPETS-2019-0015}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/TuenoKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/0002IK19, author = {Chang Ge and Ihab F. Ilyas and Florian Kerschbaum}, title = {Secure Multi-Party Functional Dependency Discovery}, journal = {Proc. {VLDB} Endow.}, volume = {13}, number = {2}, pages = {184--196}, year = {2019}, url = {http://www.vldb.org/pvldb/vol13/p184-ge.pdf}, doi = {10.14778/3364324.3364332}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/0002IK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KerschbaumT19, author = {Florian Kerschbaum and Anselme Tueno}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {An Efficiently Searchable Encrypted Data Structure for Range Queries}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {344--364}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_17}, doi = {10.1007/978-3-030-29962-0\_17}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KerschbaumT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangK19, author = {Tianhao Wang and Florian Kerschbaum}, title = {Attacks on Digital Watermarks for Deep Neural Networks}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019}, pages = {2622--2626}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICASSP.2019.8682202}, doi = {10.1109/ICASSP.2019.8682202}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/WangK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/0001LK19, author = {Florian Hahn and Nicolas Loza and Florian Kerschbaum}, title = {Joins Over Encrypted Data with Fine Granular Security}, booktitle = {35th {IEEE} International Conference on Data Engineering, {ICDE} 2019, Macao, China, April 8-11, 2019}, pages = {674--685}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDE.2019.00066}, doi = {10.1109/ICDE.2019.00066}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icde/0001LK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2019, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://dl.acm.org/citation.cfm?id=3322431}, isbn = {978-1-4503-6753-0}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-07745, author = {Masoumeh Shafieinejad and Jiaqi Wang and Nils Lukas and Florian Kerschbaum}, title = {On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks}, journal = {CoRR}, volume = {abs/1906.07745}, year = {2019}, url = {http://arxiv.org/abs/1906.07745}, eprinttype = {arXiv}, eprint = {1906.07745}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-07745.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08347, author = {Anselme Tueno and Florian Kerschbaum and Stefan Katzenbeisser and Yordan Boev and Mubashir Qureshi}, title = {Secure Computation of the kth-Ranked Element in a Star Network}, journal = {CoRR}, volume = {abs/1909.08347}, year = {2019}, url = {http://arxiv.org/abs/1909.08347}, eprinttype = {arXiv}, eprint = {1909.08347}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08362, author = {Anselme Tueno and Yordan Boev and Florian Kerschbaum}, title = {Non-Interactive Private Decision Tree Evaluation}, journal = {CoRR}, volume = {abs/1909.08362}, year = {2019}, url = {http://arxiv.org/abs/1909.08362}, eprinttype = {arXiv}, eprint = {1909.08362}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-14268, author = {Tianhao Wang and Florian Kerschbaum}, title = {Robust and Undetectable White-Box Watermarks for Deep Neural Networks}, journal = {CoRR}, volume = {abs/1910.14268}, year = {2019}, url = {http://arxiv.org/abs/1910.14268}, eprinttype = {arXiv}, eprint = {1910.14268}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-14268.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-00888, author = {Nils Lukas and Yuxuan Zhang and Florian Kerschbaum}, title = {Deep Neural Network Fingerprinting by Conferrable Adversarial Examples}, journal = {CoRR}, volume = {abs/1912.00888}, year = {2019}, url = {http://arxiv.org/abs/1912.00888}, eprinttype = {arXiv}, eprint = {1912.00888}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-00888.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-11328, author = {Daniel Bernau and Philip{-}William Grassal and Jonas Robl and Florian Kerschbaum}, title = {Assessing differentially private deep learning with Membership Inference}, journal = {CoRR}, volume = {abs/1912.11328}, year = {2019}, url = {http://arxiv.org/abs/1912.11328}, eprinttype = {arXiv}, eprint = {1912.11328}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-11328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassK19, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Secure Computation of the k\({}^{\mbox{th}}\)-ranked Integer on Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2019}, url = {https://eprint.iacr.org/2019/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FuhryBBHKS18, author = {Benny Fuhry and Raad Bahmani and Ferdinand Brasser and Florian Hahn and Florian Kerschbaum and Ahmad{-}Reza Sadeghi}, title = {HardIDX: Practical and secure index with {SGX} in a malicious environment}, journal = {J. Comput. Secur.}, volume = {26}, number = {5}, pages = {677--706}, year = {2018}, url = {https://doi.org/10.3233/JCS-171103}, doi = {10.3233/JCS-171103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FuhryBBHKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/KarnouskosK18, author = {Stamatis Karnouskos and Florian Kerschbaum}, title = {Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles}, journal = {Proc. {IEEE}}, volume = {106}, number = {1}, pages = {160--170}, year = {2018}, url = {https://doi.org/10.1109/JPROC.2017.2725339}, doi = {10.1109/JPROC.2017.2725339}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/KarnouskosK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BlassK18, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Strain: {A} Secure Auction for Blockchains}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {87--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_5}, doi = {10.1007/978-3-319-99073-6\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BlassK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/WeggenmannK18, author = {Benjamin Weggenmann and Florian Kerschbaum}, editor = {Kevyn Collins{-}Thompson and Qiaozhu Mei and Brian D. Davison and Yiqun Liu and Emine Yilmaz}, title = {SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining}, booktitle = {The 41st International {ACM} {SIGIR} Conference on Research {\&} Development in Information Retrieval, {SIGIR} 2018, Ann Arbor, MI, USA, July 08-12, 2018}, pages = {305--314}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209978.3210008}, doi = {10.1145/3209978.3210008}, timestamp = {Wed, 16 Sep 2020 13:34:22 +0200}, biburl = {https://dblp.org/rec/conf/sigir/WeggenmannK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/0001LK18, author = {Florian Hahn and Nicolas Loza and Florian Kerschbaum}, editor = {Gautam Das and Christopher M. Jermaine and Philip A. Bernstein}, title = {Practical and Secure Substring Search}, booktitle = {Proceedings of the 2018 International Conference on Management of Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018}, pages = {163--176}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3183713.3183754}, doi = {10.1145/3183713.3183754}, timestamp = {Wed, 21 Nov 2018 12:44:08 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/0001LK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2018, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6}, doi = {10.1007/978-3-319-95729-6}, isbn = {978-3-319-95728-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-01138, author = {Anselme Tueno and Florian Kerschbaum}, title = {Secure Range Queries for Multiple Users}, journal = {CoRR}, volume = {abs/1802.01138}, year = {2018}, url = {http://arxiv.org/abs/1802.01138}, eprinttype = {arXiv}, eprint = {1802.01138}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-01138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00904, author = {Benjamin Weggenmann and Florian Kerschbaum}, title = {SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining}, journal = {CoRR}, volume = {abs/1805.00904}, year = {2018}, url = {http://arxiv.org/abs/1805.00904}, eprinttype = {arXiv}, eprint = {1805.00904}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TuenoKBF17, author = {Anselme Tueno and Florian Kerschbaum and Daniel Bernau and Sara Foresti}, title = {Selective access for supply chain management in the cloud}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {476--482}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228710}, doi = {10.1109/CNS.2017.8228710}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/TuenoKBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BohlerBK17, author = {Jonas B{\"{o}}hler and Daniel Bernau and Florian Kerschbaum}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Privacy-Preserving Outlier Detection for Data Streams}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {225--238}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_12}, doi = {10.1007/978-3-319-61176-1\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BohlerBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KerschbaumH17, author = {Florian Kerschbaum and Martin H{\"{a}}rterich}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {325--336}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_18}, doi = {10.1007/978-3-319-61176-1\_18}, timestamp = {Mon, 10 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KerschbaumH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FuhryBB0KS17, author = {Benny Fuhry and Raad Bahmani and Ferdinand Brasser and Florian Hahn and Florian Kerschbaum and Ahmad{-}Reza Sadeghi}, editor = {Giovanni Livraga and Sencun Zhu}, title = {HardIDX: Practical and Secure Index with {SGX}}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {386--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_22}, doi = {10.1007/978-3-319-61176-1\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FuhryBB0KS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FuhryBB0KS17, author = {Benny Fuhry and Raad Bahmani and Ferdinand Brasser and Florian Hahn and Florian Kerschbaum and Ahmad{-}Reza Sadeghi}, title = {HardIDX: Practical and Secure Index with {SGX}}, journal = {CoRR}, volume = {abs/1703.04583}, year = {2017}, url = {http://arxiv.org/abs/1703.04583}, eprinttype = {arXiv}, eprint = {1703.04583}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FuhryBB0KS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-09314, author = {Florian Kerschbaum and Anselme Tueno}, title = {An Efficiently Searchable Encrypted Data Structure for Range Queries}, journal = {CoRR}, volume = {abs/1709.09314}, year = {2017}, url = {http://arxiv.org/abs/1709.09314}, eprinttype = {arXiv}, eprint = {1709.09314}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-09314.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-00390, author = {Andreas Fischer and Benny Fuhry and Florian Kerschbaum and Eric Bodden}, title = {Computation on Encrypted Data using Data Flow Authentication}, journal = {CoRR}, volume = {abs/1710.00390}, year = {2017}, url = {http://arxiv.org/abs/1710.00390}, eprinttype = {arXiv}, eprint = {1710.00390}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-00390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassK17, author = {Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Strain: {A} Secure Auction for Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2017}, url = {http://eprint.iacr.org/2017/1044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HahnK16, author = {Florian Hahn and Florian Kerschbaum}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {23--34}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996437}, doi = {10.1145/2996429.2996437}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HahnK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FuhryTK16, author = {Benny Fuhry and Walter Tighzert and Florian Kerschbaum}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Encrypting Analytical Web Applications}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996438}, doi = {10.1145/2996429.2996438}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FuhryTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumBS16, author = {Florian Kerschbaum and Erik{-}Oliver Blass and Tomas Sander}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {WISCS'16: The 3rd {ACM} Workshop on Information Sharing and Collaborative Security}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1877--1878}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990490}, doi = {10.1145/2976749.2990490}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016wiscs, editor = {Stefan Katzenbeisser and Edgar R. Weippl and Erik{-}Oliver Blass and Florian Kerschbaum}, title = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24 - 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994539}, doi = {10.1145/2994539}, isbn = {978-1-4503-4565-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016wiscs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2016, editor = {X. Sean Wang and Lujo Bauer and Florian Kerschbaum}, title = {Proceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2914642}, doi = {10.1145/2914642}, isbn = {978-1-4503-3802-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum15, author = {Florian Kerschbaum}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Frequency-Hiding Order-Preserving Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {656--667}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813629}, doi = {10.1145/2810103.2813629}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumNR15, author = {Florian Kerschbaum and Cristina Nita{-}Rotaru and Indrajit Ray}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{CCSW} 2015: The 7th {ACM} Cloud Computing Security Workshop}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1703--1704}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812620}, doi = {10.1145/2810103.2812620}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KerschbaumL15, author = {Florian Kerschbaum and Hoon Wei Lim}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Privacy-Preserving Observation in Public Spaces}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {81--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_5}, doi = {10.1007/978-3-319-24177-7\_5}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KerschbaumL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GuanRZKY15, author = {Chaowen Guan and Kui Ren and Fangguo Zhang and Florian Kerschbaum and Jia Yu}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {203--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_11}, doi = {10.1007/978-3-319-24174-6\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GuanRZKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Kerschbaum15, author = {Florian Kerschbaum}, editor = {Roger L. Wainwright and Juan Manuel Corchado and Alessio Bechini and Jiman Hong}, title = {Oblivious outsourcing of garbled circuit generation}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing, Salamanca, Spain, April 13-17, 2015}, pages = {2134--2140}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2695664.2695665}, doi = {10.1145/2695664.2695665}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Kerschbaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/HangKD15, author = {Isabelle Hang and Florian Kerschbaum and Ernesto Damiani}, editor = {Timos K. Sellis and Susan B. Davidson and Zachary G. Ives}, title = {{ENKI:} Access Control for Encrypted Query Processing}, booktitle = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on Management of Data, Melbourne, Victoria, Australia, May 31 - June 4, 2015}, pages = {183--196}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2723372.2749439}, doi = {10.1145/2723372.2749439}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/HangKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015ccsw, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Florian Kerschbaum and Cristina Nita{-}Rotaru}, title = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808425}, doi = {10.1145/2808425}, isbn = {978-1-4503-3825-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2015, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952}, doi = {10.1145/2752952}, isbn = {978-1-4503-3556-0}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Kerschbaum0S14, author = {Florian Kerschbaum and Thomas Schneider and Axel Schr{\"{o}}pfer}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Automatic Protocol Selection in Secure Two-Party Computations}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {566--584}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_33}, doi = {10.1007/978-3-319-07536-5\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Kerschbaum0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/GrofigHHKKSST14, author = {Patrick Grofig and Isabelle Hang and Martin H{\"{a}}rterich and Florian Kerschbaum and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy by Encrypted Databases}, booktitle = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF} 2014, Athens, Greece, May 20-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8450}, pages = {56--69}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06749-0\_4}, doi = {10.1007/978-3-319-06749-0\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/apf/GrofigHHKKSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumS14, author = {Florian Kerschbaum and Axel Schr{\"{o}}pfer}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimal Average-Complexity Ideal-Security Order-Preserving Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {275--286}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660277}, doi = {10.1145/2660267.2660277}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HahnK14, author = {Florian Hahn and Florian Kerschbaum}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Searchable Encryption with Secure and Efficient Updates}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {310--320}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660297}, doi = {10.1145/2660267.2660297}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HahnK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum14, author = {Florian Kerschbaum}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Client-Controlled Cloud Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1542--1543}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660577}, doi = {10.1145/2660267.2660577}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BauerK14, author = {Lujo Bauer and Florian Kerschbaum}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {127--128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613090}, doi = {10.1145/2613087.2613090}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BauerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14, author = {Andreas Schaad and Anis Bkakria and Florian Kerschbaum and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Optimized and controlled provisioning of encrypted outsourced data}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613100}, doi = {10.1145/2613087.2613100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14, author = {Patrick Grofig and Martin H{\"{a}}rterich and Isabelle Hang and Florian Kerschbaum and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {115--125}, publisher = {{GI}}, year = {2014}, url = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html}, timestamp = {Wed, 13 Jan 2021 11:09:44 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KerschbaumBS14, author = {Florian Kerschbaum and Martin Beck and Dagmar Sch{\"{o}}nfeld}, title = {Inference Control for Privacy-Preserving Genome Matching}, journal = {CoRR}, volume = {abs/1405.0205}, year = {2014}, url = {http://arxiv.org/abs/1405.0205}, eprinttype = {arXiv}, eprint = {1405.0205}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KerschbaumBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BartheHKU14, author = {Gilles Barthe and Michael Hicks and Florian Kerschbaum and Dominique Unruh}, title = {The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492)}, journal = {Dagstuhl Reports}, volume = {4}, number = {12}, pages = {29--47}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.12.29}, doi = {10.4230/DAGREP.4.12.29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BartheHKU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kerschbaum0S14, author = {Florian Kerschbaum and Thomas Schneider and Axel Schr{\"{o}}pfer}, title = {Automatic Protocol Selection in Secure Two-Party Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2014}, url = {http://eprint.iacr.org/2014/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kerschbaum0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/BeckK13, author = {Martin Beck and Florian Kerschbaum}, title = {Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity}, booktitle = {{IEEE} International Congress on Big Data, BigData Congress 2013, Santa Clara, CA, USA, June 27 2013-July 2, 2013}, pages = {31--37}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BigData.Congress.2013.14}, doi = {10.1109/BIGDATA.CONGRESS.2013.14}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/bigdata/BeckK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UrmoneitK13, author = {Raphael Urmoneit and Florian Kerschbaum}, editor = {Martin Franz and Andreas Holzer and Rupak Majumdar and Bryan Parno and Helmut Veith}, title = {Efficient secure computation optimization}, booktitle = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517872.2517873}, doi = {10.1145/2517872.2517873}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UrmoneitK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClaussSK13, author = {Sebastian Clau{\ss} and Stefan Schiffner and Florian Kerschbaum}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {\emph{k}-anonymous reputation}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {359--368}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484361}, doi = {10.1145/2484313.2484361}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ClaussSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum13, author = {Florian Kerschbaum}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {An information-flow type-system for mixed protocol secure computation}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {393--404}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484364}, doi = {10.1145/2484313.2484364}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JawurekKO13, author = {Marek Jawurek and Florian Kerschbaum and Claudio Orlandi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {955--966}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516662}, doi = {10.1145/2508859.2516662}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JawurekKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13, author = {Florian Kerschbaum and Patrick Grofig and Isabelle Hang and Martin H{\"{a}}rterich and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Adjustably encrypted in-memory column-store}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1325--1328}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512491}, doi = {10.1145/2508859.2512491}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumGHHKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Kerschbaum13, author = {Florian Kerschbaum}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Expression rewriting for optimizing secure computation}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {49--58}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435356}, doi = {10.1145/2435349.2435356}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Kerschbaum13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Patrick Grofig and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Lingyu Wang and Basit Shafiq}, title = {Optimal Re-encryption Strategy for Joins in Encrypted Databases}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {195--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_13}, doi = {10.1007/978-3-642-39256-6\_13}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Mathias Kohler and Isabelle Hang and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {An Encrypted In-Memory Column-Store: The Onion Selection Problem}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {14--26}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_2}, doi = {10.1007/978-3-642-45204-8\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KerschbaumHKHSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Kerschbaum0S13, author = {Florian Kerschbaum and Thomas Schneider and Axel Schr{\"{o}}pfer}, title = {Automatic Protocol Selection in Secure Two-Party Computations}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/automatic-protocol-selection-secure-two-party-computations}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Kerschbaum0S13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Kerschbaum13, author = {Florian Kerschbaum}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Searching over encrypted data in cloud systems}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {87--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462888}, doi = {10.1145/2462410.2462888}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Kerschbaum13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchropferSKBJ13, author = {Axel Schr{\"{o}}pfer and Andreas Schaad and Florian Kerschbaum and Heiko Boehm and Joerg Jooss}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Secure benchmarking in the cloud}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {197--200}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462430}, doi = {10.1145/2462410.2462430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SchropferSKBJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KerschbaumLG13, author = {Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Privacy-preserving billing for e-ticketing systems in public transportation}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {143--154}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517848}, doi = {10.1145/2517840.2517848}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/KerschbaumLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawurekKO13, author = {Marek Jawurek and Florian Kerschbaum and Claudio Orlandi}, title = {Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2013}, url = {http://eprint.iacr.org/2013/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JawurekKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerschbaumLG13, author = {Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko}, title = {Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2013}, url = {http://eprint.iacr.org/2013/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerschbaumLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LimKW12, author = {Hoon Wei Lim and Florian Kerschbaum and Huaxiong Wang}, title = {Workflow Signatures for Business Process Compliance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {756--769}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.38}, doi = {10.1109/TDSC.2012.38}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LimKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/Kerschbaum12, author = {Florian Kerschbaum}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy-Preserving Computation - (Position Paper)}, booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF} 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8319}, pages = {41--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-54069-1\_3}, doi = {10.1007/978-3-642-54069-1\_3}, timestamp = {Sat, 19 Oct 2019 20:10:28 +0200}, biburl = {https://dblp.org/rec/conf/apf/Kerschbaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum12, author = {Florian Kerschbaum}, editor = {Heung Youl Youm and Yoojae Won}, title = {Outsourced private set intersection using homomorphic encryption}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {85--86}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414506}, doi = {10.1145/2414456.2414506}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/StrukerK12, author = {Jens Str{\"{u}}ker and Florian Kerschbaum}, title = {From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012}, publisher = {Association for Information Systems}, year = {2012}, url = {http://aisel.aisnet.org/icis2012/proceedings/BreakthroughIdeas/2}, timestamp = {Tue, 29 Jan 2013 19:04:31 +0100}, biburl = {https://dblp.org/rec/conf/icis/StrukerK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/KerschbaumC12, author = {Florian Kerschbaum and Leonardo Weiss Ferreira Chaves}, editor = {Karl Aberer and Anupam Joshi and Sougata Mukherjea and Dipanjan Chakraborty and Hua Lu and Nalini Venkatasubramanian and Salil S. Kanhere}, title = {Encrypted Searchable Storage of {RFID} Tracking Data}, booktitle = {13th {IEEE} International Conference on Mobile Data Management, {MDM} 2012, Bengaluru, India, July 23-26, 2012}, pages = {176--185}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MDM.2012.27}, doi = {10.1109/MDM.2012.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/KerschbaumC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/JawurekK12, author = {Marek Jawurek and Florian Kerschbaum}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Fault-Tolerant Privacy-Preserving Statistics}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {221--238}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_12}, doi = {10.1007/978-3-642-31680-7\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/JawurekK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Kerschbaum12, author = {Florian Kerschbaum}, editor = {Sascha Ossowski and Paola Lecca}, title = {Collusion-resistant outsourcing of private set intersection}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {1451--1456}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2232008}, doi = {10.1145/2245276.2232008}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/Kerschbaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KerschbaumC12, author = {Florian Kerschbaum and Leonardo Weiss Ferreira Chaves}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Encryption-enforced access control for an {RFID} discovery service}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {127--130}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295161}, doi = {10.1145/2295136.2295161}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KerschbaumC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/OliveiraKLY12, author = {Anderson Santana de Oliveira and Florian Kerschbaum and Hoon Wei Lim and Su{-}Yang Yu}, title = {Privacy-Preserving Techniques and System for Streaming Databases}, booktitle = {2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012}, pages = {728--733}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SocialCom-PASSAT.2012.85}, doi = {10.1109/SOCIALCOM-PASSAT.2012.85}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/OliveiraKLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-5208, author = {Martin Beck and Florian Kerschbaum}, title = {Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity}, journal = {CoRR}, volume = {abs/1209.5208}, year = {2012}, url = {http://arxiv.org/abs/1209.5208}, eprinttype = {arXiv}, eprint = {1209.5208}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-5208.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bise/Kerschbaum11, author = {Florian Kerschbaum}, title = {Secure and Sustainable Benchmarking in Clouds - {A} Multi-Party Cloud Application with an Untrusted Service Provider}, journal = {Bus. Inf. Syst. Eng.}, volume = {3}, number = {3}, pages = {135--143}, year = {2011}, url = {https://doi.org/10.1007/s12599-011-0153-9}, doi = {10.1007/S12599-011-0153-9}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bise/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KerschbaumSZPCHSCD11, author = {Florian Kerschbaum and Axel Schr{\"{o}}pfer and Antonio Zilli and Richard Pibernik and Octavian Catrina and Sebastiaan de Hoogh and Berry Schoenmakers and Stelvio Cimato and Ernesto Damiani}, title = {Secure Collaborative Supply-Chain Management}, journal = {Computer}, volume = {44}, number = {9}, pages = {38--43}, year = {2011}, url = {https://doi.org/10.1109/MC.2011.224}, doi = {10.1109/MC.2011.224}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KerschbaumSZPCHSCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eor/PibernikZKS11, author = {Richard Pibernik and Yingying Zhang and Florian Kerschbaum and Axel Schr{\"{o}}pfer}, title = {Secure collaborative supply chain planning and inverse optimization - The {JELS} model}, journal = {Eur. J. Oper. Res.}, volume = {208}, number = {1}, pages = {75--85}, year = {2011}, url = {https://doi.org/10.1016/j.ejor.2010.08.018}, doi = {10.1016/J.EJOR.2010.08.018}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eor/PibernikZKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wi/Kerschbaum11, author = {Florian Kerschbaum}, title = {Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauensw{\"{u}}rdigen Dienstanbieter}, journal = {Wirtschaftsinf.}, volume = {53}, number = {3}, pages = {129--138}, year = {2011}, url = {https://doi.org/10.1007/s11576-011-0267-1}, doi = {10.1007/S11576-011-0267-1}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wi/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/KerschbaumC11, author = {Florian Kerschbaum and Leonardo Weiss Ferreira Chaves}, editor = {Ling Liu and Manish Parashar}, title = {Secure Sharing of Item-Level Data in the Cloud}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011, Washington, DC, USA, 4-9 July, 2011}, pages = {756--757}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CLOUD.2011.78}, doi = {10.1109/CLOUD.2011.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/KerschbaumC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum11, author = {Florian Kerschbaum}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Automatically optimizing secure computation}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {703--714}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046786}, doi = {10.1145/2046707.2046786}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchropferK11, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Demo: secure computation in JavaScript}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {849--852}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093509}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchropferK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GoodrichK11, author = {Michael T. Goodrich and Florian Kerschbaum}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {273--282}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943550}, doi = {10.1145/1943513.1943550}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/GoodrichK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SchropferKM11, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and G{\"{u}}nter M{\"{u}}ller}, title = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {298--307}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.46}, doi = {10.1109/COMPSAC.2011.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SchropferKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Kerschbaum11, author = {Florian Kerschbaum}, editor = {Yingjiu Li}, title = {Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {60--75}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_7}, doi = {10.1007/978-3-642-22348-8\_7}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/debs/Kerschbaum11, author = {Florian Kerschbaum}, editor = {David M. Eyers and Opher Etzion and Avigdor Gal and Stanley B. Zdonik and Paul Vincent}, title = {Securely disseminating {RFID} events}, booktitle = {Proceedings of the Fifth {ACM} International Conference on Distributed Event-Based Systems, {DEBS} 2011, New York, NY, USA, July 11-15, 2011}, pages = {327--334}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2002259.2002302}, doi = {10.1145/2002259.2002302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/debs/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/KerschbaumSK11, author = {Florian Kerschbaum and Jens Str{\"{u}}ker and Thomas G. Koslowski}, editor = {Dennis F. Galletta and Ting{-}Peng Liang}, title = {Confidential Information-Sharing for Automated Sustainability Benchmarks}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2011, Shanghai, China, December 4-7, 2011}, publisher = {Association for Information Systems}, year = {2011}, url = {http://aisel.aisnet.org/icis2011/proceedings/breakthroughideas/4}, timestamp = {Sun, 25 Oct 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/KerschbaumSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/JensenK11, author = {Meiko Jensen and Florian Kerschbaum}, title = {Towards Privacy-Preserving {XML} Transformation}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington, DC, USA, July 4-9, 2011}, pages = {65--72}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICWS.2011.10}, doi = {10.1109/ICWS.2011.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/JensenK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Kerschbaum11, author = {Florian Kerschbaum}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Secure conjunctive keyword searches for unstructured text}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {285--289}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060016}, doi = {10.1109/ICNSS.2011.6060016}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/Kerschbaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/JawurekJK11, author = {Marek Jawurek and Martin Johns and Florian Kerschbaum}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {Plug-In Privacy for Smart Metering Billing}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {192--210}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_11}, doi = {10.1007/978-3-642-22263-4\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/JawurekJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qest/SchropferK11, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum}, title = {Forecasting Run-Times of Secure Two-Party Computation}, booktitle = {Eighth International Conference on Quantitative Evaluation of Systems, {QEST} 2011, Aachen, Germany, 5-8 September, 2011}, pages = {181--190}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/QEST.2011.33}, doi = {10.1109/QEST.2011.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qest/SchropferK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/DreierK11, author = {Jannik Dreier and Florian Kerschbaum}, title = {Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {916--924}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.19}, doi = {10.1109/PASSAT/SOCIALCOM.2011.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/DreierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wosp/BiswasBK11, author = {Debmalya Biswas and Kathryn Bean and Florian Kerschbaum}, editor = {Samuel Kounev and Vittorio Cortellessa and Raffaela Mirandola and David J. Lilja}, title = {NAT/Firewall traversal cost model for publish-subscribe systems}, booktitle = {ICPE'11 - Second Joint {WOSP/SIPEW} International Conference on Performance Engineering, Karlsruhe, Germany, March 14-16, 2011}, pages = {487--492}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1958746.1958820}, doi = {10.1145/1958746.1958820}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wosp/BiswasBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-4602, author = {Michael T. Goodrich and Florian Kerschbaum}, title = {Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions}, journal = {CoRR}, volume = {abs/1102.4602}, year = {2011}, url = {http://arxiv.org/abs/1102.4602}, eprinttype = {arXiv}, eprint = {1102.4602}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-4602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DreierK11, author = {Jannik Dreier and Florian Kerschbaum}, title = {Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2011}, url = {http://eprint.iacr.org/2011/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DreierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Kerschbaum2010, author = {Florian Kerschbaum}, title = {A privacy-preserving benchmarking platform}, school = {Karlsruhe Institute of Technology}, year = {2010}, url = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000019077}, urn = {urn:nbn:de:swb:90-190771}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Kerschbaum2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KerschbaumS10, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {Jan Camenisch and Costas Lambrinoudakis}, title = {Searchable Encryption for Outsourced Data Analytics}, booktitle = {Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6711}, pages = {61--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22633-5\_5}, doi = {10.1007/978-3-642-22633-5\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/KerschbaumS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/WibmerBK10, author = {Michael Wibmer and Debmalya Biswas and Florian Kerschbaum}, editor = {Robert Meersman and Tharam S. Dillon and Pilar Herrero}, title = {Leakage Quantification of Cryptographic Operations}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6426}, pages = {685--700}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16934-2\_50}, doi = {10.1007/978-3-642-16934-2\_50}, timestamp = {Thu, 14 Oct 2021 10:28:29 +0200}, biburl = {https://dblp.org/rec/conf/otm/WibmerBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/FunkeK10, author = {Daniel Funke and Florian Kerschbaum}, editor = {Robert Schaefer and Carlos Cotta and Joanna Kolodziej and G{\"{u}}nter Rudolph}, title = {Privacy-Preserving Multi-Objective Evolutionary Algorithms}, booktitle = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International Conference, Krak{\'{o}}w, Poland, September 11-15, 2010. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6239}, pages = {41--50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15871-1\_5}, doi = {10.1007/978-3-642-15871-1\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/FunkeK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/KerschbaumO10, author = {Florian Kerschbaum and Nina Oertel}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Privacy-Preserving Pattern Matching for Anomaly Detection in {RFID} Anti-Counterfeiting}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {124--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_12}, doi = {10.1007/978-3-642-16822-2\_12}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/KerschbaumO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Kerschbaum10, author = {Florian Kerschbaum}, editor = {James B. D. Joshi and Barbara Carminati}, title = {An access control model for mobile physical objects}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {193--202}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809873}, doi = {10.1145/1809842.1809873}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Kerschbaum10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/BiswasHK10, author = {Debmalya Biswas and Stephan Haller and Florian Kerschbaum}, editor = {Kuo{-}Ming Chao and Christian Huemer and Birgit Hofreiter and Yinsheng Li and Nazaraf Shah}, title = {Privacy-Preserving Outsourced Profiling}, booktitle = {12th {IEEE} Conference on Commerce and Enterprise Computing, {CEC} 2010, Shanghai, China, November 10-12, 2010}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CEC.2010.39}, doi = {10.1109/CEC.2010.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/BiswasHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KerschbaumOC10, author = {Florian Kerschbaum and Nina Oertel and Leonardo Weiss Ferreira Chaves}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Privacy-preserving computation of benchmarks on item-level data using {RFID}}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {105--110}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741884}, doi = {10.1145/1741866.1741884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KerschbaumOC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FlegelKMMWL10, author = {Ulrich Flegel and Florian Kerschbaum and Philip Miseldine and Ganna Monakova and Richard Wacker and Frank Leymann}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {139--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_7}, doi = {10.1007/978-1-4419-7133-3\_7}, timestamp = {Fri, 02 Nov 2018 09:27:00 +0100}, biburl = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2248, author = {Marek Jawurek and Martin Johns and Florian Kerschbaum}, title = {Plug-in privacy for Smart Metering billing}, journal = {CoRR}, volume = {abs/1012.2248}, year = {2010}, url = {http://arxiv.org/abs/1012.2248}, eprinttype = {arXiv}, eprint = {1012.2248}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2248.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FunkeK10, author = {Daniel Funke and Florian Kerschbaum}, title = {Privacy-Preserving Multi-Objective Evolutionary Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2010}, url = {http://eprint.iacr.org/2010/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FunkeK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchropferKM10, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and G{\"{u}}nter M{\"{u}}ller}, title = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2010}, url = {http://eprint.iacr.org/2010/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchropferKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/DeitosK09, author = {Rafael Deitos and Florian Kerschbaum}, title = {Parallelizing secure linear programming}, journal = {Concurr. Comput. Pract. Exp.}, volume = {21}, number = {10}, pages = {1321--1350}, year = {2009}, url = {https://doi.org/10.1002/cpe.1424}, doi = {10.1002/CPE.1424}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/DeitosK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/KerschbaumR09, author = {Florian Kerschbaum and Philip Robinson}, title = {Security architecture for virtual organizations of business web services}, journal = {J. Syst. Archit.}, volume = {55}, number = {4}, pages = {224--232}, year = {2009}, url = {https://doi.org/10.1016/j.sysarc.2008.10.001}, doi = {10.1016/J.SYSARC.2008.10.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/KerschbaumR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/SchropferKSP09, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and Christoph G. Sch{\"{u}}tz and Richard Pibernik}, title = {Optimizations for Risk-Aware Secure Supply Chain Master Planning}, journal = {J. Univers. Comput. Sci.}, volume = {15}, number = {15}, pages = {3019--3037}, year = {2009}, url = {https://doi.org/10.3217/jucs-015-15-3019}, doi = {10.3217/JUCS-015-15-3019}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/SchropferKSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/Kerschbaum09, author = {Florian Kerschbaum}, title = {Adapting Privacy-Preserving Computation to the Service Provider Model}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {34--41}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.261}, doi = {10.1109/CSE.2009.261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/Kerschbaum09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/DeitosK09, author = {Rafael Deitos and Florian Kerschbaum}, editor = {A Min Tjoa and Roland R. Wagner}, title = {Improving Practical Performance on Secure and Private Collaborative Linear Programming}, booktitle = {Database and Expert Systems Applications, DEXA, International Workshops, Linz, Austria, August 31-September 4, 2009, Proceedings}, pages = {122--126}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DEXA.2009.32}, doi = {10.1109/DEXA.2009.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/DeitosK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/KerschbaumBH09, author = {Florian Kerschbaum and Debmalya Biswas and Sebastiaan de Hoogh}, editor = {A Min Tjoa and Roland R. Wagner}, title = {Performance Comparison of Secure Comparison Protocols}, booktitle = {Database and Expert Systems Applications, DEXA, International Workshops, Linz, Austria, August 31-September 4, 2009, Proceedings}, pages = {133--136}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DEXA.2009.37}, doi = {10.1109/DEXA.2009.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/KerschbaumBH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/AccorsiDIK09, author = {Rafael Accorsi and Ernesto Damiani and Frank Innerhofer{-}Oberperfler and Florian Kerschbaum}, title = {Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09)}, booktitle = {Workshops Proceedings of the 12th {IEEE} International Enterprise Distributed Object Computing Conference, EDOCw 2009, 1-4 September 2009, Auckland, New Zealand}, pages = {166--167}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/EDOCW.2009.5331995}, doi = {10.1109/EDOCW.2009.5331995}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/edoc/AccorsiDIK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KerschbaumSB09, author = {Florian Kerschbaum and Andreas Schaad and Debmalya Biswas}, title = {Practical privacy-preserving protocols for criminal investigations}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings}, pages = {197--199}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISI.2009.5137301}, doi = {10.1109/ISI.2009.5137301}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/KerschbaumSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/KerschbaumDSB09, author = {Florian Kerschbaum and Daniel Dahlmeier and Axel Schr{\"{o}}pfer and Debmalya Biswas}, editor = {Sung Y. Shin and Sascha Ossowski}, title = {On the practical importance of communication complexity for secure multi-party computation protocols}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009}, pages = {2008--2015}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1529282.1529730}, doi = {10.1145/1529282.1529730}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/KerschbaumDSB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/SchropferKSP09, author = {Axel Schr{\"{o}}pfer and Florian Kerschbaum and Dagmar Sadkowiak and Richard Pibernik}, editor = {Alfonso Rodr{\'{\i}}guez and Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Risk-Aware Secure Supply Chain Master Planning}, booktitle = {Security in Information Systems, Proceedings of the 7th International Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction with {ICEIS} 2009, Milan, Italy, May 2009}, pages = {46--56}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 03 Dec 2019 11:56:05 +0100}, biburl = {https://dblp.org/rec/conf/sis/SchropferKSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/KerschbaumS09, author = {Florian Kerschbaum and Alessandro Sorniotti}, editor = {David A. Basin and Srdjan Capkun and Wenke Lee}, title = {RFID-based supply chain partner authentication and key agreement}, booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security, {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009}, pages = {41--50}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1514274.1514281}, doi = {10.1145/1514274.1514281}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/KerschbaumS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/Kerschbaum09, author = {Florian Kerschbaum}, editor = {Ehab Al{-}Shaer and Stefano Paraboschi}, title = {A verifiable, centralized, coercion-free reputation system}, booktitle = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {61--70}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655188.1655197}, doi = {10.1145/1655188.1655197}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/Kerschbaum09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/Kerschbaum08, author = {Florian Kerschbaum}, title = {Building a privacy-preserving benchmarking enterprise system}, journal = {Enterp. Inf. Syst.}, volume = {2}, number = {4}, pages = {421--441}, year = {2008}, url = {https://doi.org/10.1080/17517570802372468}, doi = {10.1080/17517570802372468}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/Kerschbaum08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CatrinaK08, author = {Octavian Catrina and Florian Kerschbaum}, title = {Fostering the Uptake of Secure Multiparty Computation in E-Commerce}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {693--700}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.49}, doi = {10.1109/ARES.2008.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CatrinaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/ChavesK08, author = {Leonardo Weiss Ferreira Chaves and Florian Kerschbaum}, editor = {Marten van Sinderen and Jo{\~{a}}o Paulo A. Almeida and Lu{\'{\i}}s Ferreira Pires and Maarten Steen}, title = {Industrial Privacy in RFID-based Batch Recalls}, booktitle = {Workshops Proceedings of the 12th International {IEEE} Enterprise Distributed Object Computing Conference, {ECOCW} 2008, 16 September 2008, Munich, Germany}, pages = {192--198}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EDOCW.2008.37}, doi = {10.1109/EDOCW.2008.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/ChavesK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Kerschbaum08, author = {Florian Kerschbaum}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Practical Privacy-Preserving Benchmarking}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {17--31}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_2}, doi = {10.1007/978-0-387-09699-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Kerschbaum08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/KerschbaumD08, author = {Florian Kerschbaum and Rafael Deitos}, editor = {Ernesto Damiani and Seth Proctor}, title = {Security against the business partner}, booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456492.1456493}, doi = {10.1145/1456492.1456493}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/KerschbaumD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/KerschbaumV08, author = {Florian Kerschbaum and Julien Vayssi{\`{e}}re}, editor = {Ernesto Damiani and Seth Proctor}, title = {Privacy-preserving data analytics as an outsourced service}, booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {87--96}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456492.1456506}, doi = {10.1145/1456492.1456506}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/KerschbaumV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KerschbaumS08, author = {Florian Kerschbaum and Andreas Schaad}, editor = {Vijay Atluri and Marianne Winslett}, title = {Privacy-preserving social network analysis for criminal investigations}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {9--14}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456406}, doi = {10.1145/1456403.1456406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/KerschbaumS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/FlegelKW08, author = {Ulrich Flegel and Florian Kerschbaum and Richard Wacker}, editor = {Matt Bishop and Dieter Gollmann and Jeffrey Hunker and Christian W. Probst}, title = {Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}, booktitle = {Countering Insider Threats, 20.07. - 25.07.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08302}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1794/}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/FlegelKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/Kerschbaum07, author = {Florian Kerschbaum}, title = {Building a Privacy-Preserving Benchmarking Enterprise System}, booktitle = {11th {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland, {USA}}, pages = {87--96}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/EDOC.2007.13}, doi = {10.1109/EDOC.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/Kerschbaum07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/KerschbaumV07, author = {Florian Kerschbaum and Julien Vayssi{\`{e}}re}, title = {Privacy-preserving logical vector clocks using secure computation techniques}, booktitle = {13th International Conference on Parallel and Distributed Systems, {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICPADS.2007.4447773}, doi = {10.1109/ICPADS.2007.4447773}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/KerschbaumV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Kerschbaum07, author = {Florian Kerschbaum}, title = {Simple cross-site attack prevention}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {464--472}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550368}, doi = {10.1109/SECCOM.2007.4550368}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Kerschbaum07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/Kerschbaum07, author = {Florian Kerschbaum}, editor = {Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {A New Way to Think About Secure Computation: Language-based Secure Computation}, booktitle = {Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007}, pages = {33--42}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Thu, 24 Jan 2008 19:53:15 +0100}, biburl = {https://dblp.org/rec/conf/sis/Kerschbaum07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/KerschbaumDR07, author = {Florian Kerschbaum and Rafael Deitos and Philip Robinson}, editor = {Costas Lambrinoudakis and G{\"{u}}nther Pernul and A Min Tjoa}, title = {Securing {VO} Management}, booktitle = {Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4657}, pages = {14--23}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74409-2\_4}, doi = {10.1007/978-3-540-74409-2\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/KerschbaumDR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/Kerschbaum07, author = {Florian Kerschbaum}, editor = {Peng Ning and Ting Yu}, title = {Distance-preserving pseudonymization for timestamps and spatial data}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {68--71}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314346}, doi = {10.1145/1314333.1314346}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/Kerschbaum07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RobinsonKS06, author = {Philip Robinson and Florian Kerschbaum and Andreas Schaad}, editor = {Ernesto Damiani and Peng Liu}, title = {From Business Process Choreography to Authorization Policies}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {297--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_21}, doi = {10.1007/11805588\_21}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RobinsonKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/etrics/KerschbaumT06, author = {Florian Kerschbaum and Orestis Terzidis}, editor = {G{\"{u}}nter M{\"{u}}ller}, title = {Filtering for Private Collaborative Benchmarking}, booktitle = {Emerging Trends in Information and Communication Security, International Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3995}, pages = {409--422}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11766155\_29}, doi = {10.1007/11766155\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/etrics/KerschbaumT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/KerschbaumHKR06, author = {Florian Kerschbaum and Jochen Haller and Y{\"{u}}cel Karabulut and Philip Robinson}, editor = {Ketil St{\o}len and William H. Winsborough and Fabio Martinelli and Fabio Massacci}, title = {PathTrust: {A} Trust-Based Reputation Service for Virtual Organization Formation}, booktitle = {Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3986}, pages = {193--205}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11755593\_15}, doi = {10.1007/11755593\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/KerschbaumHKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Kerschbaum06, author = {Florian Kerschbaum}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Practical Private Regular Expression Matching}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {461--470}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_43}, doi = {10.1007/0-387-33406-8\_43}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/Kerschbaum06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/DeitosKR06, author = {Rafael Deitos and Florian Kerschbaum and Philip Robinson}, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {A comprehensive security architecture for dynamic, web service based virtual organizations for businesses}, booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {103--104}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180367.1180386}, doi = {10.1145/1180367.1180386}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/DeitosKR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KarabulutKMRY07, author = {Y{\"{u}}cel Karabulut and Florian Kerschbaum and Fabio Massacci and Philip Robinson and Artsiom Yautsiukhin}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Security and Trust in {IT} Business Outsourcing: a Manifesto}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {47--58}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.030}, doi = {10.1016/J.ENTCS.2006.08.030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/KarabulutKMRY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icba/KerschbaumAMR04, author = {Florian Kerschbaum and Mikhail J. Atallah and David M'Ra{\"{\i}}hi and John R. Rice}, editor = {David Zhang and Anil K. Jain}, title = {Private Fingerprint Verification without Local Storage}, booktitle = {Biometric Authentication, First International Conference, {ICBA} 2004, Hong Kong, China, July 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3072}, pages = {387--394}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25948-0\_54}, doi = {10.1007/978-3-540-25948-0\_54}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icba/KerschbaumAMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KamaraFSKF03, author = {Seny Kamara and Sonia Fahmy and E. Eugene Schultz and Florian Kerschbaum and Michael Frantzen}, title = {Analysis of vulnerabilities in Internet firewalls}, journal = {Comput. Secur.}, volume = {22}, number = {3}, pages = {214--232}, year = {2003}, url = {https://doi.org/10.1016/S0167-4048(03)00310-9}, doi = {10.1016/S0167-4048(03)00310-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KamaraFSKF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/AtallahKD03, author = {Mikhail J. Atallah and Florian Kerschbaum and Wenliang Du}, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {Secure and private sequence comparisons}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, pages = {39--44}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1005140.1005147}, doi = {10.1145/1005140.1005147}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/AtallahKD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KerschbaumSZ02, author = {Florian Kerschbaum and Eugene H. Spafford and Diego Zamboni}, title = {Using Internal Sensors and Embedded Detectors for Intrusion Detection}, journal = {J. Comput. Secur.}, volume = {10}, number = {1/2}, pages = {23--70}, year = {2002}, url = {https://doi.org/10.3233/jcs-2002-101-203}, doi = {10.3233/JCS-2002-101-203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KerschbaumSZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrantzenKSF01, author = {Michael Frantzen and Florian Kerschbaum and E. Eugene Schultz and Sonia Fahmy}, title = {A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals}, journal = {Comput. Secur.}, volume = {20}, number = {3}, pages = {263--270}, year = {2001}, url = {https://doi.org/10.1016/S0167-4048(01)00314-5}, doi = {10.1016/S0167-4048(01)00314-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrantzenKSF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AtallahRCHKMN01, author = {Mikhail J. Atallah and Victor Raskin and Michael Crogan and Christian Hempelmann and Florian Kerschbaum and Dina Mohamed and Sanket Naik}, editor = {Ira S. Moskowitz}, title = {Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation}, booktitle = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2137}, pages = {185--199}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45496-9\_14}, doi = {10.1007/3-540-45496-9\_14}, timestamp = {Wed, 16 Mar 2022 23:55:28 +0100}, biburl = {https://dblp.org/rec/conf/ih/AtallahRCHKMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.