Stefan Katzenbeisser
Orcid: 0009-0005-3608-874XAffiliations:
- University of Passau, Chair of Computer Engineering, Germany
- Darmstadt University of Technology, Computer Science Department, Germany (2008 - 2019)
- TU Munich, Department of Computer Science, Germany (2003 - 2005)
- Vienna University of Technology, Institute of Software Technology, Austria (PhD 2004)
According to our database1,
Stefan Katzenbeisser
authored at least 275 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Veh. Technol., April, 2024
Toward Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments.
IEEE J. Sel. Areas Commun., February, 2024
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme.
Proceedings of the Sicherheit, 2024
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Proceedings of the 13th International Conference on Modern Circuits and Systems Technologies, 2024
The Synchronisation is the Message: Real-World Encrypted Communication Based on Synchronised Chaotic Circuits Without Using a Dedicated Synchronisation Line.
Proceedings of the 13th International Conference on Modern Circuits and Systems Technologies, 2024
Studying the Effects of Prolonged Thermal Stress Aiming to Induce Artificial Aging on DRAM Retention-Based Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Int. J. Crit. Infrastructure Prot., September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions.
CoRR, 2023
Keep your Enemies closer: On the minimal Distance of Adversaries when using Channel-based Key Extraction in SISO 6G Systems.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023
One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Exploiting Optical Nonlinear Temporal Coupling for Implementing Physical Unclonable Functions.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023
Proceedings of the Security and Trust Management - 19th International Workshop, 2023
An Evaluation of the Security and the Privacy of a Novel Single Sign-On System Based on Physical Unclonable Functions.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
A Method to Construct Efficient Carbon-Nanotube-Based Physical Unclonable Functions and True Random Number Generators.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023
VATT&EK: Formalization of Cyber Attacks on Intelligent Transport Systems - a TTP based approach for Automotive and Rail.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023
Proceedings of the 57th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2023, Pacific Grove, CA, USA, October 29, 2023
2022
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Computers, 2022
CoRR, 2022
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
CoRR, 2022
On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances.
CoRR, 2022
Mainzelliste SecureEpiLinker (MainSEL): privacy-preserving record linkage using secure multi-party computation.
Bioinform., 2022
A Dedicated Mixed-Signal Characterisation and Testing Framework for Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical Unclonable Functions.
Proceedings of the 11th International Conference on Modern Circuits and Systems Technologies, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches.
IEEE Trans. Computers, 2021
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems.
ACM J. Emerg. Technol. Comput. Syst., 2021
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
IACR Cryptol. ePrint Arch., 2021
A design for a secure network of networks using a hardware and software co-engineering architecture.
Proceedings of the SIGCOMM '21: ACM SIGCOMM 2021 Conference, 2021
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road Vehicles.
Proceedings of the Computer Safety, Reliability, and Security, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
2020
Proc. Priv. Enhancing Technol., 2020
ELSA: efficient long-term secure storage of large datasets (full version) <sup>∗</sup>.
EURASIP J. Inf. Secur., 2020
Proceedings of the IEEE Vehicular Networking Conference, 2020
Proceedings of the Computer Safety, Reliability, and Security, 2020
Proceedings of the Computer Safety, Reliability, and Security, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions.
Proceedings of the European Conference on Circuit Theory and Design, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Secur. Commun. Networks, 2019
Proc. Priv. Enhancing Technol., 2019
Microprocess. Microsystems, 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019
CoRR, 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 24th IEEE European Test Symposium, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption.
IEEE Trans. Inf. Forensics Secur., 2018
Dagstuhl Reports, 2018
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security <sup>†</sup>.
Cryptogr., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks.
Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems, 2018
Advanced Reconfigurable Physical Unclonable Functions (AR-PUFs) and Their Security Applications.
Proceedings of the 28. Krypto-Tag, 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
Proceedings of the 28. Krypto-Tag, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the 8th IEEE International Conference on Consumer Electronics - Berlin, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems.
Proceedings of the International Workshop on MILS: Architecture and Assurance for Secure Systems, 2018
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-67521-3, 2017
Proc. Priv. Enhancing Technol., 2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Formal Methods Syst. Des., 2017
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
CoRR, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Computer Safety, Reliability, and Security, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Datenschutz und Datensicherheit, 2016
Dagstuhl Reports, 2016
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
ACM Comput. Surv., 2016
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Privacy in Statistical Databases, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Software Engineering & Management 2015, Multikonferenz der GI-Fachbereiche Softwaretechnik (SWT) und Wirtschaftsinformatik (WI), FA WI-MAW, 17. März, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Information Hiding.
Artech House information security and privacy series, Artech House, ISBN: 978-1-60807-928-5, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Comput. Secur., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Compiler Construction - 23rd International Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors].
IEEE Signal Process. Mag., 2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Secur. Tech. Rep., 2013
IACR Cryptol. ePrint Arch., 2013
Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Communications and Multimedia Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the PETShop'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Security and Privacy in Biometrics, 2013
2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Communications and Multimedia Security, 2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Inf. Forensics Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Dagstuhl Reports, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
ACM Trans. Internet Techn., 2010
IEEE Trans. Dependable Secur. Comput., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Biol. Chem., 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Proceedings of the Communications and Multimedia Security, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
Proceedings of the Computer Security, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Inf. Forensics Secur., 2008
Des. Codes Cryptogr., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Security, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
IEEE Trans. Inf. Forensics Secur., 2007
IACR Cryptol. ePrint Arch., 2007
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
Proceedings of the ISSE/SECURE 2007, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria.
Inf. Process. Lett., 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
2005
CoRR, 2005
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Ensuring Media Integrity on Third-Party Infrastructures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the First International Workshop on the Open Digital Rights Language (ODRL), 2004
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security).
Proceedings of the Information Security, 7th International Conference, 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
Proceedings of the 11th European Signal Processing Conference, 2002
2001
Proceedings of the Electronic Commerce and Web Technologies, 2001
On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property.
Proceedings of the Electronic Commerce and Web Technologies, 2000
MATLAB 6 - eine Einführung.
Springer, ISBN: 978-3-211-83487-9, 2000