2009 |
25 | EE | Florian Kerschbaum,
Daniel Dahlmeier,
Axel Schröpfer,
Debmalya Biswas:
On the practical importance of communication complexity for secure multi-party computation protocols.
SAC 2009: 2008-2015 |
24 | EE | Florian Kerschbaum,
Alessandro Sorniotti:
RFID-based supply chain partner authentication and key agreement.
WISEC 2009: 41-50 |
2008 |
23 | EE | Octavian Catrina,
Florian Kerschbaum:
Fostering the Uptake of Secure Multiparty Computation in E-Commerce.
ARES 2008: 693-700 |
22 | EE | Florian Kerschbaum:
Practical Privacy-Preserving Benchmarking.
SEC 2008: 17-31 |
21 | EE | Florian Kerschbaum,
Rafael Deitos:
Security against the business partner.
SWS 2008: 1-10 |
20 | EE | Florian Kerschbaum,
Julien Vayssière:
Privacy-preserving data analytics as an outsourced service.
SWS 2008: 87-96 |
19 | EE | Florian Kerschbaum,
Andreas Schaad:
Privacy-preserving social network analysis for criminal investigations.
WPES 2008: 9-14 |
18 | EE | Florian Kerschbaum:
Building a privacy-preserving benchmarking enterprise system.
Enterprise IS 2(4): 421-441 (2008) |
2007 |
17 | EE | Florian Kerschbaum:
Building a Privacy-Preserving Benchmarking Enterprise System.
EDOC 2007: 87-96 |
16 | EE | Florian Kerschbaum,
Julien Vayssière:
Privacy-preserving logical vector clocks using secure computation techniques.
ICPADS 2007: 1-8 |
15 | EE | Florian Kerschbaum,
Rafael Deitos,
Philip Robinson:
Securing VO Management.
TrustBus 2007: 14-23 |
14 | | Florian Kerschbaum:
A New Way to Think About Secure Computation: Language-based Secure Computation.
WOSIS 2007: 33-42 |
13 | EE | Florian Kerschbaum:
Distance-preserving pseudonymization for timestamps and spatial data.
WPES 2007: 68-71 |
12 | EE | Yücel Karabulut,
Florian Kerschbaum,
Fabio Massacci,
Philip Robinson,
Artsiom Yautsiukhin:
Security and Trust in IT Business Outsourcing: a Manifesto.
Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007) |
2006 |
11 | EE | Philip Robinson,
Florian Kerschbaum,
Andreas Schaad:
From Business Process Choreography to Authorization Policies.
DBSec 2006: 297-309 |
10 | EE | Florian Kerschbaum,
Orestis Terzidis:
Filtering for Private Collaborative Benchmarking.
ETRICS 2006: 409-422 |
9 | EE | Florian Kerschbaum:
Practical Private Regular Expression Matching.
SEC 2006: 461-470 |
8 | EE | Rafael Deitos,
Florian Kerschbaum,
Philip Robinson:
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses.
SWS 2006: 103-104 |
7 | EE | Florian Kerschbaum,
Jochen Haller,
Yücel Karabulut,
Philip Robinson:
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation.
iTrust 2006: 193-205 |
2004 |
6 | EE | Florian Kerschbaum,
Mikhail J. Atallah,
David M'Raïhi,
John R. Rice:
Private Fingerprint Verification without Local Storage.
ICBA 2004: 387-394 |
2003 |
5 | EE | Mikhail J. Atallah,
Florian Kerschbaum,
Wenliang Du:
Secure and private sequence comparisons.
WPES 2003: 39-44 |
4 | EE | Seny Kamara,
Sonia Fahmy,
E. Eugene Schultz,
Florian Kerschbaum,
Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls.
Computers & Security 22(3): 214-232 (2003) |
2002 |
3 | | Florian Kerschbaum,
Eugene H. Spafford,
Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection.
Journal of Computer Security 10(1/2): 23-70 (2002) |
2001 |
2 | EE | Mikhail J. Atallah,
Victor Raskin,
Michael Crogan,
Christian Hempelmann,
Florian Kerschbaum,
Dina Mohamed,
Sanket Naik:
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.
Information Hiding 2001: 185-199 |
1 | | Michael Frantzen,
Florian Kerschbaum,
E. Eugene Schultz,
Sonia Fahmy:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Computers & Security 20(3): 263-270 (2001) |