Obserwuj
Andreas Peter
Andreas Peter
Professor, Safety-Security-Interaction Group, University of Oldenburg, Germany
Zweryfikowany adres z uol.de - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A survey of provably secure searchable encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014
3742014
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1682013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1412010
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and Distributed System Security Symposium (NDSS) 27, 2020
892020
Group homomorphic encryption: characterizations, impossibility results, and applications
F Armknecht, S Katzenbeisser, A Peter
Designs, codes and cryptography 67, 209-232, 2013
642013
Oblivious Outsourced Storage with Delegation.
M Franz, P Williams, B Carbunar, S Katzenbeisser, A Peter, R Sion, ...
Financial Cryptography 7035, 127-140, 2011
512011
Privacy-preserving whole genome sequence processing through proxy-aided ORAM
N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014
47*2014
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
472013
Converse PUF-based authentication
Ü Kocabaş, A Peter, S Katzenbeisser, AR Sadeghi
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
452012
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
442017
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics
VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ...
arXiv preprint arXiv:1806.04042, 2018
37*2018
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
352014
Automated retrieval of att&ck tactics and techniques for cyber threat reports
V Legoy, M Caselli, C Seifert, A Peter
arXiv preprint arXiv:2004.14322, 2020
282020
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
272014
General impossibility of group homomorphic encryption in the quantum world
F Armknecht, T Gagliardoni, S Katzenbeisser, A Peter
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
242014
Automatic deployment of specification-based intrusion detection in the BACnet protocol
H Esquivel-Vargas, M Caselli, A Peter
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
232017
SOFIR: Securely outsourced Forensic image recognition
C Bösch, A Peter, P Hartel, W Jonker
2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014
192014
Obfuscated access and search patterns in searchable encryption
Z Shang, S Oya, A Peter, F Kerschbaum
arXiv preprint arXiv:2102.09651, 2021
132021
Privacy-preserving architecture for forensic image recognition
A Peter, T Hartmann, S Müller, S Katzenbeisser
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
132012
Deepcase: Semi-supervised contextual analysis of security events
T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022
122022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20