2023
Verbesserung der Datengrundlage der Mindestlohnforschung mittels maschineller Lernverfahren.
AStA Wirtschafts und Sozialstatistisches Arch., March, 2023
AtoMig: Automatically Migrating Millions Lines of Code from TSO to WMM.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2021
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services.
Online Soc. Networks Media, 2021
DuMu<sup>x</sup> 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Comput. Math. Appl., 2021
2020
Breaking and (Partially) Fixing Provably Secure Onion Routing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019
On Privacy Notions in Anonymous Communication.
Proc. Priv. Enhancing Technol., 2019
PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract).
Inform. Spektrum, 2019
DuMu<sup>x</sup> 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2019
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking.
Proceedings of the 2019 International Conference on Networked Systems, 2019
2018
Secure and efficient comparisons between untrusted parties.
PhD thesis, 2018
Machine Learning in Official Statistics.
CoRR, 2018
On Privacy Notion in Anonymous Communication.
CoRR, 2018
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version).
CoRR, 2018
2017
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017
Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken.
AStA Wirtschafts und Sozialstatistisches Arch., 2017
PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
2016
VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016
Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
2014
Inference Control for Privacy-Preserving Genome Matching.
CoRR, 2014
Enhanced TKIP Michael Attacks.
CoRR, 2014
Privacy-Preserving Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014
GeneCloud: Secure Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014
2013
Building simulation approaches for the training of automated data analysis tools in building energy management.
Adv. Eng. Informatics, 2013
Forensic identification of GSM mobile phones.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013
2012
A Visual Analysis Approach to Support Perfective Software Maintenance.
Proceedings of the 16th International Conference on Information Visualisation, 2012
Privacy-preserving data mining demonstrator.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012
2011
Template-free detection of macromolecular complexes in cryo electron tomograms.
Bioinform., 2011
A visual analysis and design tool for planning software reengineerings.
Proceedings of the 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2011
Do-Not-Track Techniques for Browsers and Their Implications for Consumers.
Proceedings of the Privacy and Identity Management for Life, 2011
EWMA based approaches for automated building energy analysis.
Proceedings of the 2011 IEEE International Symposium on Signal Processing and Information Technology, 2011
2010
Towards automated analysis and visualization of distributed software systems.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010
2009
Proceedings of the Testing of Software and Communication Systems, 2009
NXTalk: dynamic object-oriented programming in a constrained environment.
Proceedings of the International Workshop on Smalltalk Technologies, 2009
2008
Practical attacks against WEP and WPA.
IACR Cryptol. ePrint Arch., 2008
2006
Cryo-electron tomography of biological specimens.
IEEE Signal Process. Mag., 2006
An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006
1998
Architecture-dependent partitioning of dependence graphs.
Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing, 1998