default search action
Florian Kerschbaum
Person information
- affiliation: University of Waterloo, ON, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Shubhankar Mohapatra, Jianqiao Zong, Florian Kerschbaum, Xi He:
Differentially Private Data Generation with Missing Data. Proc. VLDB Endow. 17(8): 2022-2035 (2024) - [c147]Nils Lukas, Abdulrahman Diaa, Lucas Fenaux, Florian Kerschbaum:
Leveraging Optimization for Adaptive Attacks on Image Watermarks. ICLR 2024 - [c146]Benjamin Schneider, Nils Lukas, Florian Kerschbaum:
Universal Backdoor Attacks. ICLR 2024 - [c145]Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum:
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions. USENIX Security Symposium 2024 - [c144]Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John A. Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum:
PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting. USENIX Security Symposium 2024 - [i60]Lucas Fenaux, Florian Kerschbaum:
SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge. CoRR abs/2402.14937 (2024) - [i59]Abdulrahman Diaa, Thomas Humphries, Florian Kerschbaum:
FastLloyd: Federated, Accurate, Secure, and Tunable k-Means Clustering with Differential Privacy. CoRR abs/2405.02437 (2024) - 2023
- [j35]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - [j34]Florian Kerschbaum, Nils Lukas:
Privacy-Preserving Machine Learning [Cryptography]. IEEE Secur. Priv. 21(6): 90-94 (2023) - [j33]Sujaya Maiyya, Sharath Chandra Vemula, Divyakant Agrawal, Amr El Abbadi, Florian Kerschbaum:
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns. Proc. ACM Manag. Data 1(4): 266:1-266:25 (2023) - [j32]Sina Faraji, Florian Kerschbaum:
Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates. Proc. Priv. Enhancing Technol. 2023(4): 224-237 (2023) - [j31]Thomas Humphries, Florian Kerschbaum:
Differentially Private Simple Genetic Algorithms. Proc. Priv. Enhancing Technol. 2023(4): 540-558 (2023) - [j30]Ruidi Wei, Florian Kerschbaum:
Cryptographically Secure Private Record Linkage Using Locality-Sensitive Hashing. Proc. VLDB Endow. 17(2): 79-91 (2023) - [c143]Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: Towards Informed Consent for Private Computation. CCS 2023: 210-224 - [c142]Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum:
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. CCS 2023: 2945-2958 - [c141]Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum:
Investigating Membership Inference Attacks under Data Dependencies. CSF 2023: 473-488 - [c140]Lucas Fenaux, Thomas Humphries, Florian Kerschbaum:
Gaggle: Genetic Algorithms on the GPU using PyTorch. GECCO Companion 2023: 2358-2361 - [c139]Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. NDSS 2023 - [c138]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - [c137]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. SP 2023: 1419-1434 - [c136]Nils Lukas, Florian Kerschbaum:
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators. USENIX Security Symposium 2023: 2241-2258 - [i58]Rasoul Akhavan Mahdavi, Abdulrahman Diaa, Florian Kerschbaum:
HE is all you need: Compressing FHE Ciphertexts using Additive HE. CoRR abs/2303.09043 (2023) - [i57]Nils Lukas, Florian Kerschbaum:
PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators. CoRR abs/2304.07361 (2023) - [i56]Nils Lukas, Florian Kerschbaum:
Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks against Deep Image Classification. CoRR abs/2305.09671 (2023) - [i55]Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum:
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions. CoRR abs/2306.08538 (2023) - [i54]Yutong Wu, Jie Zhang, Florian Kerschbaum, Tianwei Zhang:
Backdooring Textual Inversion for Concept Censorship. CoRR abs/2308.10718 (2023) - [i53]Clark W. Barrett, Brad Boyd, Ellie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. CoRR abs/2308.14840 (2023) - [i52]Rasoul Akhavan Mahdavi, Haoyan Ni, Dimitry Linkov, Florian Kerschbaum:
Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption. CoRR abs/2309.06496 (2023) - [i51]Nils Lukas, Abdulrahman Diaa, Lucas Fenaux, Florian Kerschbaum:
Leveraging Optimization for Adaptive Attacks on Image Watermarks. CoRR abs/2309.16952 (2023) - [i50]Shubhankar Mohapatra, Jianqiao Zong, Florian Kerschbaum, Xi He:
Differentially Private Data Generation with Missing Data. CoRR abs/2310.11548 (2023) - [i49]Rasoul Akhavan Mahdavi, Nils Lukas, Faezeh Ebrahimianghazani, Thomas Humphries, Bailey Kacsmar, John A. Premkumar, Xinda Li, Simon Oya, Ehsan Amjadian, Florian Kerschbaum:
PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting. CoRR abs/2310.14565 (2023) - [i48]Benjamin Schneider, Nils Lukas, Florian Kerschbaum:
Universal Backdoor Attacks. CoRR abs/2312.00157 (2023) - [i47]Sujaya Maiyya, Sharath Chandra Vemula, Divyakant Agrawal, Amr El Abbadi, Florian Kerschbaum:
Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns. IACR Cryptol. ePrint Arch. 2023: 1285 (2023) - 2022
- [j29]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(1): 1-5 (2022) - [j28]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(2): 1-5 (2022) - [j27]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(3): 1-5 (2022) - [j26]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(4): 1-5 (2022) - [j25]Andreas Fischer, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data Using Dataflow Authentication. ACM Trans. Priv. Secur. 25(3): 21:1-21:36 (2022) - [c135]Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. AsiaCCS 2022: 28-41 - [c134]Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum:
Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics. CCS 2022: 1459-1472 - [c133]Daniel Bernau, Jonas Robl, Florian Kerschbaum:
Assessing Differentially Private Variational Autoencoders Under Membership Inference. DBSec 2022: 3-14 - [c132]Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. ESORICS (3) 2022: 295-319 - [c131]Masoumeh Shafieinejad, Suraj Gupta, Jin Yang Liu, Koray Karabina, Florian Kerschbaum:
Equi-Joins over Encrypted Data for Series of Queries. ICDE 2022: 1635-1648 - [c130]Justus Mattern, Benjamin Weggenmann, Florian Kerschbaum:
The Limits of Word Level Differential Privacy. NAACL-HLT (Findings) 2022: 867-881 - [c129]Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum:
SoK: How Robust is Image Classification Deep Neural Network Watermarking? SP 2022: 787-804 - [c128]Bailey Kacsmar, Kyle Tilbury, Miti Mazmudar, Florian Kerschbaum:
Caring about Sharing: User Perceptions of Multiparty Data Sharing. USENIX Security Symposium 2022: 899-916 - [c127]Rasoul Akhavan Mahdavi, Florian Kerschbaum:
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators. USENIX Security Symposium 2022: 1723-1740 - [c126]Simon Oya, Florian Kerschbaum:
IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. USENIX Security Symposium 2022: 2407-2424 - [c125]Benjamin Weggenmann, Valentin Rublack, Michael Andrejczuk, Justus Mattern, Florian Kerschbaum:
DP-VAE: Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders. WWW 2022: 721-731 - [i46]Rasoul Akhavan Mahdavi, Florian Kerschbaum:
Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators. CoRR abs/2202.07569 (2022) - [i45]Daniel Bernau, Jonas Robl, Florian Kerschbaum:
Assessing Differentially Private Variational Autoencoders under Membership Inference. CoRR abs/2204.07877 (2022) - [i44]Justus Mattern, Benjamin Weggenmann, Florian Kerschbaum:
The Limits of Word Level Differential Privacy. CoRR abs/2205.02130 (2022) - [i43]Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. CoRR abs/2209.13913 (2022) - [i42]Bailey Kacsmar, Vasisht Duddu, Kyle Tilbury, Blase Ur, Florian Kerschbaum:
Comprehension from Chaos: What Users Understand and Expect from Private Computation. CoRR abs/2211.07026 (2022) - [i41]Yihan Wu, Xinda Li, Florian Kerschbaum, Heng Huang, Hongyang Zhang:
Towards Robust Dataset Learning. CoRR abs/2211.10752 (2022) - [i40]Erik-Oliver Blass, Florian Kerschbaum:
Private Collaborative Data Cleaning via Non-Equi PSI. IACR Cryptol. ePrint Arch. 2022: 1465 (2022) - 2021
- [j24]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(1): 1-4 (2021) - [j23]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(2): 1-4 (2021) - [j22]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(3): 1-4 (2021) - [j21]Aaron Johnson, Florian Kerschbaum:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2021(4): 1-5 (2021) - [j20]Daniel Bernau, Günther Eibl, Philip-William Grassal, Hannah Keller, Florian Kerschbaum:
Quantifying identifiability to choose and audit epsilon in differentially private deep learning. Proc. VLDB Endow. 14(13): 3335-3347 (2021) - [c124]Maryam Sepehri, Florian Kerschbaum:
Low-Cost Hiding of the Query Pattern. AsiaCCS 2021: 593-603 - [c123]Benjamin Weggenmann, Florian Kerschbaum:
Differential Privacy for Directional Data. CCS 2021: 1205-1222 - [c122]Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Heavy Hitters. CCS 2021: 2361-2377 - [c121]Daniel Bernau, Jonas Robl, Philip-William Grassal, Steffen Schneider, Florian Kerschbaum:
Comparing Local and Central Differential Privacy Using Membership Inference Attacks. DBSec 2021: 22-42 - [c120]Benny Fuhry, Jayanth Jain H. A, Florian Kerschbaum:
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves. DSN 2021: 438-450 - [c119]Chan Nam Ngo, Fabio Massacci, Florian Kerschbaum, Julian Williams:
Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading. Financial Cryptography (2) 2021: 579-598 - [c118]Nils Lukas, Yuxuan Zhang, Florian Kerschbaum:
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples. ICLR 2021 - [c117]Masoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, Xinda Li, Florian Kerschbaum:
On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. IH&MMSec 2021: 177-188 - [c116]Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. NDSS 2021 - [c115]Masoumeh Shafieinejad, Florian Kerschbaum, Ihab F. Ilyas:
PCOR: Private Contextual Outlier Release via Differentially Private Search. SIGMOD Conference 2021: 1571-1583 - [c114]Florian Kerschbaum:
Towards Privacy in Deep Learning. TPS-ISA 2021: 279-280 - [c113]Simon Oya, Florian Kerschbaum:
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. USENIX Security Symposium 2021: 127-142 - [c112]Tianhao Wang, Florian Kerschbaum:
RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks. WWW 2021: 993-1004 - [i39]Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. CoRR abs/2102.09651 (2021) - [i38]Daniel Bernau, Günther Eibl, Philip-William Grassal, Hannah Keller, Florian Kerschbaum:
Quantifying identifiability to choose and audit ε in differentially private deep learning. CoRR abs/2103.02913 (2021) - [i37]Masoumeh Shafieinejad, Florian Kerschbaum, Ihab F. Ilyas:
PCOR: Private Contextual Outlier Release via Differentially Private Search. CoRR abs/2103.05173 (2021) - [i36]Masoumeh Shafieinejad, Suraj Gupta, Jin Yang Liu, Koray Karabina, Florian Kerschbaum:
Equi-Joins Over Encrypted Data for Series of Queries. CoRR abs/2103.05792 (2021) - [i35]Thomas Humphries, Rasoul Akhavan Mahdavi, Shannon Veitch, Florian Kerschbaum:
Selective MPC: Distributed Computation of Differentially Private Key Value Statistics. CoRR abs/2107.12407 (2021) - [i34]Nils Lukas, Edward Jiang, Xinda Li, Florian Kerschbaum:
SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version). CoRR abs/2108.04974 (2021) - [i33]Simon Oya, Florian Kerschbaum:
IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization. CoRR abs/2110.04180 (2021) - [i32]Jiaxiang Liu, Simon Oya, Florian Kerschbaum:
Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference. CoRR abs/2110.05524 (2021) - [i31]Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. IACR Cryptol. ePrint Arch. 2021: 1013 (2021) - 2020
- [j19]Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data using Dataflow Authentication. Proc. Priv. Enhancing Technol. 2020(1): 5-25 (2020) - [j18]Bailey Kacsmar, Chelsea Komlo, Florian Kerschbaum, Ian Goldberg:
Mind the Gap: Ceremonies for Applied Secret Sharing. Proc. Priv. Enhancing Technol. 2020(2): 397-415 (2020) - [j17]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. Proc. VLDB Endow. 13(11): 2132-2145 (2020) - [c111]Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass:
Practical Over-Threshold Multi-Party Private Set Intersection. ACSAC 2020: 772-783 - [c110]Anselme Tueno, Florian Kerschbaum:
Efficient Secure Computation of Order-Preserving Encryption. AsiaCCS 2020: 193-207 - [c109]Erik-Oliver Blass, Florian Kerschbaum:
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. AsiaCCS 2020: 558-571 - [c108]Andreas Fischer, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden:
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage. CSF 2020: 230-245 - [c107]Anselme Tueno, Yordan Boev, Florian Kerschbaum:
Non-interactive Private Decision Tree Evaluation. DBSec 2020: 174-194 - [c106]Benny Fuhry, Lina Hirschoff, Samuel Koesnadi, Florian Kerschbaum:
SeGShare: Secure Group File Sharing in the Cloud using Enclaves. DSN 2020: 476-488 - [c105]Bailey Kacsmar, Basit Khurram, Nils Lukas, Alexander Norton, Masoumeh Shafieinejad, Zhiwei Shang, Yaser Baseri, Maryam Sepehri, Simon Oya, Florian Kerschbaum:
Differentially Private Two-Party Set Operations. EuroS&P 2020: 390-404 - [c104]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. Financial Cryptography 2020: 386-403 - [c103]Basit Khurram, Florian Kerschbaum:
SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. ICDE 2020: 277-288 - [c102]Jonas Böhler, Florian Kerschbaum:
Secure Sublinear Time Differentially Private Median Computation. NDSS 2020 - [c101]Timon Hackenjos, Florian Hahn, Florian Kerschbaum:
SAGMA: Secure Aggregation Grouped by Multiple Attributes. SIGMOD Conference 2020: 587-601 - [c100]Jonas Böhler, Florian Kerschbaum:
Secure Multi-party Computation of Differentially Private Median. USENIX Security Symposium 2020: 2147-2164 - [i30]Benny Fuhry, Jayanth Jain H. A, Florian Kerschbaum:
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves. CoRR abs/2002.05097 (2020) - [i29]Simeon Krastnikov, Florian Kerschbaum, Douglas Stebila:
Efficient Oblivious Database Joins. CoRR abs/2003.09481 (2020) - [i28]Simon Oya, Florian Kerschbaum:
Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption. CoRR abs/2010.03465 (2020) - [i27]Thomas Humphries, Matthew Rafuse, Lindsey Tulloch, Simon Oya, Ian Goldberg, Florian Kerschbaum:
Differentially Private Learning Does Not Bound Membership Inference. CoRR abs/2010.12112 (2020) - [i26]Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations. IACR Cryptol. ePrint Arch. 2020: 636 (2020)
2010 – 2019
- 2019
- [j16]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser:
Private Evaluation of Decision Trees using Sublinear Cost. Proc. Priv. Enhancing Technol. 2019(1): 266-286 (2019) - [j15]Chang Ge, Ihab F. Ilyas, Florian Kerschbaum:
Secure Multi-Party Functional Dependency Discovery. Proc. VLDB Endow. 13(2): 184-196 (2019) - [c99]Florian Kerschbaum, Anselme Tueno:
An Efficiently Searchable Encrypted Data Structure for Range Queries. ESORICS (2) 2019: 344-364 - [c98]Tianhao Wang, Florian Kerschbaum:
Attacks on Digital Watermarks for Deep Neural Networks. ICASSP 2019: 2622-2626 - [c97]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Joins Over Encrypted Data with Fine Granular Security. ICDE 2019: 674-685 - [e6]Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0 [contents] - [i25]Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Florian Kerschbaum:
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks. CoRR abs/1906.07745 (2019) - [i24]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. CoRR abs/1909.08347 (2019) - [i23]Anselme Tueno, Yordan Boev, Florian Kerschbaum:
Non-Interactive Private Decision Tree Evaluation. CoRR abs/1909.08362 (2019) - [i22]Tianhao Wang, Florian Kerschbaum:
Robust and Undetectable White-Box Watermarks for Deep Neural Networks. CoRR abs/1910.14268 (2019) - [i21]Nils Lukas, Yuxuan Zhang, Florian Kerschbaum:
Deep Neural Network Fingerprinting by Conferrable Adversarial Examples. CoRR abs/1912.00888 (2019) - [i20]Daniel Bernau, Philip-William Grassal, Jonas Robl, Florian Kerschbaum:
Assessing differentially private deep learning with Membership Inference. CoRR abs/1912.11328 (2019) - [i19]Erik-Oliver Blass, Florian Kerschbaum:
Secure Computation of the kth-ranked Integer on Blockchains. IACR Cryptol. ePrint Arch. 2019: 276 (2019) - 2018
- [j14]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. J. Comput. Secur. 26(5): 677-706 (2018) - [j13]Stamatis Karnouskos, Florian Kerschbaum:
Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles. Proc. IEEE 106(1): 160-170 (2018) - [c96]Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. ESORICS (1) 2018: 87-110 - [c95]Benjamin Weggenmann, Florian Kerschbaum:
SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining. SIGIR 2018: 305-314 - [c94]Florian Hahn, Nicolas Loza, Florian Kerschbaum:
Practical and Secure Substring Search. SIGMOD Conference 2018: 163-176 - [e5]Florian Kerschbaum, Stefano Paraboschi:
Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings. Lecture Notes in Computer Science 10980, Springer 2018, ISBN 978-3-319-95728-9 [contents] - [i18]Anselme Tueno, Florian Kerschbaum:
Secure Range Queries for Multiple Users. CoRR abs/1802.01138 (2018) - [i17]Benjamin Weggenmann, Florian Kerschbaum:
SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining. CoRR abs/1805.00904 (2018) - 2017
- [c93]Anselme Tueno, Florian Kerschbaum, Daniel Bernau, Sara Foresti:
Selective access for supply chain management in the cloud. CNS 2017: 476-482 - [c92]Jonas Böhler, Daniel Bernau, Florian Kerschbaum:
Privacy-Preserving Outlier Detection for Data Streams. DBSec 2017: 225-238 - [c91]Florian Kerschbaum, Martin Härterich:
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases. DBSec 2017: 325-336 - [c90]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. DBSec 2017: 386-408 - [i16]Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and Secure Index with SGX. CoRR abs/1703.04583 (2017) - [i15]Florian Kerschbaum, Anselme Tueno:
An Efficiently Searchable Encrypted Data Structure for Range Queries. CoRR abs/1709.09314 (2017) - [i14]Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data using Data Flow Authentication. CoRR abs/1710.00390 (2017) - [i13]Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. IACR Cryptol. ePrint Arch. 2017: 1044 (2017) - 2016
- [c89]Florian Hahn, Florian Kerschbaum:
Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage. CCSW 2016: 23-34 - [c88]Benny Fuhry, Walter Tighzert, Florian Kerschbaum:
Encrypting Analytical Web Applications. CCSW 2016: 35-46 - [c87]Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander:
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security. CCS 2016: 1877-1878 - [e4]Stefan Katzenbeisser, Edgar R. Weippl, Erik-Oliver Blass, Florian Kerschbaum:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4565-1 [contents] - [e3]X. Sean Wang, Lujo Bauer, Florian Kerschbaum:
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016. ACM 2016, ISBN 978-1-4503-3802-8 [contents] - 2015
- [c86]Florian Kerschbaum:
Frequency-Hiding Order-Preserving Encryption. CCS 2015: 656-667 - [c85]Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray:
CCSW 2015: The 7th ACM Cloud Computing Security Workshop. CCS 2015: 1703-1704 - [c84]Florian Kerschbaum, Hoon Wei Lim:
Privacy-Preserving Observation in Public Spaces. ESORICS (2) 2015: 81-100 - [c83]Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - [c82]Florian Kerschbaum:
Oblivious outsourcing of garbled circuit generation. SAC 2015: 2134-2140 - [c81]Isabelle Hang, Florian Kerschbaum, Ernesto Damiani:
ENKI: Access Control for Encrypted Query Processing. SIGMOD Conference 2015: 183-196 - [e2]Indrajit Ray, Xiaofeng Wang, Kui Ren, Florian Kerschbaum, Cristina Nita-Rotaru:
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3825-7 [contents] - [e1]Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee:
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015. ACM 2015, ISBN 978-1-4503-3556-0 [contents] - 2014
- [c80]Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. ACNS 2014: 566-584 - [c79]Patrick Grofig, Isabelle Hang, Martin Härterich, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Privacy by Encrypted Databases. APF 2014: 56-69 - [c78]Florian Kerschbaum, Axel Schröpfer:
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption. CCS 2014: 275-286 - [c77]Florian Hahn, Florian Kerschbaum:
Searchable Encryption with Secure and Efficient Updates. CCS 2014: 310-320 - [c76]Florian Kerschbaum:
Client-Controlled Cloud Encryption. CCS 2014: 1542-1543 - [c75]Lujo Bauer, Florian Kerschbaum:
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? SACMAT 2014: 127-128 - [c74]Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152 - [c73]Patrick Grofig, Martin Härterich, Isabelle Hang, Florian Kerschbaum, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. Sicherheit 2014: 115-125 - [i12]Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. CoRR abs/1405.0205 (2014) - [i11]Gilles Barthe, Michael Hicks, Florian Kerschbaum, Dominique Unruh:
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492). Dagstuhl Reports 4(12): 29-47 (2014) - [i10]Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. IACR Cryptol. ePrint Arch. 2014: 200 (2014) - 2013
- [c72]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. BigData Congress 2013: 31-37 - [c71]Raphael Urmoneit, Florian Kerschbaum:
Efficient secure computation optimization. PETShop@CCS 2013: 11-18 - [c70]Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum:
k-anonymous reputation. AsiaCCS 2013: 359-368 - [c69]Florian Kerschbaum:
An information-flow type-system for mixed protocol secure computation. AsiaCCS 2013: 393-404 - [c68]Marek Jawurek, Florian Kerschbaum, Claudio Orlandi:
Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. CCS 2013: 955-966 - [c67]Florian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Adjustably encrypted in-memory column-store. CCS 2013: 1325-1328 - [c66]Florian Kerschbaum:
Expression rewriting for optimizing secure computation. CODASPY 2013: 49-58 - [c65]Florian Kerschbaum, Martin Härterich, Patrick Grofig, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
Optimal Re-encryption Strategy for Joins in Encrypted Databases. DBSec 2013: 195-210 - [c64]Florian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert:
An Encrypted In-Memory Column-Store: The Onion Selection Problem. ICISS 2013: 14-26 - [c63]Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. NDSS 2013 - [c62]Florian Kerschbaum:
Searching over encrypted data in cloud systems. SACMAT 2013: 87-88 - [c61]Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss:
Secure benchmarking in the cloud. SACMAT 2013: 197-200 - [c60]Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:
Privacy-preserving billing for e-ticketing systems in public transportation. WPES 2013: 143-154 - [i9]Marek Jawurek, Florian Kerschbaum, Claudio Orlandi:
Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently. IACR Cryptol. ePrint Arch. 2013: 73 (2013) - [i8]Florian Kerschbaum, Hoon Wei Lim, Ivan Gudymenko:
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation. IACR Cryptol. ePrint Arch. 2013: 206 (2013) - 2012
- [j12]Hoon Wei Lim, Florian Kerschbaum, Huaxiong Wang:
Workflow Signatures for Business Process Compliance. IEEE Trans. Dependable Secur. Comput. 9(5): 756-769 (2012) - [c59]Florian Kerschbaum:
Privacy-Preserving Computation - (Position Paper). APF 2012: 41-54 - [c58]Florian Kerschbaum:
Outsourced private set intersection using homomorphic encryption. AsiaCCS 2012: 85-86 - [c57]Jens Strüker, Florian Kerschbaum:
From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids. ICIS 2012 - [c56]Florian Kerschbaum, Leonardo Weiss Ferreira Chaves:
Encrypted Searchable Storage of RFID Tracking Data. MDM 2012: 176-185 - [c55]Marek Jawurek, Florian Kerschbaum:
Fault-Tolerant Privacy-Preserving Statistics. Privacy Enhancing Technologies 2012: 221-238 - [c54]Florian Kerschbaum:
Collusion-resistant outsourcing of private set intersection. SAC 2012: 1451-1456 - [c53]Florian Kerschbaum, Leonardo Weiss Ferreira Chaves:
Encryption-enforced access control for an RFID discovery service. SACMAT 2012: 127-130 - [c52]Anderson Santana de Oliveira, Florian Kerschbaum, Hoon Wei Lim, Su-Yang Yu:
Privacy-Preserving Techniques and System for Streaming Databases. SocialCom/PASSAT 2012: 728-733 - [i7]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. CoRR abs/1209.5208 (2012) - 2011
- [j11]Florian Kerschbaum:
Secure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider. Bus. Inf. Syst. Eng. 3(3): 135-143 (2011) - [j10]Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani:
Secure Collaborative Supply-Chain Management. Computer 44(9): 38-43 (2011) - [j9]Richard Pibernik, Yingying Zhang, Florian Kerschbaum, Axel Schröpfer:
Secure collaborative supply chain planning and inverse optimization - The JELS model. Eur. J. Oper. Res. 208(1): 75-85 (2011) - [j8]Florian Kerschbaum:
Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauenswürdigen Dienstanbieter. Wirtschaftsinf. 53(3): 129-138 (2011) - [c51]Florian Kerschbaum, Leonardo Weiss Ferreira Chaves:
Secure Sharing of Item-Level Data in the Cloud. IEEE CLOUD 2011: 756-757 - [c50]Florian Kerschbaum:
Automatically optimizing secure computation. CCS 2011: 703-714 - [c49]Axel Schröpfer, Florian Kerschbaum:
Demo: secure computation in JavaScript. CCS 2011: 849-852 - [c48]Michael T. Goodrich, Florian Kerschbaum:
Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. CODASPY 2011: 273-282 - [c47]Axel Schröpfer, Florian Kerschbaum, Günter Müller:
L1 - An Intermediate Language for Mixed-Protocol Secure Computation. COMPSAC 2011: 298-307 - [c46]Florian Kerschbaum:
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. DBSec 2011: 60-75 - [c45]Florian Kerschbaum:
Securely disseminating RFID events. DEBS 2011: 327-334 - [c44]Florian Kerschbaum, Jens Strüker, Thomas G. Koslowski:
Confidential Information-Sharing for Automated Sustainability Benchmarks. ICIS 2011 - [c43]Meiko Jensen, Florian Kerschbaum:
Towards Privacy-Preserving XML Transformation. ICWS 2011: 65-72 - [c42]Florian Kerschbaum:
Secure conjunctive keyword searches for unstructured text. NSS 2011: 285-289 - [c41]Marek Jawurek, Martin Johns, Florian Kerschbaum:
Plug-In Privacy for Smart Metering Billing. PETS 2011: 192-210 - [c40]Axel Schröpfer, Florian Kerschbaum:
Forecasting Run-Times of Secure Two-Party Computation. QEST 2011: 181-190 - [c39]Jannik Dreier, Florian Kerschbaum:
Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. SocialCom/PASSAT 2011: 916-924 - [c38]Debmalya Biswas, Kathryn Bean, Florian Kerschbaum:
NAT/Firewall traversal cost model for publish-subscribe systems. ICPE 2011: 487-492 - [i6]Michael T. Goodrich, Florian Kerschbaum:
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions. CoRR abs/1102.4602 (2011) - [i5]Jannik Dreier, Florian Kerschbaum:
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation. IACR Cryptol. ePrint Arch. 2011: 108 (2011) - 2010
- [b1]Florian Kerschbaum:
A privacy-preserving benchmarking platform. Karlsruhe Institute of Technology, 2010 - [c37]Florian Kerschbaum, Alessandro Sorniotti:
Searchable Encryption for Outsourced Data Analytics. EuroPKI 2010: 61-76 - [c36]Michael Wibmer, Debmalya Biswas, Florian Kerschbaum:
Leakage Quantification of Cryptographic Operations. OTM Conferences (1) 2010: 685-700 - [c35]Daniel Funke, Florian Kerschbaum:
Privacy-Preserving Multi-Objective Evolutionary Algorithms. PPSN (2) 2010: 41-50 - [c34]Florian Kerschbaum, Nina Oertel:
Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting. RFIDSec 2010: 124-137 - [c33]Florian Kerschbaum:
An access control model for mobile physical objects. SACMAT 2010: 193-202 - [c32]Debmalya Biswas, Stephan Haller, Florian Kerschbaum:
Privacy-Preserving Outsourced Profiling. CEC 2010: 136-143 - [c31]Florian Kerschbaum, Nina Oertel, Leonardo Weiss Ferreira Chaves:
Privacy-preserving computation of benchmarks on item-level data using RFID. WISEC 2010: 105-110 - [p1]Ulrich Flegel, Florian Kerschbaum, Philip Miseldine, Ganna Monakova, Richard Wacker, Frank Leymann:
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection. Insider Threats in Cyber Security 2010: 139-171 - [i4]Marek Jawurek, Martin Johns, Florian Kerschbaum:
Plug-in privacy for Smart Metering billing. CoRR abs/1012.2248 (2010) - [i3]Daniel Funke, Florian Kerschbaum:
Privacy-Preserving Multi-Objective Evolutionary Algorithms. IACR Cryptol. ePrint Arch. 2010: 326 (2010) - [i2]Axel Schröpfer, Florian Kerschbaum, Günter Müller:
L1 - An Intermediate Language for Mixed-Protocol Secure Computation. IACR Cryptol. ePrint Arch. 2010: 578 (2010)
2000 – 2009
- 2009
- [j7]Rafael Deitos, Florian Kerschbaum:
Parallelizing secure linear programming. Concurr. Comput. Pract. Exp. 21(10): 1321-1350 (2009) - [j6]Florian Kerschbaum, Philip Robinson:
Security architecture for virtual organizations of business web services. J. Syst. Archit. 55(4): 224-232 (2009) - [j5]Axel Schröpfer, Florian Kerschbaum, Christoph G. Schütz, Richard Pibernik:
Optimizations for Risk-Aware Secure Supply Chain Master Planning. J. Univers. Comput. Sci. 15(15): 3019-3037 (2009) - [c30]Florian Kerschbaum:
Adapting Privacy-Preserving Computation to the Service Provider Model. CSE (3) 2009: 34-41 - [c29]Rafael Deitos, Florian Kerschbaum:
Improving Practical Performance on Secure and Private Collaborative Linear Programming. DEXA Workshops 2009: 122-126 - [c28]Florian Kerschbaum, Debmalya Biswas, Sebastiaan de Hoogh:
Performance Comparison of Secure Comparison Protocols. DEXA Workshops 2009: 133-136 - [c27]Rafael Accorsi, Ernesto Damiani, Frank Innerhofer-Oberperfler, Florian Kerschbaum:
Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09). EDOCW 2009: 166-167 - [c26]Florian Kerschbaum, Andreas Schaad, Debmalya Biswas:
Practical privacy-preserving protocols for criminal investigations. ISI 2009: 197-199 - [c25]Florian Kerschbaum, Daniel Dahlmeier, Axel Schröpfer, Debmalya Biswas:
On the practical importance of communication complexity for secure multi-party computation protocols. SAC 2009: 2008-2015 - [c24]Axel Schröpfer, Florian Kerschbaum, Dagmar Sadkowiak, Richard Pibernik:
Risk-Aware Secure Supply Chain Master Planning. WOSIS 2009: 46-56 - [c23]Florian Kerschbaum, Alessandro Sorniotti:
RFID-based supply chain partner authentication and key agreement. WISEC 2009: 41-50 - [c22]Florian Kerschbaum:
A verifiable, centralized, coercion-free reputation system. WPES 2009: 61-70 - 2008
- [j4]Florian Kerschbaum:
Building a privacy-preserving benchmarking enterprise system. Enterp. Inf. Syst. 2(4): 421-441 (2008) - [c21]Octavian Catrina, Florian Kerschbaum:
Fostering the Uptake of Secure Multiparty Computation in E-Commerce. ARES 2008: 693-700 - [c20]Leonardo Weiss Ferreira Chaves, Florian Kerschbaum:
Industrial Privacy in RFID-based Batch Recalls. EDOCW 2008: 192-198 - [c19]Florian Kerschbaum:
Practical Privacy-Preserving Benchmarking. SEC 2008: 17-31 - [c18]Florian Kerschbaum, Rafael Deitos:
Security against the business partner. SWS 2008: 1-10 - [c17]Florian Kerschbaum, Julien Vayssière:
Privacy-preserving data analytics as an outsourced service. SWS 2008: 87-96 - [c16]Florian Kerschbaum, Andreas Schaad:
Privacy-preserving social network analysis for criminal investigations. WPES 2008: 9-14 - [i1]Ulrich Flegel, Florian Kerschbaum, Richard Wacker:
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. Countering Insider Threats 2008 - 2007
- [c15]Florian Kerschbaum:
Building a Privacy-Preserving Benchmarking Enterprise System. EDOC 2007: 87-96 - [c14]Florian Kerschbaum, Julien Vayssière:
Privacy-preserving logical vector clocks using secure computation techniques. ICPADS 2007: 1-8 - [c13]Florian Kerschbaum:
Simple cross-site attack prevention. SecureComm 2007: 464-472 - [c12]Florian Kerschbaum:
A New Way to Think About Secure Computation: Language-based Secure Computation. WOSIS 2007: 33-42 - [c11]Florian Kerschbaum, Rafael Deitos, Philip Robinson:
Securing VO Management. TrustBus 2007: 14-23 - [c10]Florian Kerschbaum:
Distance-preserving pseudonymization for timestamps and spatial data. WPES 2007: 68-71 - 2006
- [c9]Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies. DBSec 2006: 297-309 - [c8]Florian Kerschbaum, Orestis Terzidis:
Filtering for Private Collaborative Benchmarking. ETRICS 2006: 409-422 - [c7]Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson:
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. iTrust 2006: 193-205 - [c6]Florian Kerschbaum:
Practical Private Regular Expression Matching. SEC 2006: 461-470 - [c5]Rafael Deitos, Florian Kerschbaum, Philip Robinson:
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. SWS 2006: 103-104 - [c4]Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin:
Security and Trust in IT Business Outsourcing: a Manifesto. STM 2006: 47-58 - 2004
- [c3]Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice:
Private Fingerprint Verification without Local Storage. ICBA 2004: 387-394 - 2003
- [j3]Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen:
Analysis of vulnerabilities in Internet firewalls. Comput. Secur. 22(3): 214-232 (2003) - [c2]Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du:
Secure and private sequence comparisons. WPES 2003: 39-44 - 2002
- [j2]Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection. J. Comput. Secur. 10(1/2): 23-70 (2002) - 2001
- [j1]Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy:
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. Comput. Secur. 20(3): 263-270 (2001) - [c1]Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik:
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. Information Hiding 2001: 185-199
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint