BibTeX records: Walter Tighzert

download as .bib file

@inproceedings{DBLP:conf/ccs/FuhryTK16,
  author       = {Benny Fuhry and
                  Walter Tighzert and
                  Florian Kerschbaum},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Encrypting Analytical Web Applications},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {35--46},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996438},
  doi          = {10.1145/2996429.2996438},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FuhryTK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/GrofigHHKKSST14,
  author       = {Patrick Grofig and
                  Isabelle Hang and
                  Martin H{\"{a}}rterich and
                  Florian Kerschbaum and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy by Encrypted Databases},
  booktitle    = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
                  2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8450},
  pages        = {56--69},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06749-0\_4},
  doi          = {10.1007/978-3-319-06749-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/GrofigHHKKSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/GrofigHHKKSST14,
  author       = {Patrick Grofig and
                  Martin H{\"{a}}rterich and
                  Isabelle Hang and
                  Florian Kerschbaum and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Experiences and observations on the industrial implementation of a
                  system to search over outsourced encrypted data},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {115--125},
  publisher    = {{GI}},
  year         = {2014},
  url          = {http://subs.emis.de/LNI/Proceedings/Proceedings228/article7.html},
  timestamp    = {Wed, 13 Jan 2021 11:09:44 +0100},
  biburl       = {https://dblp.org/rec/conf/sicherheit/GrofigHHKKSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KerschbaumGHHKSST13,
  author       = {Florian Kerschbaum and
                  Patrick Grofig and
                  Isabelle Hang and
                  Martin H{\"{a}}rterich and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Adjustably encrypted in-memory column-store},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1325--1328},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512491},
  doi          = {10.1145/2508859.2512491},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KerschbaumGHHKSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KerschbaumHGKSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Patrick Grofig and
                  Mathias Kohler and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Optimal Re-encryption Strategy for Joins in Encrypted Databases},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_13},
  doi          = {10.1007/978-3-642-39256-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/KerschbaumHGKSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KerschbaumHKHSST13,
  author       = {Florian Kerschbaum and
                  Martin H{\"{a}}rterich and
                  Mathias Kohler and
                  Isabelle Hang and
                  Andreas Schaad and
                  Axel Schr{\"{o}}pfer and
                  Walter Tighzert},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {An Encrypted In-Memory Column-Store: The Onion Selection Problem},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_2},
  doi          = {10.1007/978-3-642-45204-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/KerschbaumHKHSST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LekiesNTPJ12,
  author       = {Sebastian Lekies and
                  Nick Nikiforakis and
                  Walter Tighzert and
                  Frank Piessens and
                  Martin Johns},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{DEMACRO:} Defense against Malicious Cross-Domain Requests},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_13},
  doi          = {10.1007/978-3-642-33338-5\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/LekiesTJ12,
  author       = {Sebastian Lekies and
                  Walter Tighzert and
                  Martin Johns},
  editor       = {Neeraj Suri and
                  Michael Waidner},
  title        = {Towards stateless, client-side driven Cross-Site Request Forgery protection
                  for Web applications},
  booktitle    = {Sicherheit 2012: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 6. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 7.-9. M{\"{a}}rz
                  2012 in Darmstadt},
  series       = {{LNI}},
  volume       = {{P-195}},
  pages        = {111--121},
  publisher    = {{GI}},
  year         = {2012},
  url          = {https://dl.gi.de/handle/20.500.12116/18267},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/LekiesTJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}