Andreas Peter
Orcid: 0000-0003-2929-5001
According to our database1,
Andreas Peter
authored at least 78 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Biom. Behav. Identity Sci., July, 2024
Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes.
CoRR, 2024
SPAWN: Seamless Proximity-Based Authentication by Utilizing the Existent WiFi Environment.
Proceedings of the Information Security Theory and Practice, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
2023
Comput. Commun., November, 2023
Proc. Priv. Enhancing Technol., April, 2023
IACR Cryptol. ePrint Arch., 2023
LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity.
Proceedings of the Information Security Practice and Experience, 2023
Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
2022
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption.
IET Biom., September, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022
Proceedings of the IEEE International Joint Conference on Biometrics, 2022
The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2022
Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the Distributed Applications and Interoperable Systems: 22nd IFIP WG 6.1 International Conference, 2022
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021
Proc. Priv. Enhancing Technol., 2021
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the EdgeSys@EuroSys 2021: 4th International Workshop on Edge Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
Proceedings of the Applied Cryptography and Network Security, 2021
2020
Consolidation of Reward Memory during Sleep Does Not Require Dopaminergic Activation.
J. Cogn. Neurosci., 2020
Des. Codes Cryptogr., 2020
CoRR, 2020
HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiQuitous '20: Computing, 2020
Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020
2019
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities.
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
BACRank: Ranking Building Automation and Control System Components by Business Continuity Impact.
Proceedings of the Computer Safety, Reliability, and Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
CoRR, 2018
2017
Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain.
CoRR, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013
Proceedings of the Sicherheit 2014: Sicherheit, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the AFRICON 2011, 2011
2010
An MRI Receiver Coil Produced by Inkjet Printing Directly on to a Flexible Substrate.
IEEE Trans. Medical Imaging, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010