default search action
Andreas Peter
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Improved Multiplication-Free Biometric Recognition Under Encryption. IEEE Trans. Biom. Behav. Identity Sci. 6(3): 314-325 (2024) - [c56]Zsolt Levente Kucsván, Marco Caselli, Andreas Peter, Andrea Continella:
Inferring Recovery Steps from Cyber Threat Intelligence Reports. DIMVA 2024: 330-349 - [c55]Philipp Jakubeit, Andreas Peter, Maarten van Steen:
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area. ICISSP 2024: 558-569 - [c54]Asbat El Khairi, Marco Caselli, Andreas Peter, Andrea Continella:
REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices. NDSS 2024 - [c53]Philipp Jakubeit, Andreas Peter, Maarten van Steen:
SPAWN: Seamless Proximity-Based Authentication by Utilizing the Existent WiFi Environment. WISTP 2024: 1-16 - 2023
- [j11]Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter:
Privacy-friendly statistical counting for pedestrian dynamics. Comput. Commun. 211: 178-192 (2023) - [j10]César Sabater, Florian Hahn, Andreas Peter, Jan Ramon:
Private Sampling with Identifiable Cheaters. Proc. Priv. Enhancing Technol. 2023(2): 361-383 (2023) - [c52]Amina Bassit, Florian Hahn, Zohra Rezgui, Una M. Kelly, Raymond N. J. Veldhuis, Andreas Peter:
Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison. IJCB 2023: 1-10 - [c51]Philipp Jakubeit, Andreas Peter, Maarten van Steen:
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity. ISPEC 2023: 399-418 - [i19]Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. CoRR abs/2306.15302 (2023) - [i18]Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. CoRR abs/2307.01131 (2023) - [i17]Marc Damie, Jean-Benoist Leger, Florian Hahn, Andreas Peter:
The statistical nature of leakage in SSE schemes and its role in passive attacks. IACR Cryptol. ePrint Arch. 2023: 1883 (2023) - 2022
- [j9]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption. IET Biom. 11(5): 430-444 (2022) - [c50]Marco Dijkslag, Marc Damie, Florian Hahn, Andreas Peter:
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes. ACNS 2022: 126-146 - [c49]Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. ACNS 2022: 170-192 - [c48]Federico Mazzone, Leander van den Heuvel, Maximilian Huber, Cristian Verdecchia, Maarten H. Everts, Florian Hahn, Andreas Peter:
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks. AISec@CCS 2022: 13-24 - [c47]Asbat El Khairi, Marco Caselli, Christian Knierim, Andreas Peter, Andrea Continella:
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection. CCSW 2022: 9-21 - [c46]Maarten van Steen, Valeriu-Daniel Stanciu, Nadia Shafaeipour, Cristian Chilipirea, Ciprian Dobre, Andreas Peter, Mingshu Wang:
Challenges in Automated Measurement of Pedestrian Dynamics. DAIS 2022: 187-199 - [c45]Jeroen Weener, Florian Hahn, Andreas Peter:
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards. DBSec 2022: 215-235 - [c44]Philipp Jakubeit, Andreas Peter, Maarten van Steen:
The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames. ETAA 2022: 48-69 - [c43]Amina Bassit, Florian Hahn, Raymond N. J. Veldhuis, Andreas Peter:
Multiplication-Free Biometric Recognition for Faster Processing under Encryption. IJCB 2022: 1-9 - [c42]Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter:
Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds. MSWiM 2022: 213-222 - [c41]Tariq Bontekoe, Maarten H. Everts, Andreas Peter:
Balancing privacy and accountability in digital payment methods using zk-SNARKs. PST 2022: 1-10 - [c40]Thijs van Ede, Hojjat Aghakhani, Noah Spahn, Riccardo Bortolameotti, Marco Cova, Andrea Continella, Maarten van Steen, Andreas Peter, Christopher Kruegel, Giovanni Vigna:
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events. SP 2022: 522-539 - [i16]Herson Esquivel-Vargas, John Henry Castellanos, Marco Caselli, Nils Ole Tippenhauer, Andreas Peter:
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge. CoRR abs/2204.09106 (2022) - 2021
- [j8]Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. Proc. Priv. Enhancing Technol. 2021(4): 270-290 (2021) - [j7]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries. IEEE Trans. Inf. Forensics Secur. 16: 5045-5060 (2021) - [c39]Ruben Groot Roessink, Andreas Peter, Florian Hahn:
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements. ACNS (2) 2021: 155-183 - [c38]Amina Bassit, Florian Hahn, Chris G. Zeinstra, Raymond N. J. Veldhuis, Andreas Peter:
Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745? BIOSIG 2021: 101-112 - [c37]Herson Esquivel-Vargas, Marco Caselli, Andreas Peter:
BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol. DSN (Supplements) 2021: 45-48 - [c36]Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter:
Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption. EdgeSys@EuroSys 2021: 37-42 - [c35]Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. NDSS 2021 - [c34]Marc Damie, Florian Hahn, Andreas Peter:
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents. USENIX Security Symposium 2021: 143-160 - [i15]Amina Bassit, Florian Hahn, Joep Peeters, Tom Kevenaar, Raymond N. J. Veldhuis, Andreas Peter:
Biometric Verification Secure Against Malicious Adversaries. CoRR abs/2101.10631 (2021) - [i14]Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. CoRR abs/2102.09651 (2021) - [i13]Felix Engelmann, Lukas Müller, Andreas Peter, Frank Kargl, Christoph Bösch:
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges. IACR Cryptol. ePrint Arch. 2021: 631 (2021) - 2020
- [j6]Tim van de Kamp, Andreas Peter, Willem Jonker:
A multi-authority approach to various predicate encryption types. Des. Codes Cryptogr. 88(2): 363-390 (2020) - [j5]Marjan Alizadeh Asfestani, Valentin Brechtmann, João Santiago, Andreas Peter, Jan Born, Gordon Benedikt Feld:
Consolidation of Reward Memory during Sleep Does Not Require Dopaminergic Activation. J. Cogn. Neurosci. 32(9): 1688-1703 (2020) - [c33]Herson Esquivel-Vargas, Marco Caselli, Geert Jan Laanstra, Andreas Peter:
Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective. DIMVA 2020: 44-64 - [c32]Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter:
k-Anonymous Crowd Flow Analytics. MobiQuitous 2020: 376-385 - [c31]Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter:
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. NDSS 2020 - [c30]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, Pieter H. Hartel, Andreas Peter:
HeadPrint: detecting anomalous communications through header-based application fingerprinting. SAC 2020: 1696-1705 - [i12]Valentine Legoy, Marco Caselli, Christin Seifert, Andreas Peter:
Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports. CoRR abs/2004.14322 (2020)
2010 – 2019
- 2019
- [c29]Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter:
Two-Client and Multi-client Functional Encryption for Set Intersection. ACISP 2019: 97-115 - [c28]Herson Esquivel-Vargas, Marco Caselli, Erik Tews, Doina Bucur, Andreas Peter:
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impact. SAFECOMP 2019: 183-199 - [c27]Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten H. Everts, Willem Jonker, Pieter H. Hartel, Andreas Peter:
Victim-Aware Adaptive Covert Channels. SecureComm (1) 2019: 450-471 - [c26]Philipp Jakubeit, Albert Dercksen, Andreas Peter:
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. WISTP 2019: 202-219 - 2018
- [c25]Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:
uMine: A Blockchain Based on Human Miners. ICICS 2018: 20-38 - [i11]Victor Mayoral Vilches, Laura Alzola Kirschgens, Asier Bilbao Calvo, Alejandro Hernández Cordero, Rodrigo Izquierdo Pisón, David Mayoral Vilches, Aday Muñiz Rosas, Gorka Olalde Mendia, Lander Usategui San Juan, Irati Zamalloa Ugarte, Endika Gil-Uriarte, Erik Tews, Andreas Peter:
Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics. CoRR abs/1806.04042 (2018) - [i10]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-only Encryption for Conjunctive Equality Tests. IACR Cryptol. ePrint Arch. 2018: 563 (2018) - [i9]Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:
uMine: a Blockchain based on Human Miners. IACR Cryptol. ePrint Arch. 2018: 722 (2018) - 2017
- [c24]Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - [c23]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. CANS 2017: 135-157 - [c22]Herson Esquivel-Vargas, Marco Caselli, Andreas Peter:
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol. CPS-SPC@CCS 2017: 25-36 - [c21]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:
Using Oblivious RAM in Genomic Studies. DPM/CBT@ESORICS 2017: 35-52 - [i8]Joep Peeters, Andreas Peter, Raymond N. J. Veldhuis:
Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain. CoRR abs/1705.09936 (2017) - 2016
- [c20]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel:
Reliably determining data leakage in the presence of strong attackers. ACSAC 2016: 484-495 - [c19]Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Private Sharing of IOCs and Sightings. WISCS@CCS 2016: 35-38 - [i7]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture. IACR Cryptol. ePrint Arch. 2016: 1077 (2016) - 2015
- [c18]Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker:
Publicly Verifiable Private Aggregation of Time-Series Data. ARES 2015: 50-59 - [c17]Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni:
Indicators of Malicious SSL Connections. NSS 2015: 162-175 - [c16]Stefan Dietzel, Andreas Peter, Frank Kargl:
Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. VTC Spring 2015: 1-5 - 2014
- [j4]Christoph Bösch, Pieter H. Hartel, Willem Jonker, Andreas Peter:
A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. 47(2): 18:1-18:51 (2014) - [c15]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. CANS 2014: 321-336 - [c14]Christoph Bösch, Andreas Peter, Pieter H. Hartel, Willem Jonker:
SOFIR: Securely outsourced Forensic image recognition. ICASSP 2014: 2694-2698 - [c13]Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. Public Key Cryptography 2014: 556-573 - [c12]Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - [c11]Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter:
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125 - [c10]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Erik Tews, Kay Hamacher:
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM. WPES 2014: 1-10 - [i6]Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. CoRR abs/1401.2417 (2014) - [i5]Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. IACR Cryptol. ePrint Arch. 2014: 29 (2014) - [i4]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann:
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. IACR Cryptol. ePrint Arch. 2014: 72 (2014) - [i3]Felix Günther, Mark Manulis, Andreas Peter:
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation. IACR Cryptol. ePrint Arch. 2014: 382 (2014) - 2013
- [b1]Andreas Peter:
Securely outsourcing computations using homomorphic encryption. Darmstadt University of Technology, Germany, 2013, pp. 1-115 - [j3]Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter:
Group homomorphic encryption: characterizations, impossibility results, and applications. Des. Codes Cryptogr. 67(2): 209-232 (2013) - [j2]Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation Under Multiple Keys. IEEE Trans. Inf. Forensics Secur. 8(12): 2046-2058 (2013) - [c9]Arjan Jeckmans, Andreas Peter, Pieter H. Hartel:
Efficient Privacy-Enhanced Familiarity-Based Recommender System. ESORICS 2013: 400-417 - [c8]Eleftheria Makri, Maarten H. Everts, Sebastiaan de Hoogh, Andreas Peter, Harm op den Akker, Pieter H. Hartel, Willem Jonker:
Privacy-Preserving Verification of Clinical Research. Sicherheit 2013: 481-500 - [i2]Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation under Multiple Keys. IACR Cryptol. ePrint Arch. 2013: 13 (2013) - 2012
- [c7]Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter:
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption. AFRICACRYPT 2012: 234-251 - [c6]Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser:
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. ISC 2012: 242-257 - [c5]Ünal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Converse PUF-Based Authentication. TRUST 2012: 142-158 - [c4]Andreas Peter, Thomas Hartmann, Sascha Müller, Stefan Katzenbeisser:
Privacy-preserving architecture for forensic image recognition. WIFS 2012: 79-84 - 2011
- [c3]Andreas Senn, Andreas Peter, Jan G. Korvink:
Analog circuit synthesis using two-port theory and genetic programming. AFRICON 2011: 1-8 - [c2]Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková:
Oblivious Outsourced Storage with Delegation. Financial Cryptography 2011: 127-140 - 2010
- [j1]Dario Mager, Andreas Peter, Laura Del Tin, Elmar Fischer, Patrick J. Smith, Jürgen Hennig, Jan G. Korvink:
An MRI Receiver Coil Produced by Inkjet Printing Directly on to a Flexible Substrate. IEEE Trans. Medical Imaging 29(2): 482-487 (2010) - [c1]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [i1]Frederik Armknecht, Andreas Peter, Stefan Katzenbeisser:
A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP. IACR Cryptol. ePrint Arch. 2010: 501 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint