Number of items: 29.
Conference or Workshop Item (A Paper)
Backes, Michael and Barbosa, Manuel and Fiore, Dario and Reischuk, Raphael M.
(2015)
ADSNARK: Nearly-Practical Privacy-Preserving Proofs on Authenticated Data.
Backes, Michael and Bendun, Fabian and Hoffmann, Jörg and Marnau, Ninja
(2015)
PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law.
Backes, Michael and Bugiel, Sven and Hammer, Christian and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
Boxify: Full-fledged App Sandboxing for Stock Android.
Backes, Michael and Gagné, Martin and Thyagarajan, Sri Aravinda Krishnan
(2015)
Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext.
Backes, Michael and Kate, Aniket and Meiser, Sebastian and Ruffing, Tim
(2015)
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Backes, Michael and Meiser, Sebastian and Slowik, Marcin
(2015)
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Backes, Michael and Mohammadi, Esfandiar and Ruffing, Tim
(2015)
Computational Soundness for Interactive Primitves.
Backes, Michael and Schranz, Oliver and Styp-Rekowsky, Philipp von
(2015)
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART).
Mohammadi, Esfandiar and Bendun, Fabian and Pecina, Kim and Maffei, Matteo and Backes, Michael
(2015)
Symbolic Malleable Zero-knowledge Proofs.
Perl, Henning and Dechand, Sergej and Smith, Matthew and Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad and Fahl, Sascha and Acar, Yasemin
(2015)
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits.
Rossow, Christian and Mohammadi, Esfandiar and Backes, Michael and Meiser, Sebastian and Koch, Simon
(2015)
POSTER: In the Net of the Spider - Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
Article
Backes, Michael and Berrang, Pascal and Manoharan, Praveen
(2015)
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, abs/15.
Backes, Michael and Grimm, Niklas and Kate, Aniket
(2015)
Data Lineage in Malicious Environments.
IEEE Transactions on Dependable and Secure Computing, 13 (2).
178 - 191.
ISSN 1545-5971
Backes, Michael and Köpf, Boris
(2015)
Quantifying Information Flow in Cryptographic Systems.
Mathematical Structures in Computer Science.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
CoRR, abs/15.
Simeonovski, Milivoj and Bendun, Fabian and Asghar, Muhammad Rizwan and Backes, Michael and Marnau, Ninja and Druschel, Peter
(2015)
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptology ePrint Archive, 2015.
p. 592.
Thesis
Bauer, Markus
(2015)
The MATOR Addon: Accessible Quantification of Tor Anonymity for the Tor Browser.
Bachelors thesis, Saarland University.
Fatz, Filip
(2015)
Toward a Backward-compatible API for Defining Fine-grained App Policies on Android.
Bachelors thesis, Saarland University.
Frassinelli, Daniel
(2015)
Security Analysis of Telematic and Emergency Devices in a Modern Car.
Masters thesis, Saarland University.
Koch, Simon
(2015)
Correlating BGP and Traceroute Data.
Bachelors thesis, Saarland University.
Patel, Vikash
(2015)
Argumentation Mining for the Sake of Privacy.
Masters thesis, Saarland University.
Schneider, Jonas
(2015)
Partially Oblivious Pseudorandom Functions: A Generic Approach and an Impossibility Result.
Masters thesis, UNSPECIFIED.
Schranz, Oliver
(2015)
Towards Compiler-Assisted Taint Tracking on the Android Runtime.
Masters thesis, Saarland University.
Schwarz, Fabian Frank
(2015)
Security Analysis of Mobile Banking Apps.
Bachelors thesis, Saarland University.
Spier, Steffen
(2015)
Cold boot attacks and the error model of DRAM modules.
Bachelors thesis, Saarland University.
Tiwari, Abishek
(2015)
Applying Privacy Case Law to The Right to be Forgotten.
Masters thesis, Saarland University.
Wißfeld, Marvin
(2015)
ArtHook: Callee-side Method Hook Injection on the New Android Runtime ART.
Bachelors thesis, Saarland University.
Book Section
Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015)
Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In:
UNSPECIFIED
Cryptology and Information Security Series, 13
.
IOS Press, 81 - 105.
This list was generated on Sat Dec 21 17:42:41 2024 CET.