Severin Winkler

According to our database1, Severin Winkler authored at least 11 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions.
CoRR, 2024

2015
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

2014
On the Efficiency of Classical and Quantum Secure Function Evaluation.
IEEE Trans. Inf. Theory, 2014

On the applicability of combinatorial testing to web application security testing: a case study.
Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing, 2014

Retaining Consistency for Knowledge-Based Security Testing.
Proceedings of the Modern Advances in Applied Intelligence, 2014

2012
Classical and Quantum Secure Two-Party Computation.
PhD thesis, 2012

Towards a Unified Penetration Testing Taxonomy.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Bit Commitment From Nonsignaling Correlations.
IEEE Trans. Inf. Theory, 2011

On the Efficiency of Bit Commitment Reductions.
IACR Cryptol. ePrint Arch., 2011

2009
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.
IACR Cryptol. ePrint Arch., 2009

Collaborative Penetration Testing.
Proceedings of the Business Services: Konzepte, 2009


  Loading...