Author of the publication

BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields.

, , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 291-309. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3., , , , and . CoRR, (2017)NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints., , and . CoRR, (2017)Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 373-392. Springer, (2018)Automatic Quantification of Cache Side-Channels., , and . CAV, volume 7358 of Lecture Notes in Computer Science, page 564-580. Springer, (2012)TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition., , , , , and . MIST@CCS, page 45-56. ACM, (2017)Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications., , , , , and . Int. J. Inf. Sec., 20 (2): 181-197 (2021)Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques., , , , , , and . Int. J. Inf. Sec., 22 (6): 1665-1685 (December 2023)NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints., , and . ACM Trans. Priv. Secur., 24 (1): 2:1-2:35 (2020)SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems., , and . Int. J. Crit. Infrastructure Prot., (2021)FooBaR: Fault Fooling Backdoor Attack on Neural Network Training., , , and . CoRR, (2021)