default search action
Erik-Oliver Blass
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Erik-Oliver Blass, Guevara Noubir:
Forward Security with Crash Recovery for Secure Logs. ACM Trans. Priv. Secur. 27(1): 3:1-3:28 (2024) - 2023
- [j8]Travis Mayberry, Erik-Oliver Blass, Ellis Fenske:
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network. Proc. Priv. Enhancing Technol. 2023(1): 85-97 (2023) - [c41]Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. NDSS 2023 - [c40]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - [c39]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - 2022
- [c38]Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. AsiaCCS 2022: 28-41 - [c37]Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. ESORICS (3) 2022: 295-319 - [i29]Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. CoRR abs/2209.13913 (2022) - [i28]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. IACR Cryptol. ePrint Arch. 2022: 1465 (2022) - 2021
- [c36]Marinos Vomvas, Erik-Oliver Blass, Guevara Noubir:
SELEST: secure elevation estimation of drones using MPC. WISEC 2021: 238-249 - [i27]Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. IACR Cryptol. ePrint Arch. 2021: 1013 (2021) - 2020
- [c35]Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass:
Practical Over-Threshold Multi-Party Private Set Intersection. ACSAC 2020: 772-783 - [c34]Erik-Oliver Blass, Florian Kerschbaum:
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. AsiaCCS 2020: 558-571 - [i26]Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations. IACR Cryptol. ePrint Arch. 2020: 636 (2020)
2010 – 2019
- 2019
- [j7]Triet Dang Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
EPiC: efficient privacy-preserving counting for MapReduce. Computing 101(9): 1265-1286 (2019) - [i25]Amirali Sanatinia, Jeman Park, Erik-Oliver Blass, Aziz Mohaisen, Guevara Noubir:
A Privacy-Preserving Longevity Study of Tor's Hidden Services. CoRR abs/1909.03576 (2019) - [i24]Erik-Oliver Blass, Florian Kerschbaum:
Secure Computation of the kth-ranked Integer on Blockchains. IACR Cryptol. ePrint Arch. 2019: 276 (2019) - [i23]Erik-Oliver Blass, Guevara Noubir:
Forward Integrity and Crash Recovery for Secure Logs. IACR Cryptol. ePrint Arch. 2019: 506 (2019) - 2018
- [c33]Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. ESORICS (1) 2018: 87-110 - 2017
- [c32]Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Multi-client Oblivious RAM Secure Against Malicious Servers. ACNS 2017: 686-707 - [c31]Erik-Oliver Blass, Guevara Noubir:
Secure logging with crash tolerance. CNS 2017: 1-10 - [i22]Erik-Oliver Blass, Guevara Noubir:
Secure Logging with Crash Tolerance. IACR Cryptol. ePrint Arch. 2017: 107 (2017) - [i21]Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. IACR Cryptol. ePrint Arch. 2017: 1044 (2017) - 2016
- [c30]Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander:
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security. CCS 2016: 1877-1878 - [e1]Stefan Katzenbeisser, Edgar R. Weippl, Erik-Oliver Blass, Florian Kerschbaum:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4565-1 [contents] - 2015
- [j6]Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists. Proc. Priv. Enhancing Technol. 2015(2): 81-98 (2015) - [j5]Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:
Recursive Trees for Practical ORAM. Proc. Priv. Enhancing Technol. 2015(2): 115-134 (2015) - [c29]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication ORAM with Small Blocksize. CCS 2015: 862-873 - [c28]Aldo Cassola, Erik-Oliver Blass, Guevara Noubir:
Authenticating Privately over Public Wi-Fi Hotspots. CCS 2015: 1346-1357 - [c27]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Resizable Tree-Based Oblivious RAM. Financial Cryptography 2015: 147-167 - [c26]Tao Jin, Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
BaPu: Efficient and Practical Bunching of Access Point Uplinks. NETYS 2015: 337-353 - [c25]Triet D. Vo-Huu, Erik-Oliver Blass, Guevara Noubir:
EPiC: Efficient Privacy-Preserving Counting for MapReduce. NETYS 2015: 426-443 - [i20]Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:
Multi-User Oblivious RAM Secure Against Malicious Servers. IACR Cryptol. ePrint Arch. 2015: 121 (2015) - [i19]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Constant Communication Oblivious RAM. IACR Cryptol. ePrint Arch. 2015: 570 (2015) - [i18]Tarik Moataz, Erik-Oliver Blass:
Oblivious Substring Search with Updates. IACR Cryptol. ePrint Arch. 2015: 722 (2015) - [i17]Tarik Moataz, Erik-Oliver Blass, Travis Mayberry:
Constant Communication ORAM without Encryption. IACR Cryptol. ePrint Arch. 2015: 1116 (2015) - 2014
- [c24]Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu:
Toward Robust Hidden Volumes Using Write-Only Oblivious RAM. CCS 2014: 203-214 - [c23]Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Efficient Private File Retrieval by Combining ORAM and PIR. NDSS 2014 - [i16]Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu:
Toward Robust Hidden Volumes using Write-Only Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 344 (2014) - [i15]Tarik Moataz, Erik-Oliver Blass, Guevara Noubir:
Recursive Trees for Practical ORAM. IACR Cryptol. ePrint Arch. 2014: 603 (2014) - [i14]Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:
Resizable Tree-Based Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 732 (2014) - 2013
- [j4]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and secure payment with RFID. Comput. Commun. 36(4): 468-480 (2013) - [c22]Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. ACSAC 2013: 279-288 - [c21]Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
PIRMAP: Efficient Private Information Retrieval for MapReduce. Financial Cryptography 2013: 371-385 - [c20]Triet Vo Huu, Erik-Oliver Blass, Guevara Noubir:
Counter-jamming using mixed mechanical and software interference cancellation. WISEC 2013: 31-42 - [i13]Tao Jin, Triet Vo Huu, Erik-Oliver Blass, Guevara Noubir:
BaPu: Efficient and Practical Bunching of Access Point Uplinks. CoRR abs/1301.5928 (2013) - [i12]Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR. IACR Cryptol. ePrint Arch. 2013: 86 (2013) - [i11]Erik-Oliver Blass, Travis Mayberry, Guevara Noubir:
Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists. IACR Cryptol. ePrint Arch. 2013: 715 (2013) - 2012
- [c19]Erik-Oliver Blass, William Robertson:
TRESOR-HUNT: attacking CPU-bound encryption. ACSAC 2012: 71-78 - [c18]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. Privacy Enhancing Technologies 2012: 180-200 - [c17]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. RFIDSec 2012: 76-95 - [c16]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: on-site checking in RFID-based supply chains. WISEC 2012: 173-184 - [c15]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy-preserving statistics using RFID tags. WOWMOM 2012: 1-6 - [i10]Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
PIRMAP: Efficient Private Information Retrieval for MapReduce. IACR Cryptol. ePrint Arch. 2012: 398 (2012) - [i9]Erik-Oliver Blass, Guevara Noubir, Triet Vo Huu:
EPiC: Efficient Privacy-Preserving Counting for MapReduce. IACR Cryptol. ePrint Arch. 2012: 452 (2012) - [i8]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. IACR Cryptol. ePrint Arch. 2012: 465 (2012) - 2011
- [j3]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The F_f-Family of Protocols for RFID-Privacy and Authentication. IEEE Trans. Dependable Secur. Comput. 8(3): 466-480 (2011) - [c14]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac:
Demo: the ff hardware prototype for privacy-preserving RFID authentication. CCS 2011: 737-740 - [c13]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. NDSS 2011 - [c12]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. RFIDSec 2011: 163-182 - [i7]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. IACR Cryptol. ePrint Arch. 2011: 244 (2011) - [i6]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: On-site checking in RFID-based supply chains. IACR Cryptol. ePrint Arch. 2011: 651 (2011) - 2010
- [j2]Zinaida Benenson, Erik-Oliver Blaß, Felix C. Freiling:
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze). it Inf. Technol. 52(6): 320-324 (2010) - [i5]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. IACR Cryptol. ePrint Arch. 2010: 219 (2010) - [i4]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. IACR Cryptol. ePrint Arch. 2010: 634 (2010)
2000 – 2009
- 2009
- [j1]Joachim Wilke, Erik-Oliver Blaß, Felix C. Freiling, Martina Zitterbart:
A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks. Prax. Inf.verarb. Kommun. 32(2): 116-126 (2009) - [c11]Erik-Oliver Blass, Refik Molva:
New Directions in RFID Security. iNetSeC 2009: 76-84 - [c10]Erik-Oliver Blass, Martina Zitterbart:
Tailored Security and Safety for Pervasive Computing. iNetSeC 2009: 85-92 - [c9]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: private and secure payment with RFID. WPES 2009: 51-60 - [i3]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and Secure Payment with RFID. IACR Cryptol. ePrint Arch. 2009: 181 (2009) - [i2]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy Preserving Statistics using RFID Tags. IACR Cryptol. ePrint Arch. 2009: 481 (2009) - 2008
- [c8]Erik-Oliver Blaß, Joachim Wilke, Martina Zitterbart:
Relaxed authenticity for data aggregation in wireless sensor networks. SecureComm 2008: 4 - [c7]Erik-Oliver Blaß, Jens Horneber, Martina Zitterbart:
Analyzing Data Prediction in Wireless Sensor Networks. VTC Spring 2008: 86-87 - [i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The Ff-Family of Protocols for RFID-Privacy and Authentication. IACR Cryptol. ePrint Arch. 2008: 476 (2008) - 2007
- [b1]Erik-Oliver Blaß:
Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen. Karlsruhe Institute of Technology, Germany, 2007, ISBN 978-3-86644-142-2, pp. 1-220 - [c6]Erik-Oliver Blaß, Benjamin Fabian, Matthias Fischmann, Seda F. Gürses:
Security. Algorithms for Sensor and Ad Hoc Networks 2007: 305-323 - 2006
- [c5]Erik-Oliver Blaß, Martina Zitterbart:
An efficient key establishment scheme for secure aggregating sensor networks. AsiaCCS 2006: 303-310 - 2005
- [c4]Erik-Oliver Blaß, Holger Junker, Martina Zitterbart:
Effiziente Implementierung von Public-Key Algorithmen für Sensornetze. GI Jahrestagung (2) 2005: 140-144 - [c3]Erik-Oliver Blaß, Martina Zitterbart:
Towards Acceptable Public-Key Encryption in Sensor Networks. IWUC 2005: 88-93 - 2004
- [c2]Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart:
Secure Overlay for Service Centric Wireless Sensor Networks. ESAS 2004: 125-138 - [c1]Hans-Joachim Hof, Erik-Oliver Blaß, Thomas Fuhrmann, Martina Zitterbart:
Design of a Secure Distributed Service Directory for Wireless Sensornetworks. EWSN 2004: 276-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint