Items where Division is "Information Security and Cryptography (InfSec)" and Year is 2010

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: B | D | E | F | G | L | N | R | S | T
Number of items: 19.

B

Backes, Michael and Ciobotaru, Oana and Krohmer, Anton
(2010) RatFish: A File Sharing Protocol Provably Secure Against Rational Users.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Doychev, Goran and Dürmuth, Markus and Köpf, Boris
(2010) Speaker Recognition in Encrypted Voice-over-IP Traffic.
In: Proceedings of 15th European Symposium on Research in Computer Security (ESORICS).

Backes, Michael and Dürmuth, Markus and Gerling, Sebastian and Pinkal, Manfred and Sporleder, Caroline
(2010) Acoustic Side-Channel Attacks of Printers.
In: Proceedings of 19th USENIX Security Symposium.
Conference: USENIX-Security - Usenix Security Symposium

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymity and Trust in Distributed Systems.
In: Proceedings of 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC).
Conference: PODC - ACM Symposium on Principles of Distributed Computing

Backes, Michael and Lorenz, Stefan and Maffei, Matteo and Pecina, Kim
(2010) Anonymous Webs of Trust.
In: Proceedings of 10th Privacy Enhancing Technologies Symposium (PETS).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Mohammadi, Esfandiar
(2010) Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
In: Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS).
Conference: None | Not Set

Backes, Michael and Maffei, Matteo and Unruh, Dominique
(2010) Computationally Sound Verification of Source Code.
In: ACM CCS 2010.
Conference: CCS - ACM Conference on Computer and Communications Security

Backes, Michael and Unruh, Dominique
(2010) Computational Soundness of Symbolic Zero-Knowledge Proofs.
Journal of Computer Security, 18 (6). pp. 1077-1155.

D

Doychev, Goran
(2010) Speaker Recognition in Encrypted Voice Streams.
Bachelors thesis, Saarland University.

Driedger, Jonathan
(2010) Formalization of Game-Transformations.
Bachelors thesis, Saarland University.

Dürmuth, Markus
(2010) Novel Classes of Side Channels and Covert Channels.
Doctoral thesis, UNSPECIFIED.

E

Eigner, Fabienne
(2010) Type-Based Verification of Electronic Voting Systems.
Masters thesis, Saarland University.

F

Feld, Dominik
(2010) Anonymity in Online Polls.
Bachelors thesis, Saarland University.

G

Grochulla, Martin
(2010) Moment Preserving Diffusion in Image Processing.
Masters thesis, Saarland University.

L

Lund, Rajiv
(2010) Formale Analyse von Mastermind.
Bachelors thesis, UNSPECIFIED.

N

Nürnberger, Stefan and Feller, Thomas and Huss, Sorin A
(2010) Ray - A Secure Microkernel Architecture.
In: Eighth Annual International Conference on Privacy Security and Trust (IEEE PST 2010).
Conference: None | Not Set

R

Rickert, Nicolas
(2010) Digital Watermarking: Methods and Applications for Digital Images.
Bachelors thesis, Saarland University.

S

Skoruppa, Malte
(2010) Formal Verification of ElGamal Encryption using a Probabilistic Lambda-Calculus.
Bachelors thesis, Saarland University.

T

Tarrach, Thorsten
(2010) Automatically Verifying 'M' Modelling Language Constraints.
Masters thesis, Saarland University.

This list was generated on Wed Jun 19 00:02:42 2019 CEST.