BibTeX records: Florian Kerschbaum

download as .bib file

@article{DBLP:journals/jcs/FuhryBBHKS18,
  author    = {Benny Fuhry and
               Raad Bahmani and
               Ferdinand Brasser and
               Florian Hahn and
               Florian Kerschbaum and
               Ahmad{-}Reza Sadeghi},
  title     = {HardIDX: Practical and secure index with {SGX} in a malicious environment},
  journal   = {Journal of Computer Security},
  volume    = {26},
  number    = {5},
  pages     = {677--706},
  year      = {2018},
  url       = {https://doi.org/10.3233/JCS-171103},
  doi       = {10.3233/JCS-171103},
  timestamp = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/FuhryBBHKS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/KarnouskosK18,
  author    = {Stamatis Karnouskos and
               Florian Kerschbaum},
  title     = {Privacy and Integrity Considerations in Hyperconnected Autonomous
               Vehicles},
  journal   = {Proceedings of the {IEEE}},
  volume    = {106},
  number    = {1},
  pages     = {160--170},
  year      = {2018},
  url       = {https://doi.org/10.1109/JPROC.2017.2725339},
  doi       = {10.1109/JPROC.2017.2725339},
  timestamp = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/pieee/KarnouskosK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlassK18,
  author    = {Erik{-}Oliver Blass and
               Florian Kerschbaum},
  title     = {Strain: {A} Secure Auction for Blockchains},
  booktitle = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {I}},
  pages     = {87--110},
  year      = {2018},
  crossref  = {DBLP:conf/esorics/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-99073-6\_5},
  doi       = {10.1007/978-3-319-99073-6\_5},
  timestamp = {Mon, 13 Aug 2018 14:33:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/BlassK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/WeggenmannK18,
  author    = {Benjamin Weggenmann and
               Florian Kerschbaum},
  title     = {SynTF: Synthetic and Differentially Private Term Frequency Vectors
               for Privacy-Preserving Text Mining},
  booktitle = {The 41st International {ACM} {SIGIR} Conference on Research {\&}
               Development in Information Retrieval, {SIGIR} 2018, Ann Arbor, MI,
               USA, July 08-12, 2018},
  pages     = {305--314},
  year      = {2018},
  crossref  = {DBLP:conf/sigir/2018},
  url       = {https://doi.org/10.1145/3209978.3210008},
  doi       = {10.1145/3209978.3210008},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigir/WeggenmannK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/0001LK18,
  author    = {Florian Hahn and
               Nicolas Loza and
               Florian Kerschbaum},
  title     = {Practical and Secure Substring Search},
  booktitle = {Proceedings of the 2018 International Conference on Management of
               Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018},
  pages     = {163--176},
  year      = {2018},
  crossref  = {DBLP:conf/sigmod/2018},
  url       = {https://doi.org/10.1145/3183713.3183754},
  doi       = {10.1145/3183713.3183754},
  timestamp = {Wed, 21 Nov 2018 12:44:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/0001LK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2018,
  editor    = {Florian Kerschbaum and
               Stefano Paraboschi},
  title     = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10980},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-95729-6},
  doi       = {10.1007/978-3-319-95729-6},
  isbn      = {978-3-319-95728-9},
  timestamp = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-01138,
  author    = {Anselme Tueno and
               Florian Kerschbaum},
  title     = {Secure Range Queries for Multiple Users},
  journal   = {CoRR},
  volume    = {abs/1802.01138},
  year      = {2018},
  url       = {http://arxiv.org/abs/1802.01138},
  archivePrefix = {arXiv},
  eprint    = {1802.01138},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1802-01138},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00904,
  author    = {Benjamin Weggenmann and
               Florian Kerschbaum},
  title     = {SynTF: Synthetic and Differentially Private Term Frequency Vectors
               for Privacy-Preserving Text Mining},
  journal   = {CoRR},
  volume    = {abs/1805.00904},
  year      = {2018},
  url       = {http://arxiv.org/abs/1805.00904},
  archivePrefix = {arXiv},
  eprint    = {1805.00904},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1805-00904},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TuenoKBF17,
  author    = {Anselme Tueno and
               Florian Kerschbaum and
               Daniel Bernau and
               Sara Foresti},
  title     = {Selective access for supply chain management in the cloud},
  booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
               2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages     = {476--482},
  year      = {2017},
  crossref  = {DBLP:conf/cns/2017},
  url       = {https://doi.org/10.1109/CNS.2017.8228710},
  doi       = {10.1109/CNS.2017.8228710},
  timestamp = {Sat, 23 Dec 2017 19:06:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/TuenoKBF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BohlerBK17,
  author    = {Jonas B{\"{o}}hler and
               Daniel Bernau and
               Florian Kerschbaum},
  title     = {Privacy-Preserving Outlier Detection for Data Streams},
  booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
               2017, Proceedings},
  pages     = {225--238},
  year      = {2017},
  crossref  = {DBLP:conf/dbsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-61176-1\_12},
  doi       = {10.1007/978-3-319-61176-1\_12},
  timestamp = {Mon, 10 Jul 2017 21:33:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/BohlerBK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumH17,
  author    = {Florian Kerschbaum and
               Martin H{\"{a}}rterich},
  title     = {Searchable Encryption to Reduce Encryption Degradation in Adjustably
               Encrypted Databases},
  booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
               2017, Proceedings},
  pages     = {325--336},
  year      = {2017},
  crossref  = {DBLP:conf/dbsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-61176-1\_18},
  doi       = {10.1007/978-3-319-61176-1\_18},
  timestamp = {Mon, 10 Jul 2017 21:33:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/KerschbaumH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FuhryBB0KS17,
  author    = {Benny Fuhry and
               Raad Bahmani and
               Ferdinand Brasser and
               Florian Hahn and
               Florian Kerschbaum and
               Ahmad{-}Reza Sadeghi},
  title     = {HardIDX: Practical and Secure Index with {SGX}},
  booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
               2017, Proceedings},
  pages     = {386--408},
  year      = {2017},
  crossref  = {DBLP:conf/dbsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-61176-1\_22},
  doi       = {10.1007/978-3-319-61176-1\_22},
  timestamp = {Mon, 10 Jul 2017 21:33:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/FuhryBB0KS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FuhryBB0KS17,
  author    = {Benny Fuhry and
               Raad Bahmani and
               Ferdinand Brasser and
               Florian Hahn and
               Florian Kerschbaum and
               Ahmad{-}Reza Sadeghi},
  title     = {HardIDX: Practical and Secure Index with {SGX}},
  journal   = {CoRR},
  volume    = {abs/1703.04583},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.04583},
  archivePrefix = {arXiv},
  eprint    = {1703.04583},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/FuhryBB0KS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-09314,
  author    = {Florian Kerschbaum and
               Anselme Tueno},
  title     = {An Efficiently Searchable Encrypted Data Structure for Range Queries},
  journal   = {CoRR},
  volume    = {abs/1709.09314},
  year      = {2017},
  url       = {http://arxiv.org/abs/1709.09314},
  archivePrefix = {arXiv},
  eprint    = {1709.09314},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1709-09314},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-00390,
  author    = {Andreas Fischer and
               Benny Fuhry and
               Florian Kerschbaum and
               Eric Bodden},
  title     = {Computation on Encrypted Data using Data Flow Authentication},
  journal   = {CoRR},
  volume    = {abs/1710.00390},
  year      = {2017},
  url       = {http://arxiv.org/abs/1710.00390},
  archivePrefix = {arXiv},
  eprint    = {1710.00390},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1710-00390},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassK17,
  author    = {Erik{-}Oliver Blass and
               Florian Kerschbaum},
  title     = {Strain: {A} Secure Auction for Blockchains},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1044},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1044},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BlassK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HahnK16,
  author    = {Florian Hahn and
               Florian Kerschbaum},
  title     = {Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage},
  booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages     = {23--34},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016ccsw},
  url       = {https://doi.org/10.1145/2996429.2996437},
  doi       = {10.1145/2996429.2996437},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HahnK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FuhryTK16,
  author    = {Benny Fuhry and
               Walter Tighzert and
               Florian Kerschbaum},
  title     = {Encrypting Analytical Web Applications},
  booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages     = {35--46},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016ccsw},
  url       = {https://doi.org/10.1145/2996429.2996438},
  doi       = {10.1145/2996429.2996438},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/FuhryTK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumBS16,
  author    = {Florian Kerschbaum and
               Erik{-}Oliver Blass and
               Tomas Sander},
  title     = {WISCS'16: The 3rd {ACM} Workshop on Information Sharing and Collaborative
               Security},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1877--1878},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {https://doi.org/10.1145/2976749.2990490},
  doi       = {10.1145/2976749.2990490},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KerschbaumBS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016wiscs,
  editor    = {Stefan Katzenbeisser and
               Edgar R. Weippl and
               Erik{-}Oliver Blass and
               Florian Kerschbaum},
  title     = {Proceedings of the 2016 {ACM} on Workshop on Information Sharing and
               Collaborative Security, {WISCS} 2016, Vienna, Austria, October 24
               - 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2994539},
  doi       = {10.1145/2994539},
  isbn      = {978-1-4503-4565-1},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016wiscs},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2016,
  editor    = {X. Sean Wang and
               Lujo Bauer and
               Florian Kerschbaum},
  title     = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2914642},
  doi       = {10.1145/2914642},
  isbn      = {978-1-4503-3802-8},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum15,
  author    = {Florian Kerschbaum},
  title     = {Frequency-Hiding Order-Preserving Encryption},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {656--667},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2813629},
  doi       = {10.1145/2810103.2813629},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Kerschbaum15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumNR15,
  author    = {Florian Kerschbaum and
               Cristina Nita{-}Rotaru and
               Indrajit Ray},
  title     = {{CCSW} 2015: The 7th {ACM} Cloud Computing Security Workshop},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1703--1704},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {https://doi.org/10.1145/2810103.2812620},
  doi       = {10.1145/2810103.2812620},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KerschbaumNR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KerschbaumL15,
  author    = {Florian Kerschbaum and
               Hoon Wei Lim},
  title     = {Privacy-Preserving Observation in Public Spaces},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {II}},
  pages     = {81--100},
  year      = {2015},
  crossref  = {DBLP:conf/esorics/2015-2},
  url       = {https://doi.org/10.1007/978-3-319-24177-7\_5},
  doi       = {10.1007/978-3-319-24177-7\_5},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/KerschbaumL15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuanRZKY15,
  author    = {Chaowen Guan and
               Kui Ren and
               Fangguo Zhang and
               Florian Kerschbaum and
               Jia Yu},
  title     = {Symmetric-Key Based Proofs of Retrievability Supporting Public Verification},
  booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  pages     = {203--223},
  year      = {2015},
  crossref  = {DBLP:conf/esorics/2015-1},
  url       = {https://doi.org/10.1007/978-3-319-24174-6\_11},
  doi       = {10.1007/978-3-319-24174-6\_11},
  timestamp = {Sat, 24 Nov 2018 11:59:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/GuanRZKY15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Kerschbaum15,
  author    = {Florian Kerschbaum},
  title     = {Oblivious outsourcing of garbled circuit generation},
  booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
               Salamanca, Spain, April 13-17, 2015},
  pages     = {2134--2140},
  year      = {2015},
  crossref  = {DBLP:conf/sac/2015},
  url       = {https://doi.org/10.1145/2695664.2695665},
  doi       = {10.1145/2695664.2695665},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/Kerschbaum15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/HangKD15,
  author    = {Isabelle Hang and
               Florian Kerschbaum and
               Ernesto Damiani},
  title     = {{ENKI:} Access Control for Encrypted Query Processing},
  booktitle = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on
               Management of Data, Melbourne, Victoria, Australia, May 31 - June
               4, 2015},
  pages     = {183--196},
  year      = {2015},
  crossref  = {DBLP:conf/sigmod/2015},
  url       = {https://doi.org/10.1145/2723372.2749439},
  doi       = {10.1145/2723372.2749439},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/HangKD15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015ccsw,
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren and
               Florian Kerschbaum and
               Cristina Nita{-}Rotaru},
  title     = {Proceedings of the 2015 {ACM} Workshop on Cloud Computing Security
               Workshop, {CCSW} 2015, Denver, Colorado, USA, October 16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808425},
  doi       = {10.1145/2808425},
  isbn      = {978-1-4503-3825-7},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2015,
  editor    = {Edgar R. Weippl and
               Florian Kerschbaum and
               Adam J. Lee},
  title     = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2752952},
  doi       = {10.1145/2752952},
  isbn      = {978-1-4503-3556-0},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Kerschbaum0S14,
  author    = {Florian Kerschbaum and
               Thomas Schneider and
               Axel Schr{\"{o}}pfer},
  title     = {Automatic Protocol Selection in Secure Two-Party Computations},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {566--584},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5\_33},
  doi       = {10.1007/978-3-319-07536-5\_33},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/Kerschbaum0S14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/GrofigHHKKSST14,
  author    = {Patrick Grofig and
               Isabelle Hang and
               Martin H{\"{a}}rterich and
               Florian Kerschbaum and
               Mathias Kohler and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  title     = {Privacy by Encrypted Databases},
  booktitle = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
               2014, Athens, Greece, May 20-21, 2014. Proceedings},
  pages     = {56--69},
  year      = {2014},
  crossref  = {DBLP:conf/apf/2014},
  url       = {https://doi.org/10.1007/978-3-319-06749-0\_4},
  doi       = {10.1007/978-3-319-06749-0\_4},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apf/GrofigHHKKSST14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumS14,
  author    = {Florian Kerschbaum and
               Axel Schr{\"{o}}pfer},
  title     = {Optimal Average-Complexity Ideal-Security Order-Preserving Encryption},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {275--286},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660277},
  doi       = {10.1145/2660267.2660277},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KerschbaumS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HahnK14,
  author    = {Florian Hahn and
               Florian Kerschbaum},
  title     = {Searchable Encryption with Secure and Efficient Updates},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {310--320},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660297},
  doi       = {10.1145/2660267.2660297},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/HahnK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum14,
  author    = {Florian Kerschbaum},
  title     = {Client-Controlled Cloud Encryption},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {1542--1543},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660577},
  doi       = {10.1145/2660267.2660577},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Kerschbaum14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BauerK14,
  author    = {Lujo Bauer and
               Florian Kerschbaum},
  title     = {What are the most important challenges for access control in new computing
               domains, such as mobile, cloud and cyber-physical systems?},
  booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '14, London, ON, Canada - June 25 - 27, 2014},
  pages     = {127--128},
  year      = {2014},
  crossref  = {DBLP:conf/sacmat/2014},
  url       = {https://doi.org/10.1145/2613087.2613090},
  doi       = {10.1145/2613087.2613090},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/BauerK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14,
  author    = {Andreas Schaad and
               Anis Bkakria and
               Florian Kerschbaum and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia and
               David Gross{-}Amblard},
  title     = {Optimized and controlled provisioning of encrypted outsourced data},
  booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '14, London, ON, Canada - June 25 - 27, 2014},
  pages     = {141--152},
  year      = {2014},
  crossref  = {DBLP:conf/sacmat/2014},
  url       = {https://doi.org/10.1145/2613087.2613100},
  doi       = {10.1145/2613087.2613100},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/SchaadBKCCG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14,
  author    = {Patrick Grofig and
               Martin H{\"{a}}rterich and
               Isabelle Hang and
               Florian Kerschbaum and
               Mathias Kohler and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  title     = {Experiences and observations on the industrial implementation of a
               system to search over outsourced encrypted data},
  booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
               Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
               der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
               2014, Wien, {\"{O}}sterreich},
  pages     = {115--125},
  year      = {2014},
  crossref  = {DBLP:conf/sicherheit/2014},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html},
  timestamp = {Tue, 15 Mar 2016 11:26:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sicherheit/GrofigHHKKSST14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KerschbaumBS14,
  author    = {Florian Kerschbaum and
               Martin Beck and
               Dagmar Sch{\"{o}}nfeld},
  title     = {Inference Control for Privacy-Preserving Genome Matching},
  journal   = {CoRR},
  volume    = {abs/1405.0205},
  year      = {2014},
  url       = {http://arxiv.org/abs/1405.0205},
  archivePrefix = {arXiv},
  eprint    = {1405.0205},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KerschbaumBS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BartheHKU14,
  author    = {Gilles Barthe and
               Michael Hicks and
               Florian Kerschbaum and
               Dominique Unruh},
  title     = {The Synergy Between Programming Languages and Cryptography (Dagstuhl
               Seminar 14492)},
  journal   = {Dagstuhl Reports},
  volume    = {4},
  number    = {12},
  pages     = {29--47},
  year      = {2014},
  url       = {https://doi.org/10.4230/DagRep.4.12.29},
  doi       = {10.4230/DagRep.4.12.29},
  timestamp = {Sun, 03 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dagstuhl-reports/BartheHKU14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kerschbaum0S14,
  author    = {Florian Kerschbaum and
               Thomas Schneider and
               Axel Schr{\"{o}}pfer},
  title     = {Automatic Protocol Selection in Secure Two-Party Computations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {200},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/200},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Kerschbaum0S14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/BeckK13,
  author    = {Martin Beck and
               Florian Kerschbaum},
  title     = {Approximate Two-Party Privacy-Preserving String Matching with Linear
               Complexity},
  booktitle = {{IEEE} International Congress on Big Data, BigData Congress 2013,
               Santa Clara, CA, USA, June 27 2013-July 2, 2013},
  pages     = {31--37},
  year      = {2013},
  crossref  = {DBLP:conf/bigdata/2013},
  url       = {https://doi.org/10.1109/BigData.Congress.2013.14},
  doi       = {10.1109/BigData.Congress.2013.14},
  timestamp = {Wed, 11 Jul 2018 09:39:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bigdata/BeckK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/UrmoneitK13,
  author    = {Raphael Urmoneit and
               Florian Kerschbaum},
  title     = {Efficient secure computation optimization},
  booktitle = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
               for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
               4, 2013, Berlin, Germany},
  pages     = {11--18},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013petshop},
  url       = {https://doi.org/10.1145/2517872.2517873},
  doi       = {10.1145/2517872.2517873},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/UrmoneitK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClaussSK13,
  author    = {Sebastian Clau{\ss} and
               Stefan Schiffner and
               Florian Kerschbaum},
  title     = {\emph{k}-anonymous reputation},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {359--368},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {https://doi.org/10.1145/2484313.2484361},
  doi       = {10.1145/2484313.2484361},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ClaussSK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum13,
  author    = {Florian Kerschbaum},
  title     = {An information-flow type-system for mixed protocol secure computation},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {393--404},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {https://doi.org/10.1145/2484313.2484364},
  doi       = {10.1145/2484313.2484364},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Kerschbaum13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JawurekKO13,
  author    = {Marek Jawurek and
               Florian Kerschbaum and
               Claudio Orlandi},
  title     = {Zero-knowledge using garbled circuits: how to prove non-algebraic
               statements efficiently},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {955--966},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {https://doi.org/10.1145/2508859.2516662},
  doi       = {10.1145/2508859.2516662},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JawurekKO13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13,
  author    = {Florian Kerschbaum and
               Patrick Grofig and
               Isabelle Hang and
               Martin H{\"{a}}rterich and
               Mathias Kohler and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  title     = {Adjustably encrypted in-memory column-store},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {1325--1328},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {https://doi.org/10.1145/2508859.2512491},
  doi       = {10.1145/2508859.2512491},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KerschbaumGHHKSST13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Kerschbaum13,
  author    = {Florian Kerschbaum},
  title     = {Expression rewriting for optimizing secure computation},
  booktitle = {Third {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages     = {49--58},
  year      = {2013},
  crossref  = {DBLP:conf/codaspy/2013},
  url       = {https://doi.org/10.1145/2435349.2435356},
  doi       = {10.1145/2435349.2435356},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/Kerschbaum13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13,
  author    = {Florian Kerschbaum and
               Martin H{\"{a}}rterich and
               Patrick Grofig and
               Mathias Kohler and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  title     = {Optimal Re-encryption Strategy for Joins in Encrypted Databases},
  booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  pages     = {195--210},
  year      = {2013},
  crossref  = {DBLP:conf/dbsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6\_13},
  doi       = {10.1007/978-3-642-39256-6\_13},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/KerschbaumHGKSST13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13,
  author    = {Florian Kerschbaum and
               Martin H{\"{a}}rterich and
               Mathias Kohler and
               Isabelle Hang and
               Andreas Schaad and
               Axel Schr{\"{o}}pfer and
               Walter Tighzert},
  title     = {An Encrypted In-Memory Column-Store: The Onion Selection Problem},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  pages     = {14--26},
  year      = {2013},
  crossref  = {DBLP:conf/iciss/2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_2},
  doi       = {10.1007/978-3-642-45204-8\_2},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/KerschbaumHKHSST13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Kerschbaum0S13,
  author    = {Florian Kerschbaum and
               Thomas Schneider and
               Axel Schr{\"{o}}pfer},
  title     = {Automatic Protocol Selection in Secure Two-Party Computations},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/automatic-protocol-selection-secure-two-party-computations},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/Kerschbaum0S13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Kerschbaum13,
  author    = {Florian Kerschbaum},
  title     = {Searching over encrypted data in cloud systems},
  booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages     = {87--88},
  year      = {2013},
  crossref  = {DBLP:conf/sacmat/2013},
  url       = {https://doi.org/10.1145/2462410.2462888},
  doi       = {10.1145/2462410.2462888},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/Kerschbaum13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchropferSKBJ13,
  author    = {Axel Schr{\"{o}}pfer and
               Andreas Schaad and
               Florian Kerschbaum and
               Heiko Boehm and
               Joerg Jooss},
  title     = {Secure benchmarking in the cloud},
  booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages     = {197--200},
  year      = {2013},
  crossref  = {DBLP:conf/sacmat/2013},
  url       = {https://doi.org/10.1145/2462410.2462430},
  doi       = {10.1145/2462410.2462430},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/SchropferSKBJ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KerschbaumLG13,
  author    = {Florian Kerschbaum and
               Hoon Wei Lim and
               Ivan Gudymenko},
  title     = {Privacy-preserving billing for e-ticketing systems in public transportation},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {143--154},
  year      = {2013},
  crossref  = {DBLP:conf/wpes/2013},
  url       = {https://doi.org/10.1145/2517840.2517848},
  doi       = {10.1145/2517840.2517848},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/KerschbaumLG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawurekKO13,
  author    = {Marek Jawurek and
               Florian Kerschbaum and
               Claudio Orlandi},
  title     = {Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic
               Statements Efficiently},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {73},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/073},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/JawurekKO13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerschbaumLG13,
  author    = {Florian Kerschbaum and
               Hoon Wei Lim and
               Ivan Gudymenko},
  title     = {Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {206},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/206},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KerschbaumLG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LimKW12,
  author    = {Hoon Wei Lim and
               Florian Kerschbaum and
               Huaxiong Wang},
  title     = {Workflow Signatures for Business Process Compliance},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {9},
  number    = {5},
  pages     = {756--769},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2012.38},
  doi       = {10.1109/TDSC.2012.38},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/LimKW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/Kerschbaum12,
  author    = {Florian Kerschbaum},
  title     = {Privacy-Preserving Computation - (Position Paper)},
  booktitle = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
               2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  pages     = {41--54},
  year      = {2012},
  crossref  = {DBLP:conf/apf/2012},
  url       = {https://doi.org/10.1007/978-3-642-54069-1\_3},
  doi       = {10.1007/978-3-642-54069-1\_3},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apf/Kerschbaum12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum12,
  author    = {Florian Kerschbaum},
  title     = {Outsourced private set intersection using homomorphic encryption},
  booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages     = {85--86},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012asia},
  url       = {https://doi.org/10.1145/2414456.2414506},
  doi       = {10.1145/2414456.2414506},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Kerschbaum12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/StrukerK12,
  author    = {Jens Str{\"{u}}ker and
               Florian Kerschbaum},
  title     = {From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids},
  booktitle = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/icis/2012},
  url       = {http://aisel.aisnet.org/icis2012/proceedings/BreakthroughIdeas/2},
  timestamp = {Tue, 29 Jan 2013 19:04:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icis/StrukerK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/KerschbaumC12,
  author    = {Florian Kerschbaum and
               Leonardo Weiss Ferreira Chaves},
  title     = {Encrypted Searchable Storage of {RFID} Tracking Data},
  booktitle = {13th {IEEE} International Conference on Mobile Data Management, {MDM}
               2012, Bengaluru, India, July 23-26, 2012},
  pages     = {176--185},
  year      = {2012},
  crossref  = {DBLP:conf/mdm/2012},
  url       = {https://doi.org/10.1109/MDM.2012.27},
  doi       = {10.1109/MDM.2012.27},
  timestamp = {Tue, 14 Nov 2017 17:15:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mdm/KerschbaumC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/JawurekK12,
  author    = {Marek Jawurek and
               Florian Kerschbaum},
  title     = {Fault-Tolerant Privacy-Preserving Statistics},
  booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
               2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  pages     = {221--238},
  year      = {2012},
  crossref  = {DBLP:conf/pet/2012},
  url       = {https://doi.org/10.1007/978-3-642-31680-7\_12},
  doi       = {10.1007/978-3-642-31680-7\_12},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/JawurekK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/Kerschbaum12,
  author    = {Florian Kerschbaum},
  title     = {Collusion-resistant outsourcing of private set intersection},
  booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
               Riva, Trento, Italy, March 26-30, 2012},
  pages     = {1451--1456},
  year      = {2012},
  crossref  = {DBLP:conf/sac/2012},
  url       = {https://doi.org/10.1145/2245276.2232008},
  doi       = {10.1145/2245276.2232008},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/Kerschbaum12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KerschbaumC12,
  author    = {Florian Kerschbaum and
               Leonardo Weiss Ferreira Chaves},
  title     = {Encryption-enforced access control for an {RFID} discovery service},
  booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages     = {127--130},
  year      = {2012},
  crossref  = {DBLP:conf/sacmat/2012},
  url       = {https://doi.org/10.1145/2295136.2295161},
  doi       = {10.1145/2295136.2295161},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/KerschbaumC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/OliveiraKLY12,
  author    = {Anderson Santana de Oliveira and
               Florian Kerschbaum and
               Hoon Wei Lim and
               Su{-}Yang Yu},
  title     = {Privacy-Preserving Techniques and System for Streaming Databases},
  booktitle = {2012 International Conference on Privacy, Security, Risk and Trust,
               {PASSAT} 2012, and 2012 International Confernece on Social Computing,
               SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  pages     = {728--733},
  year      = {2012},
  crossref  = {DBLP:conf/socialcom/2012},
  url       = {https://doi.org/10.1109/SocialCom-PASSAT.2012.85},
  doi       = {10.1109/SocialCom-PASSAT.2012.85},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/OliveiraKLY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-5208,
  author    = {Martin Beck and
               Florian Kerschbaum},
  title     = {Approximate Two-Party Privacy-Preserving String Matching with Linear
               Complexity},
  journal   = {CoRR},
  volume    = {abs/1209.5208},
  year      = {2012},
  url       = {http://arxiv.org/abs/1209.5208},
  archivePrefix = {arXiv},
  eprint    = {1209.5208},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1209-5208},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bise/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Secure and Sustainable Benchmarking in Clouds - {A} Multi-Party Cloud
               Application with an Untrusted Service Provider},
  journal   = {Business {\&} Information Systems Engineering},
  volume    = {3},
  number    = {3},
  pages     = {135--143},
  year      = {2011},
  url       = {https://doi.org/10.1007/s12599-011-0153-9},
  doi       = {10.1007/s12599-011-0153-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/bise/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KerschbaumSZPCHSCD11,
  author    = {Florian Kerschbaum and
               Axel Schr{\"{o}}pfer and
               Antonio Zilli and
               Richard Pibernik and
               Octavian Catrina and
               Sebastiaan de Hoogh and
               Berry Schoenmakers and
               Stelvio Cimato and
               Ernesto Damiani},
  title     = {Secure Collaborative Supply-Chain Management},
  journal   = {{IEEE} Computer},
  volume    = {44},
  number    = {9},
  pages     = {38--43},
  year      = {2011},
  url       = {https://doi.org/10.1109/MC.2011.224},
  doi       = {10.1109/MC.2011.224},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/computer/KerschbaumSZPCHSCD11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/PibernikZKS11,
  author    = {Richard Pibernik and
               Yingying Zhang and
               Florian Kerschbaum and
               Axel Schr{\"{o}}pfer},
  title     = {Secure collaborative supply chain planning and inverse optimization
               - The {JELS} model},
  journal   = {European Journal of Operational Research},
  volume    = {208},
  number    = {1},
  pages     = {75--85},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ejor.2010.08.018},
  doi       = {10.1016/j.ejor.2010.08.018},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eor/PibernikZKS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wi/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung
               ohne vertrauensw{\"{u}}rdigen Dienstanbieter},
  journal   = {Wirtschaftsinformatik},
  volume    = {53},
  number    = {3},
  pages     = {129--138},
  year      = {2011},
  url       = {https://doi.org/10.1007/s11576-011-0267-1},
  doi       = {10.1007/s11576-011-0267-1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wi/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/KerschbaumC11,
  author    = {Florian Kerschbaum and
               Leonardo Weiss Ferreira Chaves},
  title     = {Secure Sharing of Item-Level Data in the Cloud},
  booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
               Washington, DC, USA, 4-9 July, 2011},
  pages     = {756--757},
  year      = {2011},
  crossref  = {DBLP:conf/IEEEcloud/2011},
  url       = {https://doi.org/10.1109/CLOUD.2011.78},
  doi       = {10.1109/CLOUD.2011.78},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/KerschbaumC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Automatically optimizing secure computation},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {703--714},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://doi.org/10.1145/2046707.2046786},
  doi       = {10.1145/2046707.2046786},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchropferK11,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum},
  title     = {Demo: secure computation in JavaScript},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {849--852},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://dl.acm.org/citation.cfm?id=2093509},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SchropferK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GoodrichK11,
  author    = {Michael T. Goodrich and
               Florian Kerschbaum},
  title     = {Privacy-enhanced reputation-feedback methods to reduce feedback extortion
               in online auctions},
  booktitle = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages     = {273--282},
  year      = {2011},
  crossref  = {DBLP:conf/codaspy/2011},
  url       = {https://doi.org/10.1145/1943513.1943550},
  doi       = {10.1145/1943513.1943550},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/GoodrichK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SchropferKM11,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum and
               G{\"{u}}nter M{\"{u}}ller},
  title     = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
               July 2011},
  pages     = {298--307},
  year      = {2011},
  crossref  = {DBLP:conf/compsac/2011},
  url       = {https://doi.org/10.1109/COMPSAC.2011.46},
  doi       = {10.1109/COMPSAC.2011.46},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/SchropferKM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Public-Key Encrypted Bloom Filters with Applications to Supply Chain
               Integrity},
  booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
               Proceedings},
  pages     = {60--75},
  year      = {2011},
  crossref  = {DBLP:conf/dbsec/2011},
  url       = {https://doi.org/10.1007/978-3-642-22348-8\_7},
  doi       = {10.1007/978-3-642-22348-8\_7},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/debs/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Securely disseminating {RFID} events},
  booktitle = {Proceedings of the Fifth {ACM} International Conference on Distributed
               Event-Based Systems, {DEBS} 2011, New York, NY, USA, July 11-15, 2011},
  pages     = {327--334},
  year      = {2011},
  crossref  = {DBLP:conf/debs/2011},
  url       = {https://doi.org/10.1145/2002259.2002302},
  doi       = {10.1145/2002259.2002302},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/debs/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/KerschbaumSK11,
  author    = {Florian Kerschbaum and
               Jens Str{\"{u}}ker and
               Thomas G. Koslowski},
  title     = {Confidential Information-Sharing for Automated Sustainability Benchmarks},
  booktitle = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2011, Shanghai, China, December 4-7, 2011},
  year      = {2011},
  crossref  = {DBLP:conf/icis/2011},
  url       = {http://aisel.aisnet.org/icis2011/proceedings/breakthroughideas/4},
  timestamp = {Sun, 25 Oct 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icis/KerschbaumSK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/JensenK11,
  author    = {Meiko Jensen and
               Florian Kerschbaum},
  title     = {Towards Privacy-Preserving {XML} Transformation},
  booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
               DC, USA, July 4-9, 2011},
  pages     = {65--72},
  year      = {2011},
  crossref  = {DBLP:conf/icws/2011},
  url       = {https://doi.org/10.1109/ICWS.2011.10},
  doi       = {10.1109/ICWS.2011.10},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/JensenK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Kerschbaum11,
  author    = {Florian Kerschbaum},
  title     = {Secure conjunctive keyword searches for unstructured text},
  booktitle = {5th International Conference on Network and System Security, {NSS}
               2011, Milan, Italy, September 6-8, 2011},
  pages     = {285--289},
  year      = {2011},
  crossref  = {DBLP:conf/nss/2011},
  url       = {https://doi.org/10.1109/ICNSS.2011.6060016},
  doi       = {10.1109/ICNSS.2011.6060016},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/Kerschbaum11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/JawurekJK11,
  author    = {Marek Jawurek and
               Martin Johns and
               Florian Kerschbaum},
  title     = {Plug-In Privacy for Smart Metering Billing},
  booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
               2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  pages     = {192--210},
  year      = {2011},
  crossref  = {DBLP:conf/pet/2011},
  url       = {https://doi.org/10.1007/978-3-642-22263-4\_11},
  doi       = {10.1007/978-3-642-22263-4\_11},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/JawurekJK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/SchropferK11,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum},
  title     = {Forecasting Run-Times of Secure Two-Party Computation},
  booktitle = {Eighth International Conference on Quantitative Evaluation of Systems,
               {QEST} 2011, Aachen, Germany, 5-8 September, 2011},
  pages     = {181--190},
  year      = {2011},
  crossref  = {DBLP:conf/qest/2011},
  url       = {https://doi.org/10.1109/QEST.2011.33},
  doi       = {10.1109/QEST.2011.33},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/qest/SchropferK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/DreierK11,
  author    = {Jannik Dreier and
               Florian Kerschbaum},
  title     = {Practical Privacy-Preserving Multiparty Linear Programming Based on
               Problem Transformation},
  booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  pages     = {916--924},
  year      = {2011},
  crossref  = {DBLP:conf/socialcom/2011},
  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.19},
  doi       = {10.1109/PASSAT/SocialCom.2011.19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/DreierK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosp/BiswasBK11,
  author    = {Debmalya Biswas and
               Kathryn Bean and
               Florian Kerschbaum},
  title     = {NAT/Firewall traversal cost model for publish-subscribe systems},
  booktitle = {ICPE'11 - Second Joint {WOSP/SIPEW} International Conference on Performance
               Engineering, Karlsruhe, Germany, March 14-16, 2011},
  pages     = {487--492},
  year      = {2011},
  crossref  = {DBLP:conf/wosp/2011},
  url       = {https://doi.org/10.1145/1958746.1958820},
  doi       = {10.1145/1958746.1958820},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wosp/BiswasBK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1102-4602,
  author    = {Michael T. Goodrich and
               Florian Kerschbaum},
  title     = {Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion
               in Online Auctions},
  journal   = {CoRR},
  volume    = {abs/1102.4602},
  year      = {2011},
  url       = {http://arxiv.org/abs/1102.4602},
  archivePrefix = {arXiv},
  eprint    = {1102.4602},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1102-4602},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DreierK11,
  author    = {Jannik Dreier and
               Florian Kerschbaum},
  title     = {Practical Secure and Efficient Multiparty Linear Programming Based
               on Problem Transformation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {108},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/108},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DreierK11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Kerschbaum2010,
  author    = {Florian Kerschbaum},
  title     = {A privacy-preserving benchmarking platform},
  school    = {Karlsruhe Institute of Technology},
  year      = {2010},
  url       = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000019077},
  urn       = {urn:nbn:de:swb:90-190771},
  timestamp = {Wed, 04 May 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/de/Kerschbaum2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KerschbaumS10,
  author    = {Florian Kerschbaum and
               Alessandro Sorniotti},
  title     = {Searchable Encryption for Outsourced Data Analytics},
  booktitle = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  pages     = {61--76},
  year      = {2010},
  crossref  = {DBLP:conf/europki/2010},
  url       = {https://doi.org/10.1007/978-3-642-22633-5\_5},
  doi       = {10.1007/978-3-642-22633-5\_5},
  timestamp = {Fri, 19 May 2017 01:25:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/KerschbaumS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/WibmerBK10,
  author    = {Michael Wibmer and
               Debmalya Biswas and
               Florian Kerschbaum},
  title     = {Leakage Quantification of Cryptographic Operations},
  booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated
               International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos,
               Crete, Greece, October 25-29, 2010, Proceedings, Part {I}},
  pages     = {685--700},
  year      = {2010},
  crossref  = {DBLP:conf/otm/2010-1},
  url       = {https://doi.org/10.1007/978-3-642-16934-2\_50},
  doi       = {10.1007/978-3-642-16934-2\_50},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/WibmerBK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/FunkeK10,
  author    = {Daniel Funke and
               Florian Kerschbaum},
  title     = {Privacy-Preserving Multi-Objective Evolutionary Algorithms},
  booktitle = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International
               Conference, Krak{\'{o}}w, Poland, September 11-15, 2010. Proceedings,
               Part {II}},
  pages     = {41--50},
  year      = {2010},
  crossref  = {DBLP:conf/ppsn/2010-2},
  url       = {https://doi.org/10.1007/978-3-642-15871-1\_5},
  doi       = {10.1007/978-3-642-15871-1\_5},
  timestamp = {Wed, 17 May 2017 14:24:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ppsn/FunkeK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/KerschbaumO10,
  author    = {Florian Kerschbaum and
               Nina Oertel},
  title     = {Privacy-Preserving Pattern Matching for Anomaly Detection in {RFID}
               Anti-Counterfeiting},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  pages     = {124--137},
  year      = {2010},
  crossref  = {DBLP:conf/rfidsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2\_12},
  doi       = {10.1007/978-3-642-16822-2\_12},
  timestamp = {Wed, 24 May 2017 08:28:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/KerschbaumO10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Kerschbaum10,
  author    = {Florian Kerschbaum},
  title     = {An access control model for mobile physical objects},
  booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages     = {193--202},
  year      = {2010},
  crossref  = {DBLP:conf/sacmat/2010},
  url       = {https://doi.org/10.1145/1809842.1809873},
  doi       = {10.1145/1809842.1809873},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/Kerschbaum10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/BiswasHK10,
  author    = {Debmalya Biswas and
               Stephan Haller and
               Florian Kerschbaum},
  title     = {Privacy-Preserving Outsourced Profiling},
  booktitle = {12th {IEEE} Conference on Commerce and Enterprise Computing, {CEC}
               2010, Shanghai, China, November 10-12, 2010},
  pages     = {136--143},
  year      = {2010},
  crossref  = {DBLP:conf/wecwis/2010},
  url       = {https://doi.org/10.1109/CEC.2010.39},
  doi       = {10.1109/CEC.2010.39},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/BiswasHK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumOC10,
  author    = {Florian Kerschbaum and
               Nina Oertel and
               Leonardo Weiss Ferreira Chaves},
  title     = {Privacy-preserving computation of benchmarks on item-level data using
               {RFID}},
  booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
               {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages     = {105--110},
  year      = {2010},
  crossref  = {DBLP:conf/wisec/2010},
  url       = {https://doi.org/10.1145/1741866.1741884},
  doi       = {10.1145/1741866.1741884},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/KerschbaumOC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelKMMWL10,
  author    = {Ulrich Flegel and
               Florian Kerschbaum and
               Philip Miseldine and
               Ganna Monakova and
               Richard Wacker and
               Frank Leymann},
  title     = {Legally Sustainable Solutions for Privacy Issues in Collaborative
               Fraud Detection},
  booktitle = {Insider Threats in Cyber Security},
  pages     = {139--171},
  year      = {2010},
  crossref  = {DBLP:series/ais/49},
  url       = {https://doi.org/10.1007/978-1-4419-7133-3\_7},
  doi       = {10.1007/978-1-4419-7133-3\_7},
  timestamp = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/FlegelKMMWL10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2248,
  author    = {Marek Jawurek and
               Martin Johns and
               Florian Kerschbaum},
  title     = {Plug-in privacy for Smart Metering billing},
  journal   = {CoRR},
  volume    = {abs/1012.2248},
  year      = {2010},
  url       = {http://arxiv.org/abs/1012.2248},
  archivePrefix = {arXiv},
  eprint    = {1012.2248},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1012-2248},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FunkeK10,
  author    = {Daniel Funke and
               Florian Kerschbaum},
  title     = {Privacy-Preserving Multi-Objective Evolutionary Algorithms},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {326},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/326},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FunkeK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchropferKM10,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum and
               G{\"{u}}nter M{\"{u}}ller},
  title     = {{L1} - An Intermediate Language for Mixed-Protocol Secure Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {578},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/578},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/SchropferKM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/DeitosK09,
  author    = {Rafael Deitos and
               Florian Kerschbaum},
  title     = {Parallelizing secure linear programming},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {21},
  number    = {10},
  pages     = {1321--1350},
  year      = {2009},
  url       = {https://doi.org/10.1002/cpe.1424},
  doi       = {10.1002/cpe.1424},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/DeitosK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/KerschbaumR09,
  author    = {Florian Kerschbaum and
               Philip Robinson},
  title     = {Security architecture for virtual organizations of business web services},
  journal   = {Journal of Systems Architecture - Embedded Systems Design},
  volume    = {55},
  number    = {4},
  pages     = {224--232},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.sysarc.2008.10.001},
  doi       = {10.1016/j.sysarc.2008.10.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsa/KerschbaumR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/SchropferKSP09,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum and
               Christoph G. Sch{\"{u}}tz and
               Richard Pibernik},
  title     = {Optimizations for Risk-Aware Secure Supply Chain Master Planning},
  journal   = {J. {UCS}},
  volume    = {15},
  number    = {15},
  pages     = {3019--3037},
  year      = {2009},
  url       = {https://doi.org/10.3217/jucs-015-15-3019},
  doi       = {10.3217/jucs-015-15-3019},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jucs/SchropferKSP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/Kerschbaum09,
  author    = {Florian Kerschbaum},
  title     = {Adapting Privacy-Preserving Computation to the Service Provider Model},
  booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational
               Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
               29-31, 2009},
  pages     = {34--41},
  year      = {2009},
  crossref  = {DBLP:conf/cse/2009},
  url       = {https://doi.org/10.1109/CSE.2009.261},
  doi       = {10.1109/CSE.2009.261},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/Kerschbaum09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/DeitosK09,
  author    = {Rafael Deitos and
               Florian Kerschbaum},
  title     = {Improving Practical Performance on Secure and Private Collaborative
               Linear Programming},
  booktitle = {Database and Expert Systems Applications, DEXA, International Workshops,
               Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages     = {122--126},
  year      = {2009},
  crossref  = {DBLP:conf/dexaw/2009},
  url       = {https://doi.org/10.1109/DEXA.2009.32},
  doi       = {10.1109/DEXA.2009.32},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/DeitosK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/KerschbaumBH09,
  author    = {Florian Kerschbaum and
               Debmalya Biswas and
               Sebastiaan de Hoogh},
  title     = {Performance Comparison of Secure Comparison Protocols},
  booktitle = {Database and Expert Systems Applications, DEXA, International Workshops,
               Linz, Austria, August 31-September 4, 2009, Proceedings},
  pages     = {133--136},
  year      = {2009},
  crossref  = {DBLP:conf/dexaw/2009},
  url       = {https://doi.org/10.1109/DEXA.2009.37},
  doi       = {10.1109/DEXA.2009.37},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/KerschbaumBH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AccorsiDIK09,
  author    = {Rafael Accorsi and
               Ernesto Damiani and
               Frank Innerhofer{-}Oberperfler and
               Florian Kerschbaum},
  title     = {Editorial to the second workshop on Security and Privacy in Enterprise
               Computing (InSPEC09)},
  booktitle = {Workshops Proceedings of the 12th {IEEE} International Enterprise
               Distributed Object Computing Conference, EDOCw 2009, 1-4 September
               2009, Auckland, New Zealand},
  pages     = {166--167},
  year      = {2009},
  crossref  = {DBLP:conf/edoc/2009w},
  url       = {https://doi.org/10.1109/EDOCW.2009.5331995},
  doi       = {10.1109/EDOCW.2009.5331995},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/AccorsiDIK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KerschbaumSB09,
  author    = {Florian Kerschbaum and
               Andreas Schaad and
               Debmalya Biswas},
  title     = {Practical privacy-preserving protocols for criminal investigations},
  booktitle = {{IEEE} International Conference on Intelligence and Security Informatics,
               {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},
  pages     = {197--199},
  year      = {2009},
  crossref  = {DBLP:conf/isi/2009},
  url       = {https://doi.org/10.1109/ISI.2009.5137301},
  doi       = {10.1109/ISI.2009.5137301},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isi/KerschbaumSB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KerschbaumDSB09,
  author    = {Florian Kerschbaum and
               Daniel Dahlmeier and
               Axel Schr{\"{o}}pfer and
               Debmalya Biswas},
  title     = {On the practical importance of communication complexity for secure
               multi-party computation protocols},
  booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
               Honolulu, Hawaii, USA, March 9-12, 2009},
  pages     = {2008--2015},
  year      = {2009},
  crossref  = {DBLP:conf/sac/2009},
  url       = {https://doi.org/10.1145/1529282.1529730},
  doi       = {10.1145/1529282.1529730},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/KerschbaumDSB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/SchropferKSP09,
  author    = {Axel Schr{\"{o}}pfer and
               Florian Kerschbaum and
               Dagmar Sadkowiak and
               Richard Pibernik},
  title     = {Risk-Aware Secure Supply Chain Master Planning},
  booktitle = {Security in Information Systems, Proceedings of the 7th International
               Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction
               with {ICEIS} 2009, Milan, Italy, May 2009},
  pages     = {46--56},
  year      = {2009},
  crossref  = {DBLP:conf/sis/2009},
  timestamp = {Tue, 04 Jan 2011 13:04:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sis/SchropferKSP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/KerschbaumS09,
  author    = {Florian Kerschbaum and
               Alessandro Sorniotti},
  title     = {RFID-based supply chain partner authentication and key agreement},
  booktitle = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
               {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages     = {41--50},
  year      = {2009},
  crossref  = {DBLP:conf/wisec/2009},
  url       = {https://doi.org/10.1145/1514274.1514281},
  doi       = {10.1145/1514274.1514281},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/KerschbaumS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Kerschbaum09,
  author    = {Florian Kerschbaum},
  title     = {A verifiable, centralized, coercion-free reputation system},
  booktitle = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009},
  pages     = {61--70},
  year      = {2009},
  crossref  = {DBLP:conf/wpes/2009},
  url       = {https://doi.org/10.1145/1655188.1655197},
  doi       = {10.1145/1655188.1655197},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/Kerschbaum09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/Kerschbaum08,
  author    = {Florian Kerschbaum},
  title     = {Building a privacy-preserving benchmarking enterprise system},
  journal   = {Enterprise {IS}},
  volume    = {2},
  number    = {4},
  pages     = {421--441},
  year      = {2008},
  url       = {https://doi.org/10.1080/17517570802372468},
  doi       = {10.1080/17517570802372468},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eis/Kerschbaum08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CatrinaK08,
  author    = {Octavian Catrina and
               Florian Kerschbaum},
  title     = {Fostering the Uptake of Secure Multiparty Computation in E-Commerce},
  booktitle = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  pages     = {693--700},
  year      = {2008},
  crossref  = {DBLP:conf/IEEEares/2008},
  url       = {https://doi.org/10.1109/ARES.2008.49},
  doi       = {10.1109/ARES.2008.49},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/CatrinaK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/ChavesK08,
  author    = {Leonardo Weiss Ferreira Chaves and
               Florian Kerschbaum},
  title     = {Industrial Privacy in RFID-based Batch Recalls},
  booktitle = {Workshops Proceedings of the 12th International {IEEE} Enterprise
               Distributed Object Computing Conference, {ECOCW} 2008, 16 September
               2008, Munich, Germany},
  pages     = {192--198},
  year      = {2008},
  crossref  = {DBLP:conf/edoc/2008w},
  url       = {https://doi.org/10.1109/EDOCW.2008.37},
  doi       = {10.1109/EDOCW.2008.37},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/ChavesK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Kerschbaum08,
  author    = {Florian Kerschbaum},
  title     = {Practical Privacy-Preserving Benchmarking},
  booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  pages     = {17--31},
  year      = {2008},
  crossref  = {DBLP:conf/sec/2008},
  url       = {https://doi.org/10.1007/978-0-387-09699-5\_2},
  doi       = {10.1007/978-0-387-09699-5\_2},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/Kerschbaum08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/KerschbaumD08,
  author    = {Florian Kerschbaum and
               Rafael Deitos},
  title     = {Security against the business partner},
  booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
               2008, Alexandria, VA, USA, October 31, 2008},
  pages     = {1--10},
  year      = {2008},
  crossref  = {DBLP:conf/sws/2008},
  url       = {https://doi.org/10.1145/1456492.1456493},
  doi       = {10.1145/1456492.1456493},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/KerschbaumD08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/KerschbaumV08,
  author    = {Florian Kerschbaum and
               Julien Vayssi{\`{e}}re},
  title     = {Privacy-preserving data analytics as an outsourced service},
  booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
               2008, Alexandria, VA, USA, October 31, 2008},
  pages     = {87--96},
  year      = {2008},
  crossref  = {DBLP:conf/sws/2008},
  url       = {https://doi.org/10.1145/1456492.1456506},
  doi       = {10.1145/1456492.1456506},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/KerschbaumV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/KerschbaumS08,
  author    = {Florian Kerschbaum and
               Andreas Schaad},
  title     = {Privacy-preserving social network analysis for criminal investigations},
  booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages     = {9--14},
  year      = {2008},
  crossref  = {DBLP:conf/wpes/2008},
  url       = {https://doi.org/10.1145/1456403.1456406},
  doi       = {10.1145/1456403.1456406},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/KerschbaumS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/FlegelKW08,
  author    = {Ulrich Flegel and
               Florian Kerschbaum and
               Richard Wacker},
  title     = {Collaborative Fraud Detection in Outsourcing Scenarios: Issues of
               and Solutions for Privacy and Confidentiality},
  booktitle = {Countering Insider Threats, 20.07. - 25.07.2008},
  year      = {2008},
  crossref  = {DBLP:conf/dagstuhl/2008P8302},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2008/1794/},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/FlegelKW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entcs/KarabulutKMRY07,
  author    = {Y{\"{u}}cel Karabulut and
               Florian Kerschbaum and
               Fabio Massacci and
               Philip Robinson and
               Artsiom Yautsiukhin},
  title     = {Security and Trust in {IT} Business Outsourcing: a Manifesto},
  journal   = {Electr. Notes Theor. Comput. Sci.},
  volume    = {179},
  pages     = {47--58},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.entcs.2006.08.030},
  doi       = {10.1016/j.entcs.2006.08.030},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/entcs/KarabulutKMRY07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/Kerschbaum07,
  author    = {Florian Kerschbaum},
  title     = {Building a Privacy-Preserving Benchmarking Enterprise System},
  booktitle = {11th {IEEE} International Enterprise Distributed Object Computing
               Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
               {USA}},
  pages     = {87--96},
  year      = {2007},
  crossref  = {DBLP:conf/edoc/2007},
  url       = {https://doi.org/10.1109/EDOC.2007.13},
  doi       = {10.1109/EDOC.2007.13},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/Kerschbaum07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/KerschbaumV07,
  author    = {Florian Kerschbaum and
               Julien Vayssi{\`{e}}re},
  title     = {Privacy-preserving logical vector clocks using secure computation
               techniques},
  booktitle = {13th International Conference on Parallel and Distributed Systems,
               {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007},
  pages     = {1--8},
  year      = {2007},
  crossref  = {DBLP:conf/icpads/2007},
  url       = {https://doi.org/10.1109/ICPADS.2007.4447773},
  doi       = {10.1109/ICPADS.2007.4447773},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/KerschbaumV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Kerschbaum07,
  author    = {Florian Kerschbaum},
  title     = {Simple cross-site attack prevention},
  booktitle = {Third International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
               2007},
  pages     = {464--472},
  year      = {2007},
  crossref  = {DBLP:conf/securecomm/2007},
  url       = {https://doi.org/10.1109/SECCOM.2007.4550368},
  doi       = {10.1109/SECCOM.2007.4550368},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/Kerschbaum07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/Kerschbaum07,
  author    = {Florian Kerschbaum},
  title     = {A New Way to Think About Secure Computation: Language-based Secure
               Computation},
  booktitle = {Security in Information Systems, Proceedings of the 5th International
               Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction
               with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007},
  pages     = {33--42},
  year      = {2007},
  crossref  = {DBLP:conf/sis/2007},
  timestamp = {Thu, 24 Jan 2008 19:53:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sis/Kerschbaum07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/KerschbaumDR07,
  author    = {Florian Kerschbaum and
               Rafael Deitos and
               Philip Robinson},
  title     = {Securing {VO} Management},
  booktitle = {Trust, Privacy and Security in Digital Business, 4th International
               Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
               Proceedings},
  pages     = {14--23},
  year      = {2007},
  crossref  = {DBLP:conf/trustbus/2007},
  url       = {https://doi.org/10.1007/978-3-540-74409-2\_4},
  doi       = {10.1007/978-3-540-74409-2\_4},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/KerschbaumDR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Kerschbaum07,
  author    = {Florian Kerschbaum},
  title     = {Distance-preserving pseudonymization for timestamps and spatial data},
  booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages     = {68--71},
  year      = {2007},
  crossref  = {DBLP:conf/wpes/2007},
  url       = {https://doi.org/10.1145/1314333.1314346},
  doi       = {10.1145/1314333.1314346},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/Kerschbaum07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RobinsonKS06,
  author    = {Philip Robinson and
               Florian Kerschbaum and
               Andreas Schaad},
  title     = {From Business Process Choreography to Authorization Policies},
  booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Sophia Antipolis, France,
               July 31-August 2, 2006, Proceedings},
  pages     = {297--309},
  year      = {2006},
  crossref  = {DBLP:conf/dbsec/2006},
  url       = {https://doi.org/10.1007/11805588\_21},
  doi       = {10.1007/11805588\_21},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/RobinsonKS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/KerschbaumT06,
  author    = {Florian Kerschbaum and
               Orestis Terzidis},
  title     = {Filtering for Private Collaborative Benchmarking},
  booktitle = {Emerging Trends in Information and Communication Security, International
               Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  pages     = {409--422},
  year      = {2006},
  crossref  = {DBLP:conf/etrics/2006},
  url       = {https://doi.org/10.1007/11766155\_29},
  doi       = {10.1007/11766155\_29},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/etrics/KerschbaumT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/KerschbaumHKR06,
  author    = {Florian Kerschbaum and
               Jochen Haller and
               Y{\"{u}}cel Karabulut and
               Philip Robinson},
  title     = {PathTrust: {A} Trust-Based Reputation Service for Virtual Organization
               Formation},
  booktitle = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
               Italy, May 16-19, 2006, Proceedings},
  pages     = {193--205},
  year      = {2006},
  crossref  = {DBLP:conf/itrust/2006},
  url       = {https://doi.org/10.1007/11755593\_15},
  doi       = {10.1007/11755593\_15},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itrust/KerschbaumHKR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Kerschbaum06,
  author    = {Florian Kerschbaum},
  title     = {Practical Private Regular Expression Matching},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  pages     = {461--470},
  year      = {2006},
  crossref  = {DBLP:conf/sec/2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_43},
  doi       = {10.1007/0-387-33406-8\_43},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/Kerschbaum06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/DeitosKR06,
  author    = {Rafael Deitos and
               Florian Kerschbaum and
               Philip Robinson},
  title     = {A comprehensive security architecture for dynamic, web service based
               virtual organizations for businesses},
  booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
               2006, Alexandria, VA, USA, November 3, 2006},
  pages     = {103--104},
  year      = {2006},
  crossref  = {DBLP:conf/sws/2006},
  url       = {https://doi.org/10.1145/1180367.1180386},
  doi       = {10.1145/1180367.1180386},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/DeitosKR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icba/KerschbaumAMR04,
  author    = {Florian Kerschbaum and
               Mikhail J. Atallah and
               David M'Ra{\"{\i}}hi and
               John R. Rice},
  title     = {Private Fingerprint Verification without Local Storage},
  booktitle = {Biometric Authentication, First International Conference, {ICBA} 2004,
               Hong Kong, China, July 15-17, 2004, Proceedings},
  pages     = {387--394},
  year      = {2004},
  crossref  = {DBLP:conf/icba/2004},
  url       = {https://doi.org/10.1007/978-3-540-25948-0\_54},
  doi       = {10.1007/978-3-540-25948-0\_54},
  timestamp = {Wed, 14 Nov 2018 10:58:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icba/KerschbaumAMR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KamaraFSKF03,
  author    = {Seny Kamara and
               Sonia Fahmy and
               E. Eugene Schultz and
               Florian Kerschbaum and
               Michael Frantzen},
  title     = {Analysis of vulnerabilities in Internet firewalls},
  journal   = {Computers {\&} Security},
  volume    = {22},
  number    = {3},
  pages     = {214--232},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0167-4048(03)00310-9},
  doi       = {10.1016/S0167-4048(03)00310-9},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/KamaraFSKF03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AtallahKD03,
  author    = {Mikhail J. Atallah and
               Florian Kerschbaum and
               Wenliang Du},
  title     = {Secure and private sequence comparisons},
  booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  pages     = {39--44},
  year      = {2003},
  crossref  = {DBLP:conf/wpes/2003},
  url       = {https://doi.org/10.1145/1005140.1005147},
  doi       = {10.1145/1005140.1005147},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/AtallahKD03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KerschbaumSZ02,
  author    = {Florian Kerschbaum and
               Eugene H. Spafford and
               Diego Zamboni},
  title     = {Using Internal Sensors and Embedded Detectors for Intrusion Detection},
  journal   = {Journal of Computer Security},
  volume    = {10},
  number    = {1/2},
  pages     = {23--70},
  year      = {2002},
  url       = {http://content.iospress.com/articles/journal-of-computer-security/jcs156},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/KerschbaumSZ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrantzenKSF01,
  author    = {Michael Frantzen and
               Florian Kerschbaum and
               E. Eugene Schultz and
               Sonia Fahmy},
  title     = {A Framework for Understanding Vulnerabilities in Firewalls Using a
               Dataflow Model of Firewall Internals},
  journal   = {Computers {\&} Security},
  volume    = {20},
  number    = {3},
  pages     = {263--270},
  year      = {2001},
  url       = {https://doi.org/10.1016/S0167-4048(01)00314-5},
  doi       = {10.1016/S0167-4048(01)00314-5},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/FrantzenKSF01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AtallahRCHKMN01,
  author    = {Mikhail J. Atallah and
               Victor Raskin and
               Michael Crogan and
               Christian Hempelmann and
               Florian Kerschbaum and
               Dina Mohamed and
               Sanket Naik},
  title     = {Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept
               Implementation},
  booktitle = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
               PA, USA, April 25-27, 2001, Proceedings},
  pages     = {185--199},
  year      = {2001},
  crossref  = {DBLP:conf/ih/2001},
  url       = {https://doi.org/10.1007/3-540-45496-9\_14},
  doi       = {10.1007/3-540-45496-9\_14},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/AtallahRCHKMN01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-1,
  editor    = {Javier L{\'{o}}pez and
               Jianying Zhou and
               Miguel Soriano},
  title     = {Computer Security - 23rd European Symposium on Research in Computer
               Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11098},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-99073-6},
  doi       = {10.1007/978-3-319-99073-6},
  isbn      = {978-3-319-99072-9},
  timestamp = {Mon, 13 Aug 2018 14:33:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigir/2018,
  editor    = {Kevyn Collins{-}Thompson and
               Qiaozhu Mei and
               Brian D. Davison and
               Yiqun Liu and
               Emine Yilmaz},
  title     = {The 41st International {ACM} {SIGIR} Conference on Research {\&}
               Development in Information Retrieval, {SIGIR} 2018, Ann Arbor, MI,
               USA, July 08-12, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3209978},
  timestamp = {Mon, 02 Jul 2018 07:52:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigir/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmod/2018,
  editor    = {Gautam Das and
               Christopher M. Jermaine and
               Philip A. Bernstein},
  title     = {Proceedings of the 2018 International Conference on Management of
               Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3183713},
  doi       = {10.1145/3183713},
  timestamp = {Wed, 21 Nov 2018 12:44:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2017,
  title     = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
               2017, Las Vegas, NV, USA, October 9-11, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8170165},
  isbn      = {978-1-5386-0683-4},
  timestamp = {Sat, 23 Dec 2017 19:06:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2017,
  editor    = {Giovanni Livraga and
               Sencun Zhu},
  title     = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10359},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61176-1},
  doi       = {10.1007/978-3-319-61176-1},
  isbn      = {978-3-319-61175-4},
  timestamp = {Mon, 10 Jul 2017 21:33:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016ccsw,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Elli Androulaki and
               Michael K. Reiter},
  title     = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
               {CCSW} 2016, Vienna, Austria, October 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2996429},
  doi       = {10.1145/2996429},
  isbn      = {978-1-4503-4572-9},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Wed, 11 Apr 2018 11:09:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-2,
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9327},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24177-7},
  doi       = {10.1007/978-3-319-24177-7},
  isbn      = {978-3-319-24176-0},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015-1,
  editor    = {G{\"{u}}nther Pernul and
               Peter Y. A. Ryan and
               Edgar R. Weippl},
  title     = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
               in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9326},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24174-6},
  doi       = {10.1007/978-3-319-24174-6},
  isbn      = {978-3-319-24173-9},
  timestamp = {Sat, 24 Nov 2018 11:59:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2015,
  editor    = {Roger L. Wainwright and
               Juan Manuel Corchado and
               Alessio Bechini and
               Jiman Hong},
  title     = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
               Salamanca, Spain, April 13-17, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2695664},
  isbn      = {978-1-4503-3196-8},
  timestamp = {Tue, 21 Jul 2015 14:16:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmod/2015,
  editor    = {Timos K. Sellis and
               Susan B. Davidson and
               Zachary G. Ives},
  title     = {Proceedings of the 2015 {ACM} {SIGMOD} International Conference on
               Management of Data, Melbourne, Victoria, Australia, May 31 - June
               4, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2723372},
  isbn      = {978-1-4503-2758-9},
  timestamp = {Thu, 12 Nov 2015 16:33:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmod/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apf/2014,
  editor    = {Bart Preneel and
               Demosthenes Ikonomou},
  title     = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
               2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8450},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06749-0},
  doi       = {10.1007/978-3-319-06749-0},
  isbn      = {978-3-319-06748-3},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apf/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2014,
  editor    = {Sylvia L. Osborn and
               Mahesh V. Tripunitara and
               Ian Molloy},
  title     = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '14, London, ON, Canada - June 25 - 27, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2613087},
  doi       = {10.1145/2613087},
  isbn      = {978-1-4503-2939-2},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sicherheit/2014,
  editor    = {Stefan Katzenbeisser and
               Volkmar Lotz and
               Edgar R. Weippl},
  title     = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
               Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
               der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
               2014, Wien, {\"{O}}sterreich},
  series    = {{LNI}},
  volume    = {228},
  publisher = {{GI}},
  year      = {2014},
  url       = {http://subs.emis.de/LNI/Proceedings/Proceedings228.html},
  isbn      = {978-3-88579-622-0},
  timestamp = {Tue, 15 Mar 2016 11:26:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sicherheit/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdata/2013,
  title     = {{IEEE} International Congress on Big Data, BigData Congress 2013,
               Santa Clara, CA, USA, June 27 2013-July 2, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6596172},
  isbn      = {978-0-7695-5006-0},
  timestamp = {Wed, 11 Jul 2018 09:39:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bigdata/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013petshop,
  editor    = {Martin Franz and
               Andreas Holzer and
               Rupak Majumdar and
               Bryan Parno and
               Helmut Veith},
  title     = {PETShop'13, Proceedings of the 2013 {ACM} Workshop on Language Support
               for Privacy-Enhancing Technologies, Co-located with {CCS} 2013, November
               4, 2013, Berlin, Germany},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517872},
  isbn      = {978-1-4503-2489-2},
  timestamp = {Fri, 31 Jan 2014 12:07:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013petshop},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asia,
  editor    = {Kefei Chen and
               Qi Xie and
               Weidong Qiu and
               Ninghui Li and
               Wen{-}Guey Tzeng},
  title     = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2484313},
  isbn      = {978-1-4503-1767-2},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2013,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu and
               Lujo Bauer and
               Jaehong Park},
  title     = {Third {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2435349},
  isbn      = {978-1-4503-1890-7},
  timestamp = {Wed, 27 Feb 2013 10:41:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2013,
  editor    = {Lingyu Wang and
               Basit Shafiq},
  title     = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7964},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6},
  doi       = {10.1007/978-3-642-39256-6},
  isbn      = {978-3-642-39255-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2013,
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8},
  doi       = {10.1007/978-3-642-45204-8},
  isbn      = {978-3-642-45203-1},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2013,
  editor    = {Mauro Conti and
               Jaideep Vaidya and
               Andreas Schaad},
  title     = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2462410},
  doi       = {10.1145/2462410},
  isbn      = {978-1-4503-1950-8},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517840},
  isbn      = {978-1-4503-2485-4},
  timestamp = {Fri, 22 Nov 2013 19:47:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apf/2012,
  editor    = {Bart Preneel and
               Demosthenes Ikonomou},
  title     = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
               2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8319},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54069-1},
  doi       = {10.1007/978-3-642-54069-1},
  isbn      = {978-3-642-54068-4},
  timestamp = {Tue, 23 May 2017 01:06:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apf/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012asia,
  editor    = {Heung Youl Youm and
               Yoojae Won},
  title     = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2414456},
  isbn      = {978-1-4503-1648-4},
  timestamp = {Tue, 21 Nov 2017 18:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icis/2012,
  title     = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2012, Orlando, Florida, USA, December 16-19, 2012},
  publisher = {Association for Information Systems},
  year      = {2012},
  url       = {http://aisel.aisnet.org/icis2012/},
  timestamp = {Tue, 29 Jan 2013 19:04:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icis/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mdm/2012,
  editor    = {Karl Aberer and
               Anupam Joshi and
               Sougata Mukherjea and
               Dipanjan Chakraborty and
               Hua Lu and
               Nalini Venkatasubramanian and
               Salil Kanhere},
  title     = {13th {IEEE} International Conference on Mobile Data Management, {MDM}
               2012, Bengaluru, India, July 23-26, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6341238},
  isbn      = {978-1-4673-1796-2},
  timestamp = {Tue, 14 Nov 2017 17:15:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mdm/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2012,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Matthew K. Wright},
  title     = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
               2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7384},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31680-7},
  doi       = {10.1007/978-3-642-31680-7},
  isbn      = {978-3-642-31679-1},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2012,
  editor    = {Sascha Ossowski and
               Paola Lecca},
  title     = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
               Riva, Trento, Italy, March 26-30, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2245276},
  isbn      = {978-1-4503-0857-1},
  timestamp = {Fri, 08 Jun 2012 17:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2012,
  editor    = {Vijay Atluri and
               Jaideep Vaidya and
               Axel Kern and
               Murat Kantarcioglu},
  title     = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2295136},
  doi       = {10.1145/2295136},
  isbn      = {978-1-4503-1295-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2012,
  title     = {2012 International Conference on Privacy, Security, Risk and Trust,
               {PASSAT} 2012, and 2012 International Confernece on Social Computing,
               SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6403618},
  isbn      = {978-1-4673-5638-1},
  timestamp = {Mon, 14 Jan 2013 17:49:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcloud/2011,
  editor    = {Ling Liu and
               Manish Parashar},
  title     = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2011,
               Washington, DC, USA, 4-9 July, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6008653},
  isbn      = {978-1-4577-0836-7},
  timestamp = {Thu, 22 Dec 2016 15:11:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2011,
  editor    = {Ravi S. Sandhu and
               Elisa Bertino},
  title     = {First {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0466-5},
  timestamp = {Tue, 07 Jun 2011 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/compsac/2011,
  title     = {Proceedings of the 35th Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
               July 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6032120},
  isbn      = {978-0-7695-4439-7},
  timestamp = {Thu, 09 Oct 2014 16:51:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2011,
  editor    = {Yingjiu Li},
  title     = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6818},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22348-8},
  doi       = {10.1007/978-3-642-22348-8},
  isbn      = {978-3-642-22347-1},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/debs/2011,
  editor    = {David M. Eyers and
               Opher Etzion and
               Avigdor Gal and
               Stanley B. Zdonik and
               Paul Vincent},
  title     = {Proceedings of the Fifth {ACM} International Conference on Distributed
               Event-Based Systems, {DEBS} 2011, New York, NY, USA, July 11-15, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0423-8},
  timestamp = {Wed, 13 Jul 2011 11:21:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/debs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icis/2011,
  editor    = {Dennis F. Galletta and
               Ting{-}Peng Liang},
  title     = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2011, Shanghai, China, December 4-7, 2011},
  publisher = {Association for Information Systems},
  year      = {2011},
  url       = {http://aisel.aisnet.org/icis2011/},
  isbn      = {978-0-615-55907-0},
  timestamp = {Fri, 23 Dec 2011 14:12:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icis/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icws/2011,
  title     = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
               DC, USA, July 4-9, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6009137},
  isbn      = {978-1-4577-0842-8},
  timestamp = {Wed, 19 Aug 2015 17:47:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2011,
  editor    = {Pierangela Samarati and
               Sara Foresti and
               Jiankun Hu and
               Giovanni Livraga},
  title     = {5th International Conference on Network and System Security, {NSS}
               2011, Milan, Italy, September 6-8, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6044613},
  isbn      = {978-1-4577-0458-1},
  timestamp = {Wed, 02 Nov 2011 15:17:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2011,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Nicholas Hopper},
  title     = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
               2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6794},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22263-4},
  doi       = {10.1007/978-3-642-22263-4},
  isbn      = {978-3-642-22262-7},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/qest/2011,
  title     = {Eighth International Conference on Quantitative Evaluation of Systems,
               {QEST} 2011, Aachen, Germany, 5-8 September, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6041098},
  isbn      = {978-1-4577-0973-9},
  timestamp = {Fri, 08 Aug 2014 15:28:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/qest/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2011,
  title     = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6112285},
  isbn      = {978-1-4577-1931-8},
  timestamp = {Sun, 05 May 2013 11:53:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wosp/2011,
  editor    = {Samuel Kounev and
               Vittorio Cortellessa and
               Raffaela Mirandola and
               David J. Lilja},
  title     = {ICPE'11 - Second Joint {WOSP/SIPEW} International Conference on Performance
               Engineering, Karlsruhe, Germany, March 14-16, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0519-8},
  timestamp = {Tue, 07 Jun 2011 09:20:46 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wosp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2010,
  editor    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6711},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22633-5},
  doi       = {10.1007/978-3-642-22633-5},
  isbn      = {978-3-642-22632-8},
  timestamp = {Fri, 19 May 2017 01:25:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/europki/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/otm/2010-1,
  editor    = {Robert Meersman and
               Tharam S. Dillon and
               Pilar Herrero},
  title     = {On the Move to Meaningful Internet Systems: {OTM} 2010 - Confederated
               International Conferences: CoopIS, IS, {DOA} and ODBASE, Hersonissos,
               Crete, Greece, October 25-29, 2010, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6426},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16934-2},
  doi       = {10.1007/978-3-642-16934-2},
  isbn      = {978-3-642-16933-5},
  timestamp = {Thu, 25 May 2017 00:41:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/2010-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ppsn/2010-2,
  editor    = {Robert Schaefer and
               Carlos Cotta and
               Joanna Kolodziej and
               G{\"{u}}nter Rudolph},
  title     = {Parallel Problem Solving from Nature - {PPSN} XI, 11th International
               Conference, Krak{\'{o}}w, Poland, September 11-15, 2010. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6239},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15871-1},
  doi       = {10.1007/978-3-642-15871-1},
  isbn      = {978-3-642-15870-4},
  timestamp = {Wed, 17 May 2017 14:24:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ppsn/2010-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2010,
  editor    = {Siddika Berna Ors Yalcin},
  title     = {Radio Frequency Identification: Security and Privacy Issues - 6th
               International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6370},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16822-2},
  doi       = {10.1007/978-3-642-16822-2},
  isbn      = {978-3-642-16821-5},
  timestamp = {Wed, 24 May 2017 08:28:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2010,
  editor    = {James B. D. Joshi and
               Barbara Carminati},
  title     = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1809842},
  doi       = {10.1145/1809842},
  isbn      = {978-1-4503-0049-0},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wecwis/2010,
  editor    = {Kuo{-}Ming Chao and
               Christian Huemer and
               Birgit Hofreiter and
               Yinsheng Li and
               Nazaraf Shah},
  title     = {12th {IEEE} Conference on Commerce and Enterprise Computing, {CEC}
               2010, Shanghai, China, November 10-12, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5706807},
  isbn      = {978-1-4244-8433-1},
  timestamp = {Thu, 04 Dec 2014 17:19:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2010,
  editor    = {Susanne Wetzel and
               Cristina Nita{-}Rotaru and
               Frank Stajano},
  title     = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
               {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-923-7},
  timestamp = {Wed, 24 Mar 2010 08:15:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/49,
  editor    = {Christian W. Probst and
               Jeffrey Hunker and
               Dieter Gollmann and
               Matt Bishop},
  title     = {Insider Threats in Cyber Security},
  series    = {Advances in Information Security},
  volume    = {49},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-1-4419-7133-3},
  doi       = {10.1007/978-1-4419-7133-3},
  isbn      = {978-1-4419-7132-6},
  timestamp = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/49},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cse/2009,
  title     = {Proceedings of the 12th {IEEE} International Conference on Computational
               Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
               29-31, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5282954},
  isbn      = {978-1-4244-5334-4},
  timestamp = {Thu, 07 May 2015 18:17:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexaw/2009,
  editor    = {A Min Tjoa and
               Roland R. Wagner},
  title     = {Database and Expert Systems Applications, DEXA, International Workshops,
               Linz, Austria, August 31-September 4, 2009, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5337077},
  isbn      = {978-0-7695-3763-4},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edoc/2009w,
  title     = {Workshops Proceedings of the 12th {IEEE} International Enterprise
               Distributed Object Computing Conference, EDOCw 2009, 1-4 September
               2009, Auckland, New Zealand},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5308790},
  isbn      = {978-1-4244-5563-8},
  timestamp = {Thu, 25 Jun 2015 17:37:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/2009w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2009,
  title     = {{IEEE} International Conference on Intelligence and Security Informatics,
               {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5089313},
  isbn      = {978-1-4244-4171-6},
  timestamp = {Wed, 10 Dec 2014 18:26:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isi/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2009,
  editor    = {Sung Y. Shin and
               Sascha Ossowski},
  title     = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
               Honolulu, Hawaii, USA, March 9-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1529282},
  doi       = {10.1145/1529282},
  isbn      = {978-1-60558-166-8},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sis/2009,
  editor    = {Alfonso Rodr{\'{\i}}guez and
               Mariemma Inmaculada Yag{\"{u}}e del Valle and
               Eduardo Fern{\'{a}}ndez{-}Medina},
  title     = {Security in Information Systems, Proceedings of the 7th International
               Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction
               with {ICEIS} 2009, Milan, Italy, May 2009},
  publisher = {{INSTICC} Press},
  year      = {2009},
  isbn      = {978-989-8111-91-3},
  timestamp = {Tue, 04 Jan 2011 13:04:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sis/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2009,
  editor    = {David A. Basin and
               Srdjan Capkun and
               Wenke Lee},
  title     = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
               {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-460-7},
  timestamp = {Fri, 20 Mar 2009 12:25:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2009,
  editor    = {Ehab Al{-}Shaer and
               Stefano Paraboschi},
  title     = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-783-7},
  timestamp = {Fri, 04 Feb 2011 17:14:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2008,
  title     = {Proceedings of the The Third International Conference on Availability,
               Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
               University of Catalonia, Barcelona , Spain},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4529302},
  isbn      = {978-0-7695-3102-1},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edoc/2008w,
  editor    = {Marten van Sinderen and
               Jo{\~{a}}o Paulo A. Almeida and
               Lu{\'{\i}}s Ferreira Pires and
               Maarten Steen},
  title     = {Workshops Proceedings of the 12th International {IEEE} Enterprise
               Distributed Object Computing Conference, {ECOCW} 2008, 16 September
               2008, Munich, Germany},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4814991},
  isbn      = {978-0-7695-3720-7},
  timestamp = {Thu, 25 Jun 2015 17:37:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/2008w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2008,
  editor    = {Sushil Jajodia and
               Pierangela Samarati and
               Stelvio Cimato},
  title     = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  series    = {{IFIP}},
  volume    = {278},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-0-387-09698-8},
  timestamp = {Wed, 17 Sep 2008 12:43:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2008,
  editor    = {Ernesto Damiani and
               Seth Proctor},
  title     = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
               2008, Alexandria, VA, USA, October 31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-292-4},
  timestamp = {Tue, 11 Nov 2008 12:49:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2008,
  editor    = {Vijay Atluri and
               Marianne Winslett},
  title     = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-289-4},
  timestamp = {Tue, 11 Nov 2008 14:09:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8302,
  editor    = {Matt Bishop and
               Dieter Gollmann and
               Jeffrey Hunker and
               Christian W. Probst},
  title     = {Countering Insider Threats, 20.07. - 25.07.2008},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {08302},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2008},
  url       = {http://drops.dagstuhl.de/portals/08302/},
  timestamp = {Tue, 07 Apr 2015 21:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/2008P8302},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edoc/2007,
  title     = {11th {IEEE} International Enterprise Distributed Object Computing
               Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4383963},
  isbn      = {0-7695-2891-0},
  timestamp = {Thu, 25 Jun 2015 17:37:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icpads/2007,
  title     = {13th International Conference on Parallel and Distributed Systems,
               {ICPADS} 2007, Hsinchu, Taiwan, December 5-7, 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4447704},
  isbn      = {978-1-4244-1889-3},
  timestamp = {Mon, 04 May 2015 17:00:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2007,
  title     = {Third International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
               2007},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4543879},
  isbn      = {978-1-4244-0974-7},
  timestamp = {Fri, 13 Mar 2015 14:05:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sis/2007,
  editor    = {Mariemma Inmaculada Yag{\"{u}}e del Valle and
               Eduardo Fern{\'{a}}ndez{-}Medina},
  title     = {Security in Information Systems, Proceedings of the 5th International
               Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction
               with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007},
  publisher = {{INSTICC} Press},
  year      = {2007},
  isbn      = {978-972-8865-96-2},
  timestamp = {Thu, 24 Jan 2008 19:53:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sis/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2007,
  editor    = {Costas Lambrinoudakis and
               G{\"{u}}nther Pernul and
               A Min Tjoa},
  title     = {Trust, Privacy and Security in Digital Business, 4th International
               Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4657},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74409-2},
  doi       = {10.1007/978-3-540-74409-2},
  isbn      = {978-3-540-74408-5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2007,
  editor    = {Peng Ning and
               Ting Yu},
  title     = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-883-1},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2006,
  editor    = {Ernesto Damiani and
               Peng Liu},
  title     = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Sophia Antipolis, France,
               July 31-August 2, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4127},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11805588},
  doi       = {10.1007/11805588},
  isbn      = {3-540-36796-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/etrics/2006,
  editor    = {G{\"{u}}nter M{\"{u}}ller},
  title     = {Emerging Trends in Information and Communication Security, International
               Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3995},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11766155},
  doi       = {10.1007/11766155},
  isbn      = {3-540-34640-6},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/etrics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itrust/2006,
  editor    = {Ketil St{\o}len and
               William H. Winsborough and
               Fabio Martinelli and
               Fabio Massacci},
  title     = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
               Italy, May 16-19, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3986},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11755593},
  doi       = {10.1007/11755593},
  isbn      = {3-540-34295-8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itrust/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2006,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  publisher = {Springer},
  year      = {2006},
  isbn      = {0-387-33405-X},
  timestamp = {Tue, 21 Nov 2006 10:57:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2006,
  editor    = {Ari Juels and
               Ernesto Damiani and
               Alban Gabillon},
  title     = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
               2006, Alexandria, VA, USA, November 3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-546-0},
  timestamp = {Tue, 22 Apr 2008 11:09:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icba/2004,
  editor    = {David Zhang and
               Anil K. Jain},
  title     = {Biometric Authentication, First International Conference, {ICBA} 2004,
               Hong Kong, China, July 15-17, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3072},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98225},
  doi       = {10.1007/b98225},
  isbn      = {3-540-22146-8},
  timestamp = {Wed, 14 Nov 2018 10:58:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icba/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2003,
  editor    = {Sushil Jajodia and
               Pierangela Samarati and
               Paul F. Syverson},
  title     = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  publisher = {{ACM}},
  year      = {2003},
  isbn      = {1-58113-776-1},
  timestamp = {Wed, 16 Feb 2005 14:48:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2001,
  editor    = {Ira S. Moskowitz},
  title     = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
               PA, USA, April 25-27, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2137},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45496-9},
  doi       = {10.1007/3-540-45496-9},
  isbn      = {3-540-42733-3},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier