default search action
BibTeX records: Walter Tighzert
@inproceedings{DBLP:conf/ccs/FuhryTK16, author = {Benny Fuhry and Walter Tighzert and Florian Kerschbaum}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Encrypting Analytical Web Applications}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996438}, doi = {10.1145/2996429.2996438}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FuhryTK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/GrofigHHKKSST14, author = {Patrick Grofig and Isabelle Hang and Martin H{\"{a}}rterich and Florian Kerschbaum and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy by Encrypted Databases}, booktitle = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF} 2014, Athens, Greece, May 20-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8450}, pages = {56--69}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06749-0\_4}, doi = {10.1007/978-3-319-06749-0\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/apf/GrofigHHKKSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14, author = {Patrick Grofig and Martin H{\"{a}}rterich and Isabelle Hang and Florian Kerschbaum and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {115--125}, publisher = {{GI}}, year = {2014}, url = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html}, timestamp = {Wed, 13 Jan 2021 11:09:44 +0100}, biburl = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13, author = {Florian Kerschbaum and Patrick Grofig and Isabelle Hang and Martin H{\"{a}}rterich and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Adjustably encrypted in-memory column-store}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1325--1328}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512491}, doi = {10.1145/2508859.2512491}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumGHHKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Patrick Grofig and Mathias Kohler and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Lingyu Wang and Basit Shafiq}, title = {Optimal Re-encryption Strategy for Joins in Encrypted Databases}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {195--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_13}, doi = {10.1007/978-3-642-39256-6\_13}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13, author = {Florian Kerschbaum and Martin H{\"{a}}rterich and Mathias Kohler and Isabelle Hang and Andreas Schaad and Axel Schr{\"{o}}pfer and Walter Tighzert}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {An Encrypted In-Memory Column-Store: The Onion Selection Problem}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {14--26}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_2}, doi = {10.1007/978-3-642-45204-8\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KerschbaumHKHSST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LekiesNTPJ12, author = {Sebastian Lekies and Nick Nikiforakis and Walter Tighzert and Frank Piessens and Martin Johns}, editor = {Davide Balzarotti and Salvatore J. Stolfo and Marco Cova}, title = {{DEMACRO:} Defense against Malicious Cross-Domain Requests}, booktitle = {Research in Attacks, Intrusions, and Defenses - 15th International Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7462}, pages = {254--273}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33338-5\_13}, doi = {10.1007/978-3-642-33338-5\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/LekiesTJ12, author = {Sebastian Lekies and Walter Tighzert and Martin Johns}, editor = {Neeraj Suri and Michael Waidner}, title = {Towards stateless, client-side driven Cross-Site Request Forgery protection for Web applications}, booktitle = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz 2012 in Darmstadt}, series = {{LNI}}, volume = {{P-195}}, pages = {111--121}, publisher = {{GI}}, year = {2012}, url = {https://dl.gi.de/handle/20.500.12116/18267}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/LekiesTJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.