![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Stefan Katzenbeisser 0001
Person information
- affiliation: University of Passau, Chair of Computer Engineering, Germany
- affiliation (2008 - 2019): Darmstadt University of Technology, Computer Science Department, Germany
- affiliation (2003 - 2005): TU Munich, Department of Computer Science, Germany
- affiliation (PhD 2004): Vienna University of Technology, Institute of Software Technology, Austria
Other persons with the same name
- Stefan Katzenbeisser 0002 — Diehl Defence GmbH & Co. KG, Überlingen
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Felix Klement
, Wuhao Liu
, Stefan Katzenbeisser
:
Toward Securing the 6G Transition: A Comprehensive Empirical Method to Analyze Threats in O-RAN Environments. IEEE J. Sel. Areas Commun. 42(2): 420-431 (2024) - [j57]Dominik Püllen
, Florian Frank
, Marion Christl
, Wuhao Liu
, Stefan Katzenbeisser
:
A Security Process for the Automotive Service-Oriented Software Architecture. IEEE Trans. Veh. Technol. 73(4): 5036-5053 (2024) - [c188]Florian Frank
, Martin Schmid
, Felix Klement
, Purushothaman Palani
, Andreas Weber
, Elif Bilge Kavun
, Wenjie Xiong
, Tolga Arul
, Stefan Katzenbeisser
:
Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs. AsiaCCS 2024 - [c187]Marco Michl
, Hans-Joachim Hof
, Stefan Katzenbeisser
:
Classification, Impact, and Mitigation Strategies of Attacks in Automotive Trust Management Systems. CSCS 2024: 61-75 - [c186]Tolga Arul, Nico Mexis, Aleena Elsa George, Florian Frank, Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser:
Investigation of Commercial Off-The-Shelf ReRAM Modules for Use as Runtime-Accessible TRNG. DSD 2024: 33-42 - [c185]Nikolaos Athanasios Anagnostopoulos, Nico Mexis, Yufan Fan, Stephanie Senjuty Bartsch, Tanja Schaier, Stefan Katzenbeisser, Tolga Arul:
Studying the Effects of Prolonged Thermal Stress Aiming to Induce Artificial Aging on DRAM Retention-Based Physical Unclonable Functions. ICCE 2024: 1-6 - [c184]Nikolaos Athanasios Anagnostopoulos, Aleena Elsa George, Nico Mexis, Tolga Arul, Stefan Katzenbeisser, Rodrigo Picos, Stavros G. Stavrinides:
The Synchronisation is the Message: Real-World Encrypted Communication Based on Synchronised Chaotic Circuits Without Using a Dedicated Synchronisation Line. MOCAST 2024: 1-6 - [c183]Aleena Elsa George, Emiliia Gelóczi, Nico Mexis, Tolga Arul, Stefan Katzenbeisser, Stavros G. Stavrinides, Rodrigo Picos, Nikolaos Athanasios Anagnostopoulos:
Real-World Secure Communication based on Synchronised Lorenz Chaotic Circuits. MOCAST 2024: 1-6 - [c182]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti
, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. NetSoft 2024: 185-189 - [c181]Dennis Eckhardt, Felix C. Freiling, Dominik Herrmann, Stefan Katzenbeisser, Henrich C. Pöhls:
Sicherheit in der Digitalisierung des Alltags: Definition eines ethnografisch-informatischen Forschungsfeldes für die Lösung alltäglicher Sicherheitsprobleme. Sicherheit 2024: 107-118 - [c180]Yaman Qendah, Dominik Püllen, Stefan Katzenbeisser:
Real-time Risk Assessment of Security Incidents for Autonomous Vehicles. VTC Fall 2024: 1-7 - [c179]El Mehdi Bahoum, Nico Mexis, Stefan Katzenbeisser, Tolga Arul, Nikolaos Athanasios Anagnostopoulos:
Testing Temperature-Dependent Resistors as Potential Physical Unclonable Functions. WF-IoT 2024: 407-413 - [c178]Emiliia Gelóczi
, Henrich C. Pöhls
, Felix Klement
, Joachim Posegga
, Stefan Katzenbeisser
:
Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar Environments. WPES@CCS 2024: 109-123 - [i50]Felix Klement, Alessandro Brighente, Michele Polese, Mauro Conti, Stefan Katzenbeisser:
Securing the Open RAN Infrastructure: Exploring Vulnerabilities in Kubernetes Deployments. CoRR abs/2405.01888 (2024) - 2023
- [j56]Markus Heinrich
, Arwed Gölz
, Tolga Arul, Stefan Katzenbeisser:
Rule-based anomaly detection for railway signalling networks. Int. J. Crit. Infrastructure Prot. 42: 100603 (2023) - [j55]Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, Ulrich Rührmair:
The ASHES 2021 special issue at JCEN. J. Cryptogr. Eng. 13(4): 389-390 (2023) - [j54]Florian Frank
, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul
, Farinaz Koushanfar
, Stefan Katzenbeisser
, Ulrich Rührmair, Jakub Szefer
:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. IEEE Trans. Inf. Forensics Secur. 18: 2991-3005 (2023) - [c177]Jan Jonas Brune, Matthias Frey, Felix Klement
, Igor Bjelakovic, Stefan Katzenbeisser, Slawomir Stanczak:
Private and Secure Over-the-Air Multi-Party Communication. ACSSC 2023: 1697-1701 - [c176]Ali Recai Yekta
, Dominik Spychalski
, Erhan Yekta
, Cenk Yekta
, Stefan Katzenbeisser
:
VATT&EK: Formalization of Cyber Attacks on Intelligent Transport Systems - a TTP based approach for Automotive and Rail. CSCS 2023: 8:1-8:17 - [c175]Nikolaos Athanasios Anagnostopoulos, Nico Mexis, Simon Böttger, Martin Hartmann, Ali Mohamed, Sascha Hermann, Stefan Katzenbeisser, Stavros G. Stavrinides, Tolga Arul:
A Method to Construct Efficient Carbon-Nanotube-Based Physical Unclonable Functions and True Random Number Generators. DSD 2023: 61-69 - [c174]Nico Mexis, Tolga Arul, Nikolaos Athanasios Anagnostopoulos, Florian Frank, Simon Böttger, Martin Hartmann, Sascha Hermann, Elif Bilge Kavun, Stefan Katzenbeisser:
Spatial Correlation in Weak Physical Unclonable Functions: A Comprehensive Overview. DSD 2023: 70-78 - [c173]Phi Tuong Lau, Stefan Katzenbeisser:
Firmware-Based DoS Attacks in Wireless Sensor Network. ESORICS Workshops (2) 2023: 214-232 - [c172]Nikolaos Athanasios Anagnostopoulos, Nico Mexis
, Emiliia Gelóczi, Elif Bilge Kavun, Stefan Katzenbeisser, Tolga Arul:
An Evaluation of the Security and the Privacy of a Novel Single Sign-On System Based on Physical Unclonable Functions. ICCE-Berlin 2023: 76-81 - [c171]Emiliia Nazarenko
, Felix Klement
, Eva Gründinger, Stefan Katzenbeisser:
Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things. STM 2023: 65-84 - [c170]Stavros G. Stavrinides, Lydia Bush-Espinosa, Carol de Benito, Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Stefan Katzenbeisser, Christos Tjortjis, Mohamad Moner Al Chawa, Rodrigo Picos:
Exploiting Optical Nonlinear Temporal Coupling for Implementing Physical Unclonable Functions. WF-IoT 2023: 1-5 - [c169]Felix Klement
, Emily Vorderwülbeke, Stefan Katzenbeisser:
One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks. WIFS 2023: 1-6 - [c168]Felix Klement
, Shoya Takebuchi, Tolga Arul, Stefan Katzenbeisser:
Keep your Enemies closer: On the minimal Distance of Adversaries when using Channel-based Key Extraction in SISO 6G Systems. WiMob 2023: 445-451 - [i49]Nikolaos Athanasios Anagnostopoulos, Alexander Braml, Nico Mexis, Florian Frank, Simon Böttger, Martin Hartmann, Sascha Hermann, Elif Bilge Kavun, Stefan Katzenbeisser, Tolga Arul:
Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions. CoRR abs/2307.01041 (2023) - [i48]Simon Unger, Ektor Arzoglou, Markus Heinrich, Dirk Scheuermann, Stefan Katzenbeisser:
Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment. CoRR abs/2307.14114 (2023) - 2022
- [j53]Sebastian Stammler
, Tobias Kussel
, Phillipp Schoppmann
, Florian Stampe, Galina Tremper, Stefan Katzenbeisser, Kay Hamacher, Martin Lablans
:
Mainzelliste SecureEpiLinker (MainSEL): privacy-preserving record linkage using secure multi-party computation. Bioinform. 38(6): 1657-1668 (2022) - [j52]Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont:
The ASHES 2020 special issue at JCEN. J. Cryptogr. Eng. 12(4): 369-370 (2022) - [j51]Shuwen Deng
, Nikolay Matyunin, Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. IEEE Trans. Computers 71(9): 2248-2262 (2022) - [j50]Milan Stute
, Florian Kohnhäuser, Lars Baumgärtner
, Lars Almon
, Matthias Hollick
, Stefan Katzenbeisser, Bernd Freisleben
:
RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies. IEEE Trans. Dependable Secur. Comput. 19(3): 1722-1734 (2022) - [c167]Felix Klement
, Henrich C. Pöhls
, Stefan Katzenbeisser:
Man-in-the-OBD: A Modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security. ADIoT 2022: 143-164 - [c166]Felix Klement
, Henrich C. Pöhls, Stefan Katzenbeisser:
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic. CAMAD 2022: 19-25 - [c165]Florian Frank
, Tolga Arul
, Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser:
Using Memristor Arrays as Physical Unclonable Functions. ESORICS (3) 2022: 250-271 - [c164]Florian Frank
, Nikolaos Athanasios Anagnostopoulos
, Simon Böttger, Sascha Hermann, Tolga Arul, Stavros G. Stavrinides, Stefan Katzenbeisser:
A Dedicated Mixed-Signal Characterisation and Testing Framework for Novel Digital Security Circuits That Use Carbon-Nanotube-Based Physical Unclonable Functions. MOCAST 2022: 1-4 - [i47]Nikolaos Athanasios Anagnostopoulos
, Yufan Fan, Muhammad Umair Saleem, Nico Mexis
, Florian Frank, Tolga Arul, Stefan Katzenbeisser:
On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances. CoRR abs/2204.02498 (2022) - [i46]Felix Klement
, Stefan Katzenbeisser, Vincent Ulitzsch, Juliane Krämer, Slawomir Stanczak, Zoran Utkovski
, Igor Bjelakovic, Gerhard Wunder:
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN? CoRR abs/2204.12227 (2022) - [i45]Florian Frank
, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. CoRR abs/2208.02125 (2022) - [i44]Felix Klement
, Henrich C. Pöhls, Stefan Katzenbeisser:
Man-in-the-OBD: A modular, protocol agnostic firewall for automotive dongles to enhance privacy and security. CoRR abs/2210.08281 (2022) - [i43]Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos
, Stavros G. Stavrinides, Nico Mexis
, Florian Frank, Tolga Arul, Stefan Katzenbeisser:
Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits. CoRR abs/2210.11299 (2022) - [i42]Philipp Muth, Stefan Katzenbeisser:
Assisted MPC. IACR Cryptol. ePrint Arch. 2022: 1453 (2022) - 2021
- [j49]Wenjie Xiong
, André Schaller, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
:
DRAM PUFs in Commodity Devices. IEEE Des. Test 38(3): 76-83 (2021) - [j48]Nico Mexis
, Nikolaos Athanasios Anagnostopoulos
, Shuai Chen
, Jan Bambach
, Tolga Arul
, Stefan Katzenbeisser:
A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems. ACM J. Emerg. Technol. Comput. Syst. 17(3): 43:1-43:25 (2021) - [j47]Wenjie Xiong
, Stefan Katzenbeisser, Jakub Szefer
:
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches. IEEE Trans. Computers 70(4): 511-523 (2021) - [c163]Ilia Polian, Frank Altmann
, Tolga Arul, Christian Boit, Ralf Brederlow
, Lucas Davi, Rolf Drechsler
, Nan Du
, Thomas Eisenbarth
, Tim Güneysu, Sascha Hermann, Matthias Hiller, Rainer Leupers, Farhad Merchant, Thomas Mussenbrock
, Stefan Katzenbeisser, Akash Kumar
, Wolfgang Kunz, Thomas Mikolajick
, Vivek Pachauri
, Jean-Pierre Seifert, Frank Sill Torres, Jens Trommer
:
Nano Security: From Nano-Electronics to Secure Systems. DATE 2021: 1334-1339 - [c162]Dominik Püllen, Jonas Liske, Stefan Katzenbeisser:
ISO/SAE 21434-Based Risk Assessment of Security Incidents in Automated Road Vehicles. SAFECOMP 2021: 82-97 - [c161]Daniel Demmler
, Stefan Katzenbeisser, Thomas Schneider
, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. SECRYPT 2021: 444-451 - [c160]Michael Eckel, Don Kuzhiyelil, Christoph Krauß
, Maria Zhdanova
, Stefan Katzenbeisser, Jasmin Cosic
, Matthias Drodt, Jean-Jacques Pitrolle:
Implementing a Security Architecture for Safety-Critical Railway Infrastructure. SEED 2021: 215-226 - [c159]Nico Mexis
, Nikolaos Athanasios Anagnostopoulos
, Shuai Chen
, Jan Bambach, Tolga Arul, Stefan Katzenbeisser:
A design for a secure network of networks using a hardware and software co-engineering architecture. SIGCOMM Posters and Demos 2021: 65-67 - [e22]Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, Debdeep Mukhopadhyay:
ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8662-3 [contents] - [i41]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. CoRR abs/2106.14054 (2021) - [i40]Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. IACR Cryptol. ePrint Arch. 2021: 521 (2021) - 2020
- [j46]Kay Hamacher, Stefan Katzenbeisser, Tobias Kussel
, Sebastian Stammler:
Genomische Daten und der Datenschutz. Datenschutz und Datensicherheit 44(2): 87-93 (2020) - [j45]Philipp Muth, Matthias Geihs, Tolga Arul
, Johannes Buchmann, Stefan Katzenbeisser:
ELSA: efficient long-term secure storage of large datasets (full version) ∗. EURASIP J. Inf. Secur. 2020: 9 (2020) - [j44]Dominik Püllen, Nikolaos A. Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Securing FlexRay-based in-vehicle networks. Microprocess. Microsystems 77: 103144 (2020) - [j43]Martin Koop, Erik Tews, Stefan Katzenbeisser:
In-Depth Evaluation of Redirect Tracking and Link Usage. Proc. Priv. Enhancing Technol. 2020(4): 394-413 (2020) - [j42]Wenjie Xiong
, André Schaller
, Stefan Katzenbeisser, Jakub Szefer
:
Software Protection Using Dynamic PUFs. IEEE Trans. Inf. Forensics Secur. 15: 2053-2068 (2020) - [j41]Nikolaos Athanasios Anagnostopoulos
, Saad Ahmad
, Tolga Arul
, Daniel Steinmetzer, Matthias Hollick, Stefan Katzenbeisser:
Low-cost Security for Next-generation IoT Networks. ACM Trans. Internet Techn. 20(3): 30:1-30:31 (2020) - [c158]Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider
, Patrick Struck
:
Secure Two-Party Computation in a Quantum World. ACNS (1) 2020: 461-480 - [c157]Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont:
ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security. CCS 2020: 2145-2146 - [c156]Tolga Arul
, Nikolaos Athanasios Anagnostopoulos
, Sergej Reißig, Stefan Katzenbeisser:
A Study of the Spatial Auto-Correlation of Memory-Based Physical Unclonable Functions. ECCTD 2020: 1-4 - [c155]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. Financial Cryptography 2020: 386-403 - [c154]Markus Heinrich
, Dominik Renkel, Tolga Arul
, Stefan Katzenbeisser:
Predicting Railway Signalling Commands Using Neural Networks for Anomaly Detection. SAFECOMP 2020: 164-178 - [c153]Dominik Püllen, Nikolaos A. Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Safety Meets Security: Using IEC 62443 for a Highly Automated Road Vehicle. SAFECOMP 2020: 325-340 - [c152]Markus Heinrich
, Tolga Arul, Stefan Katzenbeisser:
Demo: Railway Signalling Security Testbed. VNC 2020: 1-2 - [e21]Chip-Hong Chang, Ulrich Rührmair, Stefan Katzenbeisser, Patrick Schaumont:
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020. ACM 2020, ISBN 978-1-4503-8090-4 [contents] - [i39]Markus Heinrich, Arwed Gölz, Tolga Arul
, Stefan Katzenbeisser:
Rule-based Anomaly Detection for Railway Signalling Networks. CoRR abs/2008.05241 (2020) - [i38]Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
A Security Architecture for Railway Signalling. CoRR abs/2009.04207 (2020) - [i37]Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. IACR Cryptol. ePrint Arch. 2020: 411 (2020)
2010 – 2019
- 2019
- [j40]Johannes Buchmann, Matthias Geihs, Kay Hamacher, Stefan Katzenbeisser, Sebastian Stammler
:
Long-term integrity protection of genomic data. EURASIP J. Inf. Secur. 2019: 15 (2019) - [j39]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Markus Rosenstihl, André Schaller
, Sebastian Gabmeyer, Stefan Katzenbeisser:
Attacking SRAM PUFs using very-low-temperature data remanence. Microprocess. Microsystems 71 (2019) - [j38]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser:
Private Evaluation of Decision Trees using Sublinear Cost. Proc. Priv. Enhancing Technol. 2019(1): 266-286 (2019) - [j37]Daniel Schneider
, Jens Braband, Erwin Schoitsch, Sascha Uhrig, Stefan Katzenbeisser:
Safety and Security Coengineering in Embedded Systems. Secur. Commun. Networks 2019: 5381856:1-5381856:2 (2019) - [j36]Markus Heinrich
, Tsvetoslava Vateva-Gurova, Tolga Arul
, Stefan Katzenbeisser, Neeraj Suri
, Henk Birkholz, Andreas Fuchs, Christoph Krauß
, Maria Zhdanova
, Don Kuzhiyelil, Sergey Tverdyshev, Christian Schlehuber:
Security Requirements Engineering in Safety-Critical Railway Signalling Networks. Secur. Commun. Networks 2019: 8348925:1-8348925:14 (2019) - [j35]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric
, Stefan Katzenbeisser, Jakub Szefer
:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c151]Dominik Püllen, Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Security and Safety Co-Engineering of the FlexRay Bus in Vehicular Networks. COINS 2019: 31-37 - [c150]Lydia Negka
, Georgios Gketsios, Nikolaos Athanasios Anagnostopoulos
, Georgios P. Spathoulas, Athanasios Kakarountas
, Stefan Katzenbeisser:
Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection. COINS 2019: 172-178 - [c149]Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Spying on Temperature using DRAM. DATE 2019: 13-18 - [c148]Stefan Katzenbeisser, Ilia Polian, Francesco Regazzoni
, Marc Stöttinger
:
Security in Autonomous Systems. ETS 2019: 1-8 - [c147]Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:
A Practical Attestation Protocol for Autonomous Embedded Systems. EuroS&P 2019: 263-278 - [c146]Wenjie Xiong
, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Dynamic Physically Unclonable Functions. ACM Great Lakes Symposium on VLSI 2019: 311-314 - [c145]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Manish Kumar, Stefan Katzenbeisser:
AR-PUFs: Advanced Security Primitives for the Internet of Things and Cyber-Physical Systems. ICCE 2019: 1-5 - [c144]Tolga Arul
, Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser:
Privacy & Usability of IPTV Recommender Systems. ICCE 2019: 1-2 - [c143]Nikolay Matyunin, Yujue Wang, Stefan Katzenbeisser:
Vibrational Covert Channels using Low-Frequency Acoustic Signals. IH&MMSec 2019: 31-36 - [c142]Florian Kohnhäuser, Dominik Püllen, Stefan Katzenbeisser:
Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles. IEEE Symposium on Security and Privacy Workshops 2019: 126-131 - [c141]Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso:
On (The Lack Of) Location Privacy in Crowdsourcing Applications. USENIX Security Symposium 2019: 1859-1876 - [c140]Dominik Püllen, Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Using Implicit Certification to Efficiently Establish Authenticated Group Keys for In-Vehicle Networks. VNC 2019: 1-8 - [c139]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. WPES@CCS 2019: 135-149 - [i36]Spyros Boukoros, Mathias Humbert, Stefan Katzenbeisser, Carmela Troncoso:
Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy. CoRR abs/1901.04923 (2019) - [i35]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. CoRR abs/1902.04444 (2019) - [i34]Nikolay Matyunin, Yujue Wang, Tolga Arul
, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. CoRR abs/1906.11117 (2019) - [i33]Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser, Yordan Boev, Mubashir Qureshi:
Secure Computation of the kth-Ranked Element in a Star Network. CoRR abs/1909.08347 (2019) - 2018
- [j34]Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser, John A. Chandy
, Fatemeh Tehranipoor
:
An Overview of DRAM-Based Security Primitives. Cryptogr. 2(2): 7 (2018) - [j33]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld
, André Schaller
, Wenjie Xiong
, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer
, Jakub Szefer
, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Cryptogr. 2(3): 13 (2018) - [j32]André Schaller
, Taras Stanko, Boris Skoric
, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IEEE Trans. Inf. Forensics Secur. 13(4): 954-964 (2018) - [j31]Mario Preishuber, Thomas Hütter
, Stefan Katzenbeisser, Andreas Uhl
:
Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption. IEEE Trans. Inf. Forensics Secur. 13(9): 2137-2150 (2018) - [c138]Matthias Geihs, Nikolaos P. Karvelas, Stefan Katzenbeisser, Johannes Buchmann:
PROPYLA: Privacy Preserving Long-Term Secure Storage. SCC@AsiaCCS 2018: 39-48 - [c137]Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks. AsiaCCS 2018: 329-342 - [c136]Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider
:
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. CCS 2018: 847-861 - [c135]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Stefan Katzenbeisser:
Low-Temperature Data Remanence Attacks Against Intrinsic SRAM PUFs. DSD 2018: 581-585 - [c134]Niklas Büscher, Alina Weber, Stefan Katzenbeisser:
Towards Practical RAM Based Secure Computation. ESORICS (2) 2018: 416-437 - [c133]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld, Jan Lotichius, Ratika Sharma, Felipe Fernandes, Fatemeh Tehranipoor, Stefan Katzenbeisser:
Securing IoT Devices Using Robust DRAM PUFs. GIIS 2018: 1-5 - [c132]Henk Birkholz, Christoph Krauß
, Maria Zhdanova, Don Kuzhiyelil, Tolga Arul
, Markus Heinrich
, Stefan Katzenbeisser, Neeraj Suri
, Tsvetoslava Vateva-Gurova, Christian Schlehuber:
A Reference Architecture for Integrating Safety and Security Applications on Railway Command and Control Systems. MILS@DSN 2018 - [c131]Nikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser:
Zero-permission acoustic cross-device tracking. HOST 2018: 25-32 - [c130]Tolga Arul
, Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser:
Behavioral Workload Generation for IPTV. ICCE-Berlin 2018: 1-6 - [c129]Markus Heinrich
, Jannik Vieten, Tolga Arul
, Stefan Katzenbeisser:
Security Analysis of the RaSTA Safety Protocol. ISI 2018: 199-204 - [c128]Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld, Fatemeh Tehranipoor, Stefan Katzenbeisser:
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions. Krypto-Tag 2018 - [c127]Nikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser:
Examining Leakage from Access Counts in ORAM Constructions. Krypto-Tag 2018 - [c126]Manish Kumar, Nikolaos Athanasios Anagnostopoulos
, Yufan Fan, Stefan Katzenbeisser:
Advanced Reconfigurable Physical Unclonable Functions (AR-PUFs) and Their Security Applications. Krypto-Tag 2018 - [c125]Daniel Steinmetzer, Saad Ahmad, Nikolaos A. Anagnostopoulos
, Matthias Hollick, Stefan Katzenbeisser:
Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks. mmNets 2018: 3-8 - [c124]Dominik Püllen, Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Stefan Katzenbeisser:
Poster: Hierarchical Integrity Checking in Heterogeneous Vehicular Networks. VNC 2018: 1-2 - [c123]Nikolay Matyunin, Nikolaos Athanasios Anagnostopoulos
, Spyros Boukoros, Markus Heinrich
, André Schaller, Maksim Kolinichenko, Stefan Katzenbeisser:
Tracking Private Browsing Sessions using CPU-based Covert Channels. WISEC 2018: 63-74 - [c122]Nikolaos P. Karvelas, Amos Treiber, Stefan Katzenbeisser:
Examining Leakage of Access Counts in ORAM Constructions. WPES@CCS 2018: 66-70 - [i32]Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, Neeraj Suri
:
QRES: Quantitative Reasoning on Encrypted Security SLAs. CoRR abs/1804.04426 (2018) - [i31]Foteini Baldimtsi, Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152). Dagstuhl Reports 8(4): 20-31 (2018) - 2017
- [b4]Niklas Büscher, Stefan Katzenbeisser:
Compilation for Secure Multi-party Computation. Springer Briefs in Computer Science, Springer 2017, ISBN 978-3-319-67521-3, pp. 1-85 - [j30]Niklas Büscher
, Martin Franz, Andreas Holzer, Helmut Veith, Stefan Katzenbeisser:
On compiling Boolean circuits optimized for secure multi-party computation. Formal Methods Syst. Des. 51(2): 308-331 (2017) - [j29]Jean-Pierre Hubaux, Stefan Katzenbeisser, Bradley A. Malin
:
Genomic Data Privacy and Security: Where We Stand and Where We Are Heading. IEEE Secur. Priv. 15(5): 10-12 (2017) - [j28]Niklas Büscher, Spyros Boukoros, Stefan Bauregger, Stefan Katzenbeisser:
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. Proc. Priv. Enhancing Technol. 2017(4): 198-214 (2017) - [c121]Spyros Boukoros, Stefan Katzenbeisser:
Measuring privacy in high dimensional microdata collections. ARES 2017: 15:1-15:8 - [c120]Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser:
Microblogging in a Privacy-Preserving way. ARES 2017: 48:1-48:6 - [c119]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:
Using Oblivious RAM in Genomic Studies. DPM/CBT@ESORICS 2017: 35-52 - [c118]Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. ESORICS (2) 2017: 437-455 - [c117]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
Challenges and Approaches in Securing Safety-Relevant Railway Signalling. EuroS&P Workshops 2017: 139-145 - [c116]André Schaller, Wenjie Xiong
, Nikolaos Athanasios Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. HOST 2017: 1-7 - [c115]Spyros Boukoros, Nikolaos P. Karvelas, Stefan Katzenbeisser:
A lightweight protocol for privacy preserving division. IWCMC 2017: 717-722 - [c114]Florian Kohnhäuser, Milan Stute
, Lars Baumgärtner
, Lars Almon, Stefan Katzenbeisser, Matthias Hollick, Bernd Freisleben
:
SEDCOS: A Secure Device-to-Device Communication System for Disaster Scenarios. LCN 2017: 195-198 - [c113]Imdad Ullah
, Babil Golam Sarwar, Roksana Boreli, Salil S. Kanhere
, Stefan Katzenbeisser, Matthias Hollick:
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval. LCN 2017: 347-355 - [c112]Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. PQCrypto 2017: 406-425 - [c111]Christian Schlehuber, Markus Heinrich
, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
:
A Security Architecture for Railway Signalling. SAFECOMP 2017: 320-328 - [c110]Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser:
SCAPI: a scalable attestation protocol to detect software and physical attacks. WISEC 2017: 75-86 - [i30]Florian Kohnhäuser, Niklas Büscher, Sebastian Gabmeyer, Stefan Katzenbeisser:
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks. CoRR abs/1701.08034 (2017) - [i29]Matthias Geihs, Nikolaos P. Karvelas, Stefan Katzenbeisser, Johannes Buchmann:
PRoPyLA: Privacy Preserving Long-Term Secure Storage. CoRR abs/1711.09805 (2017) - [i28]Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. IACR Cryptol. ePrint Arch. 2017: 14 (2017) - [i27]Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. IACR Cryptol. ePrint Arch. 2017: 577 (2017) - [i26]Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter:
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. IACR Cryptol. ePrint Arch. 2017: 606 (2017) - 2016
- [j27]Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik
, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49(1): 4:1-4:37 (2016) - [j26]Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler
, Stefan Katzenbeisser, Edgar R. Weippl:
Time is on my side: Steganography in filesystem metadata. Digit. Investig. 18 Supplement: S76-S86 (2016) - [j25]Stefan Katzenbeisser:
Technischer Schutz vor geheimdienstlicher Überwachung. Datenschutz und Datensicherheit 40(2): 98-100 (2016) - [j24]Marius Senftleben, Ana Barroso, Mihai Bucicoiu, Matthias Hollick, Stefan Katzenbeisser, Erik Tews:
On the Privacy and Performance of Mobile Anonymous Microblogging. IEEE Trans. Inf. Forensics Secur. 11(7): 1578-1591 (2016) - [c109]Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, Stefan Katzenbeisser:
Covert channels using mobile device's magnetic field sensors. ASP-DAC 2016: 525-532 - [c108]Johannes Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio
, Sander Siim, Christine van Vredendaal, Michael Walter
:
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. AsiaPKC@AsiaCCS 2016: 11-20 - [c107]Wenjie Xiong
, André Schaller, Nikolaos A. Anagnostopoulos
, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. CHES 2016: 432-453 - [c106]Niklas Büscher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser:
Compiling Low Depth Circuits for Practical Secure Computation. ESORICS (2) 2016: 80-98 - [c105]Florian Kohnhäuser, Stefan Katzenbeisser:
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices. ESORICS (2) 2016: 320-338 - [c104]Sebastian Stammler
, Stefan Katzenbeisser, Kay Hamacher:
Correcting Finite Sampling Issues in Entropy l-diversity. PSD 2016: 135-146 - [c103]Niklas Büscher, David Kretzmer, Arnav Jindal, Stefan Katzenbeisser:
Scalable secure computation from ANSI-C. WIFS 2016: 1-6 - [c102]Matthias Schulz, Patrick Klapper, Matthias Hollick, Erik Tews, Stefan Katzenbeisser:
Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. WISEC 2016: 43-48 - [c101]Peter Baumann, Stefan Katzenbeisser, Martin Stopczynski, Erik Tews:
Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection. WPES@CCS 2016: 37-46 - [e20]Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4 [contents] - [e19]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [e18]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Alvaro A. Cárdenas, Rakesh B. Bobba
:
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4568-2 [contents] - [e17]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu:
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4567-5 [contents] - [e16]Stefan Katzenbeisser, Edgar R. Weippl, Erik-Oliver Blass, Florian Kerschbaum:
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4565-1 [contents] - [e15]Jaap-Henk Hoepman, Stefan Katzenbeisser:
ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. IFIP Advances in Information and Communication Technology 471, Springer 2016, ISBN 978-3-319-33629-9 [contents] - [e14]Edgar R. Weippl, Stefan Katzenbeisser, Sabrina De Capitani di Vimercati:
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016. ACM 2016, ISBN 978-1-4503-4569-9 [contents] - [i25]George Danezis, Stefan Katzenbeisser, Christiane Peters, Bart Preneel:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). Dagstuhl Reports 6(1): 99-107 (2016) - [i24]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Practical DRAM PUFs in Commodity Devices. IACR Cryptol. ePrint Arch. 2016: 253 (2016) - [i23]Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, Markus Rosenstihl, André Schaller, Sebastian Gabmeyer, Tolga Arul:
Low-temperature data remanence attacks against intrinsic SRAM PUFs. IACR Cryptol. ePrint Arch. 2016: 769 (2016) - [i22]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser:
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture. IACR Cryptol. ePrint Arch. 2016: 1077 (2016) - 2015
- [b3]Stefan Katzenbeisser, Fabien A. P. Petitcolas:
Information Hiding. Artech House information security and privacy series, Artech House 2015, ISBN 978-1-60807-928-5, pp. I-XVI, 1-299 - [c100]André Schaller, Boris Skoric, Stefan Katzenbeisser:
On the Systematic Drift of Physically Unclonable Functions Due to Aging. TrustED@CCS 2015: 15-20 - [c99]Jorge Guajardo, Stefan Katzenbeisser:
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015). CCS 2015: 1715-1716 - [c98]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496 - [c97]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Compilation for Secure Two-Party Computations. Software Engineering & Management 2015: 143-145 - [c96]Florian Kohnhäuser, André Schaller, Stefan Katzenbeisser:
PUF-Based Software Protection for Low-End Embedded Devices. TRUST 2015: 3-21 - [c95]Niklas Büscher, Stefan Katzenbeisser:
Faster Secure Computation through Automatic Parallelization. USENIX Security Symposium 2015: 531-546 - [i21]Jean-Pierre Hubaux, Stefan Katzenbeisser, Bradley A. Malin, Gene Tsudik:
Genomic Privacy (Dagstuhl Seminar 15431). Dagstuhl Reports 5(10): 50-65 (2015) - 2014
- [j23]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [c94]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik
, Peter Kieseberg
, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c93]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15 - [c92]Martin Franz, Andreas Holzer, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations. CC 2014: 244-249 - [c91]Frederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser:
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation. CCS 2014: 942-953 - [c90]Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht
, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
MoP-2-MoP - Mobile Private Microblogging. Financial Cryptography 2014: 384-396 - [c89]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014 - [c88]Christian Schlehuber, Erik Tews, Stefan Katzenbeisser:
IT-Security in Railway Signalling Systems. ISSE 2014: 56-64 - [c87]Frederik Armknecht
, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. Public Key Cryptography 2014: 556-573 - [c86]Sebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser:
Data-centric phishing detection based on transparent virtualization technologies. PST 2014: 215-223 - [c85]Sebastian Biedermann, Nikolaos P. Karvelas, Stefan Katzenbeisser, Thorsten Strufe, Andreas Peter:
ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. SOFSEM 2014: 114-125 - [c84]André Schaller, Tolga Arul
, Vincent van der Leest, Stefan Katzenbeisser:
Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs. TRUST 2014: 83-100 - [c83]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Erik Tews, Kay Hamacher:
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM. WPES 2014: 1-10 - [e13]Andreas Unterweger, Andreas Uhl, Stefan Katzenbeisser, Roland Kwitt, Alessandro Piva:
ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '14, Salzburg, Austria, June 11-13, 2014. ACM 2014, ISBN 978-1-4503-2647-6 [contents] - [e12]Stefan Katzenbeisser, Volkmar Lotz, Edgar R. Weippl:
Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19.-21. März 2014, Wien, Österreich. LNI P-228, GI 2014, ISBN 978-3-88579-622-0 [contents] - [i20]Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. CoRR abs/1401.2417 (2014) - [i19]Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. IACR Cryptol. ePrint Arch. 2014: 29 (2014) - [i18]Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann:
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. IACR Cryptol. ePrint Arch. 2014: 72 (2014) - [i17]André Schaller, Boris Skoric, Stefan Katzenbeisser:
Eliminating Leakage in Reverse Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2014: 741 (2014) - 2013
- [j22]Frederik Armknecht
, Stefan Katzenbeisser, Andreas Peter:
Group homomorphic encryption: characterizations, impossibility results, and applications. Des. Codes Cryptogr. 67(2): 209-232 (2013) - [j21]Micha Ober, Stefan Katzenbeisser, Kay Hamacher:
Structure and Anonymity of the Bitcoin Transaction Graph. Future Internet 5(2): 237-250 (2013) - [j20]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure computations on non-integer values with applications to privacy-preserving sequence analysis. Inf. Secur. Tech. Rep. 17(3): 117-128 (2013) - [j19]Mauro Barni, Ton Kalker, Stefan Katzenbeisser:
Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors]. IEEE Signal Process. Mag. 30(2): 16 (2013) - [j18]Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation Under Multiple Keys. IEEE Trans. Inf. Forensics Secur. 8(12): 2046-2058 (2013) - [c82]Andreas Holzer, Nikolaos P. Karvelas, Stefan Katzenbeisser, Helmut Veith, Martin Franz:
Challenges in compiler construction for secure two-party computation. PETShop@CCS 2013: 3-6 - [c81]Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
:
Secure PRNG seeding on commercial off-the-shelf microcontrollers. TrustED@CCS 2013: 55-64 - [c80]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber
, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c79]Anthony Van Herrewege, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede
:
Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers. CCS 2013: 1333-1336 - [c78]Sebastian Biedermann, Stefan Katzenbeisser:
Event-based isolation of critical data in the cloud. CCS 2013: 1383-1386 - [c77]Hieu Cuong Nguyen, Stefan Katzenbeisser:
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine. Communications and Multimedia Security 2013: 113-122 - [c76]Sebastian Biedermann, Martin Zittel, Stefan Katzenbeisser:
Improving security of virtual machines during live migrations. PST 2013: 352-357 - [p4]Claus Vielhauer, Jana Dittmann, Stefan Katzenbeisser:
Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain. Security and Privacy in Biometrics 2013: 25-43 - [e11]Marc Fischlin, Stefan Katzenbeisser:
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 8260, Springer 2013, ISBN 978-3-642-42000-9 [contents] - [i16]Sami Alsouri, Thomas Feller, Sunil Malipatlolla, Stefan Katzenbeisser:
Hardware-based Security for Virtual Trusted Platform Modules. CoRR abs/1308.1539 (2013) - [i15]Andreas Peter, Erik Tews, Stefan Katzenbeisser:
Efficiently Outsourcing Multiparty Computation under Multiple Keys. IACR Cryptol. ePrint Arch. 2013: 13 (2013) - [i14]Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede:
Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers. IACR Cryptol. ePrint Arch. 2013: 304 (2013) - 2012
- [j17]Stefan Katzenbeisser, André Schaller:
Physical Unclonable Functions. Datenschutz und Datensicherheit 36(12): 881-885 (2012) - [c75]Frederik Armknecht
, Stefan Katzenbeisser, Andreas Peter:
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption. AFRICACRYPT 2012: 234-251 - [c74]Sebastian Biedermann, Martin Mink, Stefan Katzenbeisser:
Fast dynamic extracted honeypots in cloud computing. CCSW 2012: 13-18 - [c73]Andreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith:
Secure two-party computations in ANSI C. CCS 2012: 772-783 - [c72]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon. CHES 2012: 283-301 - [c71]Hieu Cuong Nguyen, Stefan Katzenbeisser:
Robust Resampling Detection in Digital Images. Communications and Multimedia Security 2012: 3-15 - [c70]Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes
, Roel Peeters
, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. Financial Cryptography 2012: 374-389 - [c69]Hieu Cuong Nguyen, Stefan Katzenbeisser:
Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation. IIH-MSP 2012: 134-137 - [c68]Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden
, Mira Mezini, Stefan Katzenbeisser:
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. ISC 2012: 168-187 - [c67]Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser:
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. ISC 2012: 242-257 - [c66]Ünal Koçabas, Andreas Peter, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Converse PUF-Based Authentication. TRUST 2012: 142-158 - [c65]Andreas Peter, Thomas Hartmann, Sascha Müller, Stefan Katzenbeisser:
Privacy-preserving architecture for forensic image recognition. WIFS 2012: 79-84 - [e10]Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6 [contents] - [e9]Mária Bieliková, Gerhard Friedrich, Georg Gottlob, Stefan Katzenbeisser, György Turán:
SOFSEM 2012: Theory and Practice of Computer Science - 38th Conference on Current Trends in Theory and Practice of Computer Science, Špindlerův Mlýn, Czech Republic, January 21-27, 2012. Proceedings. Lecture Notes in Computer Science 7147, Springer 2012, ISBN 978-3-642-27659-0 [contents] - [e8]Stefan Katzenbeisser, Edgar R. Weippl
, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang:
Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5 [contents] - [e7]Yun Q. Shi, Stefan Katzenbeisser:
Transactions on Data Hiding and Multimedia Security VIII - Special Issue on Pattern Recognition for IT Security. Lecture Notes in Computer Science 7228, Springer 2012, ISBN 978-3-642-31970-9 [contents] - [i13]Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rozic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version). IACR Cryptol. ePrint Arch. 2012: 557 (2012) - 2011
- [j16]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen
, Christian Wachsmann:
Recyclable PUFs: logically reconfigurable PUFs. J. Cryptogr. Eng. 1(3): 177-186 (2011) - [j15]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos Fingerprinting Codes in the Combined Digit Model. IEEE Trans. Inf. Forensics Secur. 6(3-2): 906-919 (2011) - [c64]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen
, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. CHES 2011: 374-389 - [c63]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. CRYPTO 2011: 51-70 - [c62]Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková:
Oblivious Outsourced Storage with Delegation. Financial Cryptography 2011: 127-140 - [c61]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Towards Secure Bioinformatics Services (Short Paper). Financial Cryptography 2011: 276-283 - [c60]Hieu Cuong Nguyen, Stefan Katzenbeisser:
Security of copy-move forgery detection techniques. ICASSP 2011: 1864-1867 - [c59]Sebastian Biedermann, Stefan Katzenbeisser:
Detecting Computer Worms in the Cloud. iNetSeC 2011: 43-54 - [c58]Sebastian Schrittwieser, Stefan Katzenbeisser:
Code Obfuscation against Static and Dynamic Reverse Engineering. Information Hiding 2011: 270-284 - [c57]Hieu Cuong Nguyen, Stefan Katzenbeisser:
Performance and Robustness Analysis for Some Re-sampling Detection Techniques in Digital Images. IWDW 2011: 387-397 - [c56]Martin Franz, Stefan Katzenbeisser:
Processing encrypted floating point signals. MM&Sec 2011: 103-108 - [c55]Kay Hamacher, Stefan Katzenbeisser:
Public security: simulations need to replace conventional wisdom. NSPW 2011: 115-124 - [c54]Sami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann:
Trustable outsourcing of business processes to cloud computing environments. NSS 2011: 280-284 - [c53]Sascha Müller, Stefan Katzenbeisser:
Hiding the Policy in Cryptographic Access Control. STM 2011: 90-105 - [e6]Yan Chen, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Proceedings of the 11th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1005-5 [contents] - [r2]Stefan Katzenbeisser, Johannes Kinder, Helmut Veith:
Malware Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 752-755 - [i12]Stefan Katzenbeisser, Klaus Kursawe, Bart Preneel, Ahmad-Reza Sadeghi:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511). Dagstuhl Reports 1(12): 62-68 (2011) - [i11]Sascha Müller, Stefan Katzenbeisser:
Hiding the Policy in Cryptographic Access Control. IACR Cryptol. ePrint Arch. 2011: 255 (2011) - [i10]Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:
Recyclable PUFs: Logically Reconfigurable PUFs. IACR Cryptol. ePrint Arch. 2011: 552 (2011) - [i9]Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:
Physically Uncloneable Functions in the Universal Composition Framework. IACR Cryptol. ePrint Arch. 2011: 681 (2011) - 2010
- [j14]Daniel Reker
, Stefan Katzenbeisser, Kay Hamacher:
Computation of mutual information from Hidden Markov Models. Comput. Biol. Chem. 34(5-6): 328-333 (2010) - [j13]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Proactive Detection of Computer Worms Using Model Checking. IEEE Trans. Dependable Secur. Comput. 7(4): 424-438 (2010) - [j12]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Semantic integrity in large-scale online simulations. ACM Trans. Internet Techn. 10(1): 2:1-2:24 (2010) - [c52]Sascha Müller, Stefan Katzenbeisser:
A New DRM Architecture with Strong Enforcement. ARES 2010: 397-403 - [c51]Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis
, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
:
Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010: 87-104 - [c50]Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski:
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. Communications and Multimedia Security 2010: 75-80 - [c49]Yali Liu, Dipak Ghosal, Frederik Armknecht
, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser:
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic. Information Hiding 2010: 193-207 - [c48]Sascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser, Ulrich Rührmair:
Audio watermarking forensics: detecting malicious re-embedding. Media Forensics and Security 2010: 75410G - [c47]Marcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser:
Collusion-Secure Fingerprint Watermarking for Real World Applications. Sicherheit 2010: 129-140 - [c46]Sami Alsouri, Özgür Dagdelen, Stefan Katzenbeisser:
Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation. TRUST 2010: 63-77 - [c45]Heike Busch, Miroslava Sotáková, Stefan Katzenbeisser, Radu Sion:
The PUF Promise. TRUST 2010: 290-297 - [c44]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure computations on non-integer values. WIFS 2010: 1-6 - [p3]Stefan Katzenbeisser, Huajian Liu, Martin Steinebach:
Challenges and Solutions in Multimedia Document Authentication. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 155-175 - [p2]Ulrich Rührmair, Heike Busch, Stefan Katzenbeisser:
Strong PUFs: Models, Constructions, and Security Proofs. Towards Hardware-Intrinsic Security 2010: 79-96 - [r1]Mauro Barni, Stefan Katzenbeisser:
Digital Watermarking. Handbook of Financial Cryptography and Security 2010: 391-435 - [i8]Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Secure Computations on Non-Integer Values. IACR Cryptol. ePrint Arch. 2010: 499 (2010) - [i7]Frederik Armknecht, Andreas Peter, Stefan Katzenbeisser:
A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP. IACR Cryptol. ePrint Arch. 2010: 501 (2010)
2000 – 2009
- 2009
- [b2]Stefan Katzenbeisser:
Security and privacy aspects of noisy data. Technical University of Munich, Germany, 2009 - [c43]Yali Liu, Dipak Ghosal, Frederik Armknecht
, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser:
Hide and Seek in Time - Robust Covert Timing Channels. ESORICS 2009: 120-135 - [c42]Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, Stefan Katzenbeisser:
On the Reliability of Cell Phone Camera Fingerprint Recognition. ICDF2C 2009: 69-76 - [c41]Zekeriya Erkin
, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft:
Privacy-Preserving Face Recognition. Privacy Enhancing Technologies 2009: 235-253 - [c40]Stefan Katzenbeisser, Klaus Kursawe, Frederic Stumpf:
Revocation of TPM Keys. TRUST 2009: 120-132 - [c39]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik
:
Tardos fingerprinting codes in the combined digit model. WIFS 2009: 41-45 - [c38]Heike Busch, Stefan Katzenbeisser, Paul Baecher:
PUF-Based Authentication Protocols - Revisited. WISA 2009: 296-308 - [e5]Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5806, Springer 2009, ISBN 978-3-642-04430-4 [contents] - [e4]Hyoung-Joong Kim, Stefan Katzenbeisser, Anthony Tung Shuen Ho:
Digital Watermarking, 7th International Workshop, IWDW 2008, Busan, Korea, November 10-12, 2008. Selected Papers. Lecture Notes in Computer Science 5450, Springer 2009, ISBN 978-3-642-04437-3 [contents] - [i6]Boris Skoric, Stefan Katzenbeisser, Hans Georg Schaathun, Mehmet Utku Celik:
Tardos Fingerprinting Codes in the Combined Digit Model. IACR Cryptol. ePrint Arch. 2009: 244 (2009) - 2008
- [j11]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik
:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Des. Codes Cryptogr. 46(2): 137-166 (2008) - [j10]Mehmet Utku Celik
, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks. IEEE Trans. Inf. Forensics Secur. 3(3): 475-487 (2008) - [j9]Stefan Katzenbeisser, Aweke N. Lemma, Mehmet Utku Celik
, Michiel van der Veen, Martijn Maas:
A Buyer-Seller Watermarking Protocol Based on Secure Embedding. IEEE Trans. Inf. Forensics Secur. 3(4): 783-786 (2008) - [c37]Stefan Katzenbeisser, Milan Petkovic:
Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. ARES 2008: 889-895 - [c36]Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeisser, Claudia Eckert:
Improving the scalability of platform attestation. STC 2008: 1-10 - [c35]Sascha Müller, Stefan Katzenbeisser, Claudia Eckert:
Distributed Attribute-Based Encryption. ICISC 2008: 20-36 - [c34]Klaus Kursawe, Stefan Katzenbeisser:
Trust in Consumer Electronics. ISSE 2008: 139-143 - [c33]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik
, Serap Kirbiz:
Forensic watermarking and bit-rate conversion of partially encrypted AAC bitstreams. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681910 - [c32]Lars Fischer, Stefan Katzenbeisser, Claudia Eckert:
Measuring unlinkability revisited. WPES 2008: 105-110 - [e3]Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser:
Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings. Lecture Notes in Computer Science 5041, Springer 2008, ISBN 978-3-540-92237-7 [contents] - [i5]Fons Bruekers, Stefan Katzenbeisser, Klaus Kursawe, Pim Tuyls:
Privacy-Preserving Matching of DNA Profiles. IACR Cryptol. ePrint Arch. 2008: 203 (2008) - 2007
- [j8]Zekeriya Erkin
, Alessandro Piva
, Stefan Katzenbeisser, Reginald L. Lagendijk, Jamshid Shokrollahi, Gregory Neven, Mauro Barni:
Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing. EURASIP J. Inf. Secur. 2007 (2007) - [j7]Alessandro Piva
, Stefan Katzenbeisser:
Signal Processing in the Encrypted Domain. EURASIP J. Inf. Secur. 2007 (2007) - [j6]Serap Kirbiz, Aweke N. Lemma, Mehmet Utku Celik
, Stefan Katzenbeisser:
Decode-Time Forensic Watermarking of AAC Bitstreams. IEEE Trans. Inf. Forensics Secur. 2(4): 683-696 (2007) - [j5]Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith:
Software transformations to improve malware detection. J. Comput. Virol. 3(4): 253-265 (2007) - [c31]Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik
:
Privacy preserving error resilient dna searching through oblivious automata. CCS 2007: 519-528 - [c30]Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser, Michiel van der Veen:
Secure Embedding of Spread Spectrum Watermarks using Look-up-Tables. ICASSP (2) 2007: 153-156 - [c29]Mehmet Utku Celik, Joop Talstra, Aweke N. Lemma, Stefan Katzenbeisser:
Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-Streams. ICIP (5) 2007: 489-492 - [c28]Serap Kirbiz, Mehmet Utku Celik, Aweke N. Lemma, Stefan Katzenbeisser:
Forensic Watermarking During AAC Playback. ICME 2007: 1111-1114 - [c27]Stefan Katzenbeisser, Boris Skoric, Mehmet Utku Celik
, Ahmad-Reza Sadeghi:
Combining Tardos Fingerprinting Codes and Fingercasting. Information Hiding 2007: 294-310 - [c26]Milan Petkovic, Stefan Katzenbeisser, Klaus Kursawe:
Rights Management Technologies: A Good Choice for Securing Electronic Health Records? ISSE 2007: 178-187 - [c25]Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser, Mehmet Utku Celik
, Aweke N. Lemma:
A secure multidimensional point inclusion protocol. MM&Sec 2007: 109-120 - [c24]Klaus Kursawe, Stefan Katzenbeisser:
Computing under occupation. NSPW 2007: 81-88 - [c23]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. S&P 2007: 179-186 - [c22]Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan Katzenbeisser:
NS2: Networked Searchable Store with Correctness. VLDB 2007: 1342-1345 - [p1]Michiel van der Veen, Aweke N. Lemma, Mehmet Utku Celik, Stefan Katzenbeisser:
Forensic Watermarking in Digital Rights Management. Security, Privacy, and Trust in Modern Data Management 2007: 287-302 - [i4]Boris Skoric, Stefan Katzenbeisser, Mehmet Utku Celik:
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. IACR Cryptol. ePrint Arch. 2007: 41 (2007) - [i3]Somesh Jha, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith, Stephen Chenney:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. IACR Cryptol. ePrint Arch. 2007: 56 (2007) - 2006
- [j4]Felix A. Fischer, Markus Holzer
, Stefan Katzenbeisser:
The influence of neighbourhood and choice on the complexity of finding pure Nash equilibria. Inf. Process. Lett. 99(6): 239-245 (2006) - [c21]Stefan Katzenbeisser, Klaus Kursawe, Joop Talstra:
Graceful infringement reactions in DRM systems. Digital Rights Management Workshop 2006: 89-96 - [c20]Richard Bergmair, Stefan Katzenbeisser:
Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens. Information Hiding 2006: 109-123 - [c19]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
A Computational Model for Watermark Robustness. Information Hiding 2006: 145-160 - [c18]Aweke N. Lemma, Stefan Katzenbeisser, Mehmet Utku Celik, Michiel van der Veen:
Secure Watermark Embedding Through Partial Encryption. IWDW 2006: 433-445 - 2005
- [c17]Johannes Kinder, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Detecting Malicious Code by Model Checking. DIMVA 2005: 174-187 - [c16]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 - [c15]Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Malware Engineering. Sicherheit 2005: 139-148 - [c14]Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser:
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Sicherheit 2005: 189-192 - [e2]Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl:
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3677, Springer 2005, ISBN 3-540-28791-4 [contents] - [e1]Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González:
Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3727, Springer 2005, ISBN 3-540-29039-7 [contents] - [i2]Uwe Hermann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. CoRR abs/cs/0503080 (2005) - 2004
- [j3]Pierre Moulin, Ton Kalker, Ingemar J. Cox
, Jana Dittmann, Pierre Duhamel, Avinash Jain, Stefan Katzenbeisser, Reginald L. Lagendijk:
Guest Editorial: Supplement on Secure Media - I. IEEE Trans. Signal Process. 52(10): 2954 (2004) - [c13]Richard Bergmair, Stefan Katzenbeisser:
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). ISC 2004: 257-267 - [c12]Markus Holzer, Stefan Katzenbeisser, Christian Schallhart:
Towards Formal Semantics for ODRL. ODRL Workshop 2004: 137-148 - [c11]Stefan Katzenbeisser, Jana Dittmann:
Malicious attacks on media authentication schemes based on invertible watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 838-847 - [i1]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Provably Secure Authentication of Digital Media Through Invertible Watermarks. IACR Cryptol. ePrint Arch. 2004: 293 (2004) - 2003
- [j2]Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon
:
Editorial. Multim. Syst. 9(3): 215 (2003) - [j1]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Watermark detection with zero-knowledge disclosure. Multim. Syst. 9(3): 266-278 (2003) - [c10]André Adelsbach, Stefan Katzenbeisser, Helmut Veith:
Watermarking schemes provably secure against copy and ambiguity attacks. Digital Rights Management Workshop 2003: 111-119 - [c9]Stefan Katzenbeisser:
On the Integration of Watermarks and Cryptography. IWDW 2003: 50-60 - [c8]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. IWDW 2003: 355-369 - 2002
- [c7]André Adelsbach, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure. EUSIPCO 2002: 1-4 - [c6]Stefan Katzenbeisser, Fabien A. P. Petitcolas
:
Defining security in steganographic systems. Security and Watermarking of Multimedia Contents 2002: 50-56 - [c5]Stefan Katzenbeisser, Helmut Veith:
Securing symmetric watermarking schemes against protocol attacks. Security and Watermarking of Multimedia Contents 2002: 260-268 - 2001
- [c4]Stefan Katzenbeisser, Scott Craver:
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept. Communications and Multimedia Security 2001 - [c3]Stefan Katzenbeisser:
On the Design of Copyright Protection Protocols for Multimedia Distributioni Using Symmetric and Public-Key Watermarking. DEXA Workshop 2001: 815-819 - [c2]Stefan Katzenbeisser, Philipp Tomsich
:
Applied Information Security for m-Commerce and Digital Television Environments. EC-Web 2001: 166-175 - 2000
- [b1]Christoph W. Ueberhuber, Stefan Katzenbeisser:
MATLAB 6 - eine Einführung. Springer 2000, ISBN 978-3-211-83487-9, pp. I-IX, 1-200 - [c1]Philipp Tomsich
, Stefan Katzenbeisser:
Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property. EC-Web 2000: 38-47
Coauthor Index
aka: Nikolaos Athanasios Anagnostopoulos
aka: Heike Busch
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-04 22:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint