A survey of provably secure searchable encryption C Bösch, P Hartel, W Jonker, A Peter ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014 | 414 | 2014 |
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ... Network and distributed system security symposium (NDSS) 27, 2020 | 191 | 2020 |
Efficiently outsourcing multiparty computation under multiple keys A Peter, E Tews, S Katzenbeisser IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013 | 184 | 2013 |
Redactable signatures for tree-structured data: Definitions and constructions C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ... Applied Cryptography and Network Security: 8th International Conference …, 2010 | 145 | 2010 |
Group homomorphic encryption: characterizations, impossibility results, and applications F Armknecht, S Katzenbeisser, A Peter Designs, codes and cryptography 67 (2), 209-232, 2013 | 72 | 2013 |
Automated retrieval of att&ck tactics and techniques for cyber threat reports V Legoy, M Caselli, C Seifert, A Peter arXiv preprint arXiv:2004.14322, 2020 | 65 | 2020 |
Deepcase: Semi-supervised contextual analysis of security events T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ... 2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022 | 58 | 2022 |
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ... Proceedings of the 33rd Annual computer security applications Conference …, 2017 | 55 | 2017 |
Oblivious outsourced storage with delegation M Franz, P Williams, B Carbunar, S Katzenbeisser, A Peter, R Sion, ... Financial Cryptography and Data Security: 15th International Conference, FC …, 2012 | 51 | 2012 |
Efficient privacy-enhanced familiarity-based recommender system A Jeckmans, A Peter, P Hartel Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 49 | 2013 |
Converse PUF-based authentication Ü Kocabaş, A Peter, S Katzenbeisser, AR Sadeghi Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012 | 49 | 2012 |
Privacy-preserving whole genome sequence processing through proxy-aided ORAM N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014 | 48* | 2014 |
Obfuscated access and search patterns in searchable encryption Z Shang, S Oya, A Peter, F Kerschbaum arXiv preprint arXiv:2102.09651, 2021 | 41 | 2021 |
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ... arXiv preprint arXiv:1806.04042, 2018 | 41 | 2018 |
Distributed searchable symmetric encryption C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ... 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 40 | 2014 |
A highly accurate {Query-Recovery} attack against searchable encryption using {Non-Indexed} documents M Damie, F Hahn, A Peter 30th USENIX security symposium (USENIX Security 21), 143-160, 2021 | 31 | 2021 |
Privacy-enhanced participatory sensing with collusion resistance and data aggregation F Günther, M Manulis, A Peter Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 31 | 2014 |
Fast and accurate likelihood ratio-based biometric verification secure against malicious adversaries A Bassit, F Hahn, J Peeters, T Kevenaar, R Veldhuis, A Peter IEEE transactions on information forensics and security 16, 5045-5060, 2021 | 26* | 2021 |
Automatic deployment of specification-based intrusion detection in the BACnet protocol H Esquivel-Vargas, M Caselli, A Peter Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017 | 25 | 2017 |
General impossibility of group homomorphic encryption in the quantum world F Armknecht, T Gagliardoni, S Katzenbeisser, A Peter Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 24 | 2014 |