Search everything

1 Citation (Scopus)
76 Downloads (Pure)

From Scripts Towards Provenance Inference

Huq, M. R., Apers, P. M. G., Wada, Y., van Beek, L. P. H. & Wombacher, A., Oct 2012, 2012 IEEE 8th International Conference on eScience (eScience). Piscataway, NJ: IEEE Computer Society, p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Processing
5 Citations (Scopus)
93 Downloads (Pure)

Privacy-preserving architecture for forensic image recognition

Peter, A., Hartman, T., Muller, S. & Katzenbeisser, S., 5 Dec 2013, IEEE International Workshop on Information Forensics and Security, WIFS 2012. USA: IEEE Computer Society, p. 79-84 6 p. (Information Forensics and Security (WIFS), 2012 IEEE International Workshop; no. 13249609).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File

uMine: A Blockchain Based on Human Miners

Kopp, H., Kargl, F., Bösch, C. & Peter, A., 2018, Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Springer, p. 20-38

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks

Dietzel, S., Peter, A. & Kargl, F., May 2015, IEEE 81st Vehicular Technology Conference, VTC Spring 2015. Piscataway, NJ, USA: IEEE, p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

65 Citations (Scopus)
28 Downloads (Pure)

Redactable signatures for tree-structured data: definitions and constructions

Brzuska, C., Busch, H., Dagdelen, O., Fischlin, M., Franz, M., Katzenbeisser, S., Manulis, M., Onete, C., Peter, A., Poetering, B. & Schröder, D., 25 Jun 2010, p. 87-104. 18 p.

Research output: Contribution to conferencePaper

File
39 Downloads (Pure)

Matchmaking for Business Processes based on Conjunctive Finite State Automata

Wombacher, A., Fankhauser, P., Mahleko, B. & Neuhold, E., 2005, In : International journal of business process integration and management. 1, 1, p. 3-11 9 p., 10.1504/IJBPIM.2005.006960.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File

The use of an oriented, collagen-based matrix for nerve regeneration in the central nervous system

Wonder, M., Buttafoco, L., Wiertz, R., Zweers-Peter, K., Dijkstra, P. J., Poot, A. A., Rutten, W., Marani, E. & Feijen, J., 9 Oct 2000, Proceedings of the Dutch Annual Conference on BioMedical Engineering. Papendal, p. 152-154 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation

Biedermann, S., Karvelas, N. P., Katzenbeisser, S., Strufe, T. & Peter, A., 2014, Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014). Berlin: Springer, p. 114-125 12 p. (Lecture Notes in Computer Science; vol. 8327).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Indicators of Malicious SSL Connections

Bortolameotti, R., Peter, A., Everts, M. H. & Bolzoni, D., Nov 2015, 9th International Conference on Network and System Security, NSS 2015. New York: Springer, p. 162-175 14 p. (Lecture Notes in Computer Science; vol. 9408).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics

Mayoral Vilches, V., Alzola Kirschgens, L., Bilbao Calvo, A., Hernández Cordero, A., Izquierdo Pisón, R., Mayoral Vilches, D., Muñiz Rosas, A., Olalde Mendia, G., Usategi San Juan, L., Zamalloa Ugarte, I., Gil-Uriarte, E., Tews, E. & Peter, A., 2018.

Research output: Contribution to conferencePaper

21 Citations (Scopus)
3 Downloads (Pure)

Oblivious outsourced storage with delegation

Franz, M., Williams, P., Carbunar, B., Katzenbeisser, S., Peter, A., Sion, R. & Sotakova, M., 4 Mar 2011, p. 127-140. 14 p.

Research output: Contribution to conferencePaper

File
83 Downloads (Pure)

Multi-client Predicate-only Encryption for Conjunctive Equality Tests

van de Kamp, T. R., Peter, A., Everts, M. H. & Jonker, W., 2017.

Research output: Contribution to conferencePaper

Open Access
File
Cryptography
Hardware
Monitoring
Testing
13 Citations (Scopus)

Privacy preserving whole genome sequence processing through proxy-aided ORAM

Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E. & Hamacher, K., 2014, 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014). New York: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

15 Citations (Scopus)
39 Downloads (Pure)

Converse PUF-based authentication

Kocabas, U., Peter, A., Katzenbeisser, S. & Sadeghi, A., Jun 2012, 5th International Conference on Trust and Trustworthy Computing, TRUST 2012. Berlin: Springer, p. 142-158 17 p. (Lecture Notes in Computer Science; vol. 7344).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
15 Citations (Scopus)
92 Downloads (Pure)

Efficient privacy-enhanced familiarity-based recommender system

Jeckmans, A., Peter, A. & Hartel, P. H., Sep 2013, Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013. Berlin Heidelberg: Springer, p. 400-417 18 p. (Lecture Notes in Computer Science; vol. 8134).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2 Citations (Scopus)
22 Downloads (Pure)

Shift-type homomorphic encryption and its application to fully homomorphic encryption

Armknecht, F., Katzenbeisser, S. & Peter, A., 2012, 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012. Berlin: Springer, p. 234-251 18 p. (Lecture Notes in Computer Science; vol. 7374).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
11 Citations (Scopus)

General Impossibility of Group Homomorphic Encryption in the Quantum World

Armknecht, F., Gagliardoni, T., Katzenbeisser, S. & Peter, A., 2014, 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014. Berlin: Springer, p. 556-573 18 p. (Lecture Notes in Computer Science; vol. 8383).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

65 Citations (Scopus)

Efficiently outsourcing multiparty computation under multiple keys

Peter, A., Tews, E., Tews, E. & Katzenbeisser, S., 1 Nov 2013, In : IEEE transactions on information forensics and security. 8, 12, p. 2046-2058 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)
45 Downloads (Pure)

Group homomorphic encryption: characterizations, impossibility results, and applications

Armknecht, F., Katzenbeisser, S. & Peter, A., May 2013, In : Designs, codes and cryptography. 67, 2, p. 209-232 24 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
124 Citations (Scopus)
819 Downloads (Pure)

A Survey of Provably Secure Searchable Encryption

Bösch, C. T., Hartel, P. H., Jonker, W. & Peter, A., Aug 2014, In : ACM computing surveys. 47, 2, p. 18:1-18:51 47 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

File
1 Citation (Scopus)

Publicly Verifiable Private Aggregation of Time-Series Data

Bakondi, B. G., Peter, A., Everts, M. H., Hartel, P. H. & Jonker, W., 1 Aug 2015, 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ, USA: IEEE, p. 50-59 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
40 Downloads (Pure)

Additively homomorphic encryption with a double decryption mechanism, revisited

Peter, A., Kronberg, M., Trei, W. & Katzenbeisser, S., Sep 2012, 15th International Conference on Information Security, ISC 2012. Berlin: Springer, p. 242-257 16 p. (Lecture Notes in Computer Science; vol. 7483).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
5 Citations (Scopus)
89 Downloads (Pure)

SOFIR: Securely Outsourced Forensic Image Recognition

Bösch, C. T., Peter, A., Hartel, P. H. & Jonker, W., Feb 2014, 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014. USA: IEEE, p. 2694-2698 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
16 Citations (Scopus)
74 Downloads (Pure)

Distributed Searchable Symmetric Encryption

Bösch, C. T., Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P. H. & Jonker, W., Jul 2014, Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014. USA: IEEE, p. 330-337 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
1 Downloads (Pure)

Two-Client and Multi-client Functional Encryption for Set Intersection

van de Kamp, T. R., Stritzl, D., Jonker, W. & Peter, A., 30 May 2019, Information security and privacy: 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Charm: Springer International Publishing AG, p. 97-115 19 p. (Lecture Notes in Computer Science; vol. 11547).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Data transfer