Obserwuj
Daniel Demmler
Tytuł
Cytowane przez
Cytowane przez
Rok
ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
D Demmler, T Schneider, M Zohner
NDSS, 2015
9022015
CogniCrypt: supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1332017
PIR-PSI: scaling private contact discovery
D Demmler, P Rindal, M Rosulek, N Trieu
Proceedings on Privacy Enhancing Technologies 2018 (4), 159-178, 2018
1202018
MP2ML: a mixed-protocol machine learning framework for private inference
F Boemer, R Cammarota, D Demmler, T Schneider, H Yalame
Proceedings of the 15th International Conference on Availability …, 2020
1162020
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1052018
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
982015
RAID-PIR: Practical Multi-Server PIR
D Demmler, A Herzberg, T Schneider
ACM Cloud Computing Security Workshop (ACM CCSW'14), 2014
732014
MOTION–A Framework for Mixed-Protocol Multi-Party Computation
L Braun, D Demmler, T Schneider, O Tkachenko
Cryptology ePrint Archive, Report 2020/1137, 2020. https://eprint. iacr. org …, 2020
642020
Privacy-preserving interdomain routing at Internet scale
G Asharov, D Demmler, M Schapira, T Schneider, G Segev, S Shenker, ...
Proceedings on Privacy Enhancing Technologies 2017 (3), 147-167, 2017
522017
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
D Demmler, T Schneider, M Zohner
23rd USENIX Security Symposium (USENIX Security'14), 2014
412014
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens (Full Version)
D Demmler, T Schneider, M Zohner
http://eprint.iacr.org/2014/467, 2014
41*2014
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
M Chiesa, D Demmler, M Canini, M Schapira, T Schneider
Proceedings of the 13th International Conference on emerging Networking …, 2017
312017
Privacy-preserving whole-genome variant queries
D Demmler, K Hamacher, T Schneider, S Stammler
Cryptology and Network Security: 16th International Conference, CANS 2017 …, 2018
212018
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
182020
Towards securing internet exchange points against curious onlookers
M Chiesa, D Demmler, M Canini, M Schapira, T Schneider
Proceedings of the 2016 Applied Networking Research Workshop, 32-34, 2016
182016
Trustworthy AI inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
122020
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding
M Dahl, D Demmler, S El Kazdadi, A Meyre, JB Orfila, D Rotaru, NP Smart, ...
Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023
92023
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection
P Bauspieß, J Kolberg, D Demmler, J Krämer, C Busch
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
72020
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
D Demmler, M Holz, T Schneider
Applied Cryptography and Network Security: 15th International Conference …, 2017
62017
Property unlearning: A defense strategy against property inference attacks (p. 16)
J Stock, J Wettlaufer, D Demmler
arXiv preprint arXiv:2205.08821, 2022
52022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20