


Остановите войну!
for scientists:


default search action
Florian Kerschbaum
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
Books and Theses
- 2010
- [b1]Florian Kerschbaum:
A privacy-preserving benchmarking platform. Karlsruhe Institute of Technology, 2010
Journal Articles
- 2023
- [j31]Sina Faraji, Florian Kerschbaum:
Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates. Proc. Priv. Enhancing Technol. 2023(4): 224-237 (2023) - [j30]Thomas Humphries, Florian Kerschbaum:
Differentially Private Simple Genetic Algorithms. Proc. Priv. Enhancing Technol. 2023(4): 540-558 (2023) - 2022
- [j29]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(1): 1-5 (2022) - [j28]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(2): 1-5 (2022) - [j27]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(3): 1-5 (2022) - [j26]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(4): 1-5 (2022) - [j25]Andreas Fischer
, Benny Fuhry
, Jörn Kußmaul
, Jonas Janneck
, Florian Kerschbaum
, Eric Bodden
:
Computation on Encrypted Data Using Dataflow Authentication. ACM Trans. Priv. Secur. 25(3): 21:1-21:36 (2022) - 2021
- [j24]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(1): 1-4 (2021) - [j23]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(2): 1-4 (2021) - [j22]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(3): 1-4 (2021) - [j21]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(4): 1-5 (2021) - [j20]Daniel Bernau, Günther Eibl, Philip-William Grassal, Hannah Keller, Florian Kerschbaum:
Quantifying identifiability to choose and audit epsilon in differentially private deep learning. Proc. VLDB Endow. 14(13): 3335-3347 (2021) - 2020
- [j19]Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data using Dataflow Authentication. Proc. Priv. Enhancing Technol. 2020(1): 5-25 (2020) - [j18]Bailey Kacsmar, Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
Mind the Gap: Ceremonies for Applied Secret Sharing. Proc. Priv. Enhancing Technol. 2020(2): 397-415 (2020) - [j17]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. Proc. VLDB Endow. 13(11): 2132-2145 (2020) - 2019
- [j16]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser:
Private Evaluation of Decision Trees using Sublinear Cost. Proc. Priv. Enhancing Technol. 2019(1): 266-286 (2019) - [j15]Chang Ge
, Ihab F. Ilyas, Florian Kerschbaum:
Secure Multi-Party Functional Dependency Discovery. Proc. VLDB Endow. 13(2): 184-196 (2019) - 2018
- [j14]Benny Fuhry
, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5): 677-706 (2018) - [j13]Stamatis Karnouskos
, Florian Kerschbaum:
Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles. Proc. IEEE 106(1): 160-170 (2018) - 2012
- [j12]Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang:
Workflow Signatures for Business Process Compliance. IEEE Trans. Dependable Secur. Comput. 9(5): 756-769 (2012) - 2011
- [j11]Florian Kerschbaum:
Secure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider. Bus. Inf. Syst. Eng. 3(3): 135-143 (2011) - [j10]Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina
, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato
, Ernesto Damiani
:
Secure Collaborative Supply-Chain Management. Computer 44(9): 38-43 (2011) - [j9]Richard Pibernik, Yingying Zhang, Florian Kerschbaum, Axel Schröpfer:
Secure collaborative supply chain planning and inverse optimization - The JELS model. Eur. J. Oper. Res. 208(1): 75-85 (2011) - [j8]Florian Kerschbaum:
Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauenswürdigen Dienstanbieter. Wirtschaftsinf. 53(3): 129-138 (2011) - 2009
- [j7]Rafael Deitos, Florian Kerschbaum:
Parallelizing secure linear programming. Concurr. Comput. Pract. Exp. 21(10): 1321-1350 (2009) - [j6]Florian Kerschbaum, Philip Robinson:
Security architecture for virtual organizations of business web services. J. Syst. Archit. 55(4): 224-232 (2009) - [j5]Axel Schröpfer, Florian Kerschbaum, Christoph G. Schütz, Richard Pibernik:
Optimizations for Risk-Aware Secure Supply Chain Master Planning. J. Univers. Comput. Sci. 15(15): 3019-3037 (2009) - 2008
- [j4]Florian Kerschbaum:
Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst. 2(4): 421-441 (2008) - 2003
- [j3]Seny Kamara, Sonia Fahmy
, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. Comput. Secur. 22(3): 214-232 (2003) - 2002
- [j2]Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection. J. Comput. Secur. 10(1/2): 23-70 (2002) - 2001
- [j1]Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy
:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. Comput. Secur. 20(3): 263-270 (2001)
Conference and Workshop Papers
- 2023
- [c141]Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. CSF 2023: 473-488 - [c140]Lucas Fenaux
, Thomas Humphries
, Florian Kerschbaum
:
Gaggle: Genetic Algorithms on the GPU using PyTorch. GECCO Companion 2023: 2358-2361 - [c139]Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. NDSS 2023 - [c138]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - [c137]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - [c136]Nils Lukas, Florian Kerschbaum:
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators. USENIX Security Symposium 2023 - 2022
- [c135]Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. AsiaCCS 2022: 28-41 - [c134]Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum:
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. CCS 2022: 1459-1472 - [c133]Daniel Bernau, Jonas Robl, Florian Kerschbaum:
Assessing Differentially Private Variational Autoencoders Under Membership Inference. DBSec 2022: 3-14 - [c132]Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. ESORICS (3) 2022: 295-319 - [c131]Masoumeh Shafieinejad, Suraj Gupta, Jin Yang Liu, Koray Karabina, Florian Kerschbaum:
Equi-Joins over Encrypted Data for Series of Queries. ICDE 2022: 1635-1648 - [c130]Justus Mattern, Benjamin Weggenmann, Florian Kerschbaum:
The Limits of Word Level Differential Privacy. NAACL-HLT (Findings) 2022: 867-881 - [c129]Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum:
SoK: How Robust is Image Classification Deep Neural Network Watermarking? SP 2022: 787-804 - [c128]Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum:
Caring about Sharing: User Perceptions of Multiparty Data Sharing. USENIX Security Symposium 2022: 899-916 - [c127]Rasoul Akhavan Mahdavi, Florian Kerschbaum:
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators. USENIX Security Symposium 2022: 1723-1740 - [c126]Simon Oya, Florian Kerschbaum:
IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. USENIX Security Symposium 2022: 2407-2424 - [c125]Benjamin Weggenmann, Valentin Rublack, Michael Andrejczuk, Justus Mattern, Florian Kerschbaum:
DP-VAE: Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders. WWW 2022: 721-731 - 2021
- [c124]Maryam Sepehri, Florian Kerschbaum:
Low-Cost Hiding of the Query Pattern. AsiaCCS 2021: 593-603 - [c123]Benjamin Weggenmann, Florian Kerschbaum:
Differential Privacy for Directional Data. CCS 2021: 1205-1222 - [c122]Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Heavy Hitters. CCS 2021: 2361-2377 - [c121]Daniel Bernau, Jonas Robl, Philip-William Grassal, Steffen Schneider, Florian Kerschbaum:
Comparing Local and Central Differential Privacy Using Membership Inference Attacks. DBSec 2021: 22-42 - [c120]Benny Fuhry
, Jayanth Jain H. A, Florian Kerschbaum:
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves. DSN 2021: 438-450 - [c119]Chan Nam Ngo
, Fabio Massacci
, Florian Kerschbaum, Julian Williams
:
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. Financial Cryptography (2) 2021: 579-598 - [c118]Nils Lukas, Yuxuan Zhang, Florian Kerschbaum:
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples. ICLR 2021 - [c117]Masoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, Xinda Li, Florian Kerschbaum:
On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. IH&MMSec 2021: 177-188 - [c116]Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. NDSS 2021 - [c115]Masoumeh Shafieinejad, Florian Kerschbaum, Ihab F. Ilyas:
PCOR: Private Contextual Outlier Release via Differentially Private Search. SIGMOD Conference 2021: 1571-1583 - [c114]Florian Kerschbaum:
Towards Privacy in Deep Learning. TPS-ISA 2021: 279-280 - [c113]Simon Oya, Florian Kerschbaum:
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. USENIX Security Symposium 2021: 127-142 - [c112]Tianhao Wang, Florian Kerschbaum:
RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks. WWW 2021: 993-1004 - 2020
- [c111]Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass:
Practical Over-Threshold Multi-Party Private Set Intersection. ACSAC 2020: 772-783 - [c110]Anselme Tueno, Florian Kerschbaum:
Efficient Secure Computation of Order-Preserving Encryption. AsiaCCS 2020: 193-207 - [c109]Erik-Oliver Blass, Florian Kerschbaum:
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. AsiaCCS 2020: 558-571 - [c108]Andreas Fischer, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden:
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage. CSF 2020: 230-245 - [c107]Anselme Tueno, Yordan Boev, Florian Kerschbaum:
Non-interactive Private Decision Tree Evaluation. DBSec 2020: 174-194 - [c106]Benny Fuhry
, Lina Hirschoff, Samuel Koesnadi, Florian Kerschbaum:
SeGShare: Secure Group File Sharing in the Cloud using Enclaves. DSN 2020: 476-488 - [c105]Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri, Maryam Sepehri, Simon Oya, Florian Kerschbaum:
Differentially Private Two-Party Set Operations. EuroS&P 2020: 390-404 - [c104]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. Financial Cryptography 2020: 386-403 - [c103]Basit Khurram, Florian Kerschbaum:
SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. ICDE 2020: 277-288 - [c102]Jonas Böhler, Florian Kerschbaum:
Secure Sublinear Time Differentially Private Median Computation. NDSS 2020 - [c101]Timon Hackenjos, Florian Hahn
, Florian Kerschbaum:
SAGMA: Secure Aggregation Grouped by Multiple Attributes. SIGMOD Conference 2020: 587-601 - [c100]Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Median. USENIX Security Symposium 2020: 2147-2164 - 2019
- [c99]Florian Kerschbaum, Anselme Tueno:
An Efficiently Searchable Encrypted Data Structure for Range Queries. ESORICS (2) 2019: 344-364 - [c98]Tianhao Wang, Florian Kerschbaum:
Attacks on Digital Watermarks for Deep Neural Networks. ICASSP 2019: 2622-2626 - [c97]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Joins Over Encrypted Data with Fine Granular Security. ICDE 2019: 674-685 - 2018
- [c96]Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. ESORICS (1) 2018: 87-110 - [c95]Benjamin Weggenmann, Florian Kerschbaum:
SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining. SIGIR 2018: 305-314 - [c94]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Practical and Secure Substring Search. SIGMOD Conference 2018: 163-176 - 2017
- [c93]Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti:
Selective access for supply chain management in the cloud. CNS 2017: 476-482 - [c92]Jonas Böhler, Daniel Bernau, Florian Kerschbaum:
Privacy-Preserving Outlier Detection for Data Streams. DBSec 2017: 225-238 - [c91]Florian Kerschbaum, Martin Härterich:
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases. DBSec 2017: 325-336 - [c90]Benny Fuhry
, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. DBSec 2017: 386-408 - 2016
- [c89]Florian Hahn, Florian Kerschbaum:
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage. CCSW 2016: 23-34 - [c88]Benny Fuhry
, Walter Tighzert, Florian Kerschbaum:
Encrypting Analytical Web Applications. CCSW 2016: 35-46 - [c87]Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander:
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security. CCS 2016: 1877-1878 - 2015
- [c86]Florian Kerschbaum:
Frequency-Hiding Order-Preserving Encryption. CCS 2015: 656-667 - [c85]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c84]Florian Kerschbaum, Hoon Wei Lim:
Privacy-Preserving Observation in Public Spaces. ESORICS (2) 2015: 81-100 - [c83]Chaowen Guan, Kui Ren
, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - [c82]Florian Kerschbaum:
Oblivious outsourcing of garbled circuit generation. SAC 2015: 2134-2140 - [c81]Isabelle Hang, Florian Kerschbaum, Ernesto Damiani
:
ENKI: Access Control for Encrypted Query Processing. SIGMOD Conference 2015: 183-196 - 2014
- [c80]Florian Kerschbaum, Thomas Schneider
, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. ACNS 2014: 566-584 - [c79]Patrick Grofig, Isabelle Hang, Martin Härterich, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Privacy by Encrypted Databases. APF 2014: 56-69 - [c78]Florian Kerschbaum, Axel Schröpfer:
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption. CCS 2014: 275-286 - [c77]Florian Hahn, Florian Kerschbaum:
Searchable Encryption with Secure and Efficient Updates. CCS 2014: 310-320 - [c76]Florian Kerschbaum:
Client-Controlled Cloud Encryption. CCS 2014: 1542-1543 - [c75]Lujo Bauer, Florian Kerschbaum:
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? SACMAT 2014: 127-128 - [c74]Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152 - [c73]Patrick Grofig, Martin Härterich, Isabelle Hang, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. Sicherheit 2014: 115-125 - 2013
- [c72]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. BigData Congress 2013: 31-37 - [c71]Raphael Urmoneit, Florian Kerschbaum:
Efficient secure computation optimization. PETShop@CCS 2013: 11-18 - [c70]Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum:
k-anonymous reputation. AsiaCCS 2013: 359-368 - [c69]Florian Kerschbaum:
An information-flow type-system for mixed protocol secure computation. AsiaCCS 2013: 393-404 - [c68]Marek Jawurek, Florian Kerschbaum, Claudio Orlandi
:
Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. CCS 2013: 955-966 - [c67]Florian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Adjustably encrypted in-memory column-store. CCS 2013: 1325-1328 - [c66]Florian Kerschbaum:
Expression rewriting for optimizing secure computation. CODASPY 2013: 49-58 - [c65]Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Optimal Re-encryption Strategy for Joins in Encrypted Databases. DBSec 2013: 195-210 - [c64]Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
An Encrypted In-Memory Column-Store: The Onion Selection Problem. ICISS 2013: 14-26 - [c63]Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. NDSS 2013 - [c62]Florian Kerschbaum:
Searching over encrypted data in cloud systems. SACMAT 2013: 87-88 - [c61]Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss:
Secure benchmarking in the cloud. SACMAT 2013: 197-200 - [c60]Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:
Privacy-preserving billing for e-ticketing systems in public transportation. WPES 2013: 143-154 - 2012
- [c59]Florian Kerschbaum:
Privacy-Preserving Computation - (Position Paper). APF 2012: 41-54 - [c58]Florian Kerschbaum:
Outsourced private set intersection using homomorphic encryption. AsiaCCS 2012: 85-86 - [c57]Jens Strüker, Florian Kerschbaum:
From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids. ICIS 2012 - [c56]Florian Kerschbaum, Leonardo Weiss Ferreira Chaves:
Encrypted Searchable Storage of RFID Tracking Data. MDM 2012: 176-185 - [c55]Marek Jawurek, Florian Kerschbaum:
Fault-Tolerant Privacy-Preserving Statistics. Privacy Enhancing Technologies 2012: 221-238 - [c54]Florian Kerschbaum:
Collusion-resistant outsourcing of private set intersection. SAC 2012: 1451-1456 - [c53]