Andreas Peter
Andreas Peter
Professor, Safety-Security-Interaction Group, University of Oldenburg, Germany
Geverifieerd e-mailadres voor uol.de - Homepage
Geciteerd door
Geciteerd door
A survey of provably secure searchable encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and Distributed System Security Symposium (NDSS) 27, 2020
Group homomorphic encryption: characterizations, impossibility results, and applications
F Armknecht, S Katzenbeisser, A Peter
Designs, codes and cryptography 67 (2), 209-232, 2013
Oblivious outsourced storage with delegation
M Franz, P Williams, B Carbunar, S Katzenbeisser, A Peter, R Sion, ...
International Conference on Financial Cryptography and Data Security, 127-140, 2011
Privacy-preserving whole genome sequence processing through proxy-aided ORAM
N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
European Symposium on Research in Computer Security, 400-417, 2013
Converse PUF-based authentication
Ü Kocabaş, A Peter, S Katzenbeisser, AR Sadeghi
International Conference on Trust and Trustworthy Computing, 142-158, 2012
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics
VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ...
arXiv preprint arXiv:1806.04042, 2018
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
International Conference on Cryptology and Network Security, 321-336, 2014
General impossibility of group homomorphic encryption in the quantum world
F Armknecht, T Gagliardoni, S Katzenbeisser, A Peter
International Workshop on Public Key Cryptography, 556-573, 2014
Automatic deployment of specification-based intrusion detection in the BACnet protocol
H Esquivel-Vargas, M Caselli, A Peter
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017
SOFIR: Securely outsourced Forensic image recognition
C Bösch, A Peter, P Hartel, W Jonker
2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014
Automated retrieval of att&ck tactics and techniques for cyber threat reports
V Legoy, M Caselli, C Seifert, A Peter
arXiv preprint arXiv:2004.14322, 2020
Privacy-preserving architecture for forensic image recognition
A Peter, T Hartmann, S Müller, S Katzenbeisser
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
Private sharing of IOCs and sightings
T van de Kamp, A Peter, MH Everts, W Jonker
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
Proofbook: An online social network based on proof-of-work and friend-propagation
S Biedermann, NP Karvelas, S Katzenbeisser, T Strufe, A Peter
International Conference on Current Trends in Theory and Practice of …, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20