Ahmad-Reza Sadeghi
Orcid: 0000-0001-6833-3598Affiliations:
- University of Darmstadt, Germany
- Ruhr University Bochum, Germany
According to our database1,
Ahmad-Reza Sadeghi
authored at least 425 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Emerg. Top. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Orbital Trust and Privacy: SoK on PKI and Location Privacy Challenges in Space Networks.
Proceedings of the 33rd USENIX Security Symposium, 2024
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
CoRR, 2023
Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms.
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412).
Dagstuhl Reports, October, 2022
Found. Trends Priv. Secur., 2022
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis.
CoRR, 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
2021
IACR Cryptol. ePrint Arch., 2021
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning.
CoRR, 2021
Commun. ACM, 2021
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Secur. Priv., 2020
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
IEEE Secur. Priv., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE J. Sel. Areas Commun., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik - Informatik für Gesellschaft, INFORMATIK 2019, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
J. Comput. Secur., 2018
IEEE Internet Comput., 2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management.
CoRR, 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 19th Annual Conference of the International Speech Communication Association, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the International Conference on Computer-Aided Design, 2018
Proceedings of the Computer Security, 2018
Proceedings of the International Conference on Embedded Software, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the International Conference on Compilers, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017
CoRR, 2017
Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 USENIX Annual Technical Conference, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
2015
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02346-0, 2015
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-25546-0, 2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
IACR Cryptol. ePrint Arch., 2015
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02344-6, 2014
IEEE Trans. Inf. Forensics Secur., 2014
J. Netw. Comput. Appl., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Ninth Eurosys Conference 2014, 2014
Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
J. Comput. Secur., 2013
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM International Health Informatics Symposium, 2012
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011
Dagstuhl Reports, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Future Internet, 2011
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the SPSM'11, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011
Proceedings of the Biomedical Engineering Systems and Technologies, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
J. Comput. Secur., 2010
Int. J. Wirel. Mob. Comput., 2010
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptol. ePrint Arch., 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Proceedings of the perspeGKtive 2010, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the ACM International Health Informatics Symposium, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the ARES 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Trusted Computing, 2009
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the ISSE 2009, 2009
Proceedings of the ISSE 2009, 2009
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Computer Security, 2009
Proceedings of the Database and Expert Systems Applications, 2009
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
IACR Cryptol. ePrint Arch., 2008
Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the Computer Security, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Trans. Data Hiding Multim. Secur., 2007
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptol. ePrint Arch., 2007
Datenschutz und Datensicherheit, 2007
The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Future of Identity in the Information Society, 2007
Proceedings of the 37. Jahrestagung der Gesellschaft für Informatik, 2007
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007
2006
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
Trans. Data Hiding Multim. Secur., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the ISSE 2006, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it.
Multim. Syst., 2005
Towards multilaterally secure computing platforms - with open source and trusted computing.
Inf. Secur. Tech. Rep., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Property-based attestation for computing platforms: caring about properties, not mechanisms.
Proceedings of the New Security Paradigms Workshop 2004, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the ISSE 2004, 2004
2003
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Datenschutz und Datensicherheit, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the New Security Paradigms Workshop 2003, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
Proceedings of the 11th European Signal Processing Conference, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Financial Cryptography, 2000
1999
Proceedings of the Information Hiding, Third International Workshop, 1999