Thomas Lorünser

Orcid: 0000-0002-1829-4882

According to our database1, Thomas Lorünser authored at least 51 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure Computation and Trustless Data Intermediaries in Data Spaces.
CoRR, 2024

Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers.
CoRR, 2024

Towards Real-Time Privacy-Preserving Minutiae Matching.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024

Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Integrating Secure Multiparty Computation into Data Spaces.
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024

2023
On the Security of Offloading Post-Processing for Quantum Key Distribution.
Entropy, February, 2023

Outsourced Computations Maintaining Confidentiality and Authenticity.
ERCIM News, 2023

2022
A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management.
CoRR, 2022

A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

A Distributed Architecture for Privacy-Preserving Optimization Using Genetic Algorithms and Multi-party Computation.
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022

Towards a Performance Model for Byzantine Fault Tolerant Services.
Proceedings of the 12th International Conference on Cloud Computing and Services Science, 2022

A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

2021
SlotMachine - A Privacy-preserving Marketplace for Slot Management.
ERCIM News, 2021

Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services.
CoRR, 2021

Single-Use Delegatable Signatures Based on Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
FLEXPROD - Flexible Optimizations of Production with Secure Auctions.
ERCIM News, 2020

Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Making secret sharing based cloud storage usable.
Inf. Comput. Secur., 2019

2018
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018

Secure and Robust Multi-Cloud Storage for the Public Sector.
ERCIM News, 2018

Engineering Cryptography for Security and Privacy in the Cloud.
ERCIM News, 2018

A fast and resource efficient FPGA implementation of secret sharing for storage applications.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Agile cryptographic solutions for the cloud.
Elektrotech. Informationstechnik, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Batch-verifiable Secret Sharing with Unconditional Privacy.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards Attribute-Based Credentials in the Cloud.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

The Archistar Secret-Sharing Backup Proxy.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Attacks on quantum key distribution protocols that employ non-ITS authentication.
Quantum Inf. Process., 2016

Secure and Privacy-Preserving Identity Management in the Cloud.
ERCIM News, 2016

PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud.
ERCIM News, 2016

A New Architecture for Developing Cryptographic Cloud Services.
ERCIM News, 2016

Malicious Clients in Distributed Secret Sharing Based Storage Networks.
Proceedings of the Security Protocols XXIV, 2016

Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Passive ROADM Flexibility in Optical Access With Spectral and Spatial Reconfigurability.
IEEE J. Sel. Areas Commun., 2015

Fully Passive Resiliency Node for Optical Access [Invited].
JOCN, 2015

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Fully-passive resiliency switch for agile PON restoration.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

Towards spectrum-programmable, mesh-enabled mobile xHaul through reconfigurable WDM overlay in fully-passive networks.
Proceedings of the 17th International Conference on Transparent Optical Networks, 2015

Cloud Security and Privacy by Design.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Fully-passive ROADM for flexible in metro-access networks.
Proceedings of the European Conference on Optical Communication, 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2008
Key Management of Quantum Generated Keys in IPsec.
Proceedings of the SECRYPT 2008, 2008

Security processor with quantum key distribution.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2004
Embedding quantum cryptography on DSP-boards.
Proceedings of the 2004 12th European Signal Processing Conference, 2004


  Loading...