Kamu erişimi zorunlu olan makaleler - Niklas BüscherDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 7
Salad: Secure and lightweight attestation of highly dynamic and disruptive networks
F Kohnhäuser, N Büscher, S Katzenbeisser
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Zorunlu olanlar: German Research Foundation
Scapi: a scalable attestation protocol to detect software and physical attacks
F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
Zorunlu olanlar: German Research Foundation
Compiling low depth circuits for practical secure computation
N Büscher, A Holzer, A Weber, S Katzenbeisser
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Zorunlu olanlar: Austrian Science Fund, German Research Foundation
On compiling boolean circuits optimized for secure multi-party computation
N Büscher, M Franz, A Holzer, H Veith, S Katzenbeisser
Formal Methods in System Design 51, 308-331, 2017
Zorunlu olanlar: German Research Foundation
Scalable secure computation from ANSI-C
N Buescher, D Kretzmer, A Jindal, S Katzenbeisser
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
Zorunlu olanlar: German Research Foundation
Towards practical RAM based secure computation
N Buescher, A Weber, S Katzenbeisser
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Zorunlu olanlar: German Research Foundation, Federal Ministry of Education and Research, Germany
Consumer Privacy on Distributed Energy Markets
N Büscher, S Schiffner, M Fischer
Annual Privacy Forum, 96-114, 2016
Zorunlu olanlar: German Research Foundation
Bir yerde sunuluyor: 7
HyCC: Compilation of hybrid protocols for practical secure computation
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Zorunlu olanlar: German Research Foundation, Federal Ministry of Education and Research, Germany
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
Zorunlu olanlar: German Research Foundation
Two is not enough: Privacy assessment of aggregation schemes in smart metering
N Buescher, S Boukoros, S Bauregger, S Katzenbeisser
Proceedings on Privacy Enhancing Technologies, 2017
Zorunlu olanlar: German Research Foundation
Faster secure computation through automatic parallelization
N Buescher, S Katzenbeisser
24th USENIX security symposium (USENIX security 15), 531-546, 2015
Zorunlu olanlar: German Research Foundation
A practical attestation protocol for autonomous embedded systems
F Kohnhäuser, N Büscher, S Katzenbeisser
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 263-278, 2019
Zorunlu olanlar: Federal Ministry of Education and Research, Germany
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
Zorunlu olanlar: German Research Foundation
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
Zorunlu olanlar: German Research Foundation, European Commission, Federal Ministry of …
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir