Ahmad-Reza Sadeghi

According to our database1, Ahmad-Reza Sadeghi authored at least 373 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication.
IEEE Journal on Selected Areas in Communications, 2019

FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptology ePrint Archive, 2019

Guest Editors' Introduction: Secure Automotive Systems.
IEEE Design & Test, 2019

SADAN: Scalable Adversary Detection in Autonomous Networks.
CoRR, 2019

HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
CoRR, 2019

ARM2GC: Succinct Garbled Processor for Secure Computation.
CoRR, 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

HardFails: Insights into Software-Exploitable Hardware Bugs.
Proceedings of the 28th USENIX Security Symposium, 2019

FastKitten: Practical Smart Contracts on Bitcoin.
Proceedings of the 28th USENIX Security Symposium, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

SANCTUARY: ARMing TrustZone with User-space Enclaves.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NAUTILUS: Fishing for Deep Bugs with Grammars.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Towards Systematic Design of Collective Remote Attestation Protocols.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

HEALED: HEaling & Attestation for Low-End Embedded Devices.
Proceedings of the Financial Cryptography and Data Security, 2019

Sustainable Security & Safety: Challenges and Opportunities.
Proceedings of the 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems, 2019

ARM2GC: Succinct Garbled Processor for Secure Computation.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
End-to-End Detection of Caller ID Spoofing Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

HardIDX: Practical and secure index with SGX in a malicious environment.
Journal of Computer Security, 2018

OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Computing, 2018

Changing the Game of Software Security.
IEEE Security & Privacy, 2018

Five Freedoms for the Homo Deus.
IEEE Security & Privacy, 2018

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
IACR Cryptology ePrint Archive, 2018

Control Behavior Integrity for Distributed Cyber-Physical Systems.
CoRR, 2018

When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
CoRR, 2018

Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management.
CoRR, 2018

Peek-a-Boo: I see your smart home activities, even encrypted!
CoRR, 2018

ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
CoRR, 2018

DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
CoRR, 2018

IMIX: In-Process Memory Isolation EXtension.
Proceedings of the 27th USENIX Security Symposium, 2018

The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX.
Proceedings of the 27th USENIX Security Symposium, 2018

US-AID: Unattended Scalable Attestation of IoT Devices.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

State-aware anomaly detection for industrial control systems.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

K-Miner: Uncovering Memory Corruption in Linux.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the Interspeech 2018, 2018

Towards a Cloud-based System for Software Protection and Licensing.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

LiteHAX: lightweight hardware-assisted attestation of program execution.
Proceedings of the International Conference on Computer-Aided Design, 2018

SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices.
Proceedings of the Computer Security, 2018

The future of IoT security: special session.
Proceedings of the International Conference on Embedded Software, 2018

It's hammer time: how to attack (rowhammer-based) DRAM-PUFs.
Proceedings of the 55th Annual Design Automation Conference, 2018

Revisiting context-based authentication in IoT.
Proceedings of the 55th Annual Design Automation Conference, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Internet of things or threats?: on building trust in IoT (keynote).
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2018

iOracle: Automated Evaluation of Access Control Policies in iOS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Advances and throwbacks in hardware-assisted security: special session.
Proceedings of the International Conference on Compilers, 2018

Hardware control flow integrity.
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018

2017
Toward Practical Secure Stable Matching.
PoPETs, 2017

Phonion: Practical Protection of Metadata in Telephony Networks.
PoPETs, 2017

ACM CCS 2016 Interview, Part 3.
IEEE Security & Privacy, 2017

ACM CCS 2016 Interviews, Part 2.
IEEE Security & Privacy, 2017

ACM CCS 2016 Interviews, Part 1.
IEEE Security & Privacy, 2017

Security & Privacy Week Interviews, Part 3.
IEEE Security & Privacy, 2017

Security and Privacy More Crucial than Ever.
IEEE Security & Privacy, 2017

ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping.
IACR Cryptology ePrint Archive, 2017

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Execution Integrity with In-Place Encryption.
CoRR, 2017

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017

Exploiting PUF Models for Error Free Response Generation.
CoRR, 2017

Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication.
CoRR, 2017

HardIDX: Practical and Secure Index with SGX.
CoRR, 2017

Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
CoRR, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

SeED: secure non-interactive attestation for embedded devices.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
Proceedings of the 26th USENIX Security Symposium, 2017

LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ATRIUM: Runtime attestation resilient under memory attacks.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Secure Multiparty Computation from SGX.
Proceedings of the Financial Cryptography and Data Security, 2017

HardIDX: Practical and Secure Index with SGX.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

Fitness Trackers: Fit for Health but Unfit for Security and Privacy.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Hardware-Assisted Security: Promises, Pitfalls and Opportunities.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

JITGuard: Hardening Just-in-time Compilers with SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Remanence Decay Side-Channel: The PUF Case.
IEEE Trans. Information Forensics and Security, 2016

Selfrando: Securing the Tor Browser against De-anonymization Exploits.
PoPETs, 2016

The Cybersecurity Landscape in Industrial Control Systems.
Proceedings of the IEEE, 2016

Security & Privacy Week Interviews, Part 2.
IEEE Security & Privacy, 2016

Security & Privacy Week Interviews, Part 1.
IEEE Security & Privacy, 2016

Games without Frontiers: Whither Information Security and Privacy?
IEEE Security & Privacy, 2016

Secure Multiparty Computation from SGX.
IACR Cryptology ePrint Archive, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptology ePrint Archive, 2016

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
CoRR, 2016

SandBlaster: Reversing the Apple Sandbox.
CoRR, 2016

CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
CoRR, 2016

C-FLAT: Control-FLow ATtestation for Embedded Systems Software.
CoRR, 2016

POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

DARPA: Device Attestation Resilient to Physical Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Leakage-Resilient Layout Randomization for Mobile Devices.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Regulating ARM TrustZone Devices in Restricted Spaces.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

CryptoML: Secure outsourcing of big data machine learning applications.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Strategy without tactics: policy-agnostic hardware-enhanced control-flow integrity.
Proceedings of the 53rd Annual Design Automation Conference, 2016

GarbledCPU: a MIPS processor for secure computation in hardware.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Can IoT be secured: emerging challenges in connecting the unconnected.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Security analysis on consumer and industrial IoT devices.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

2015
Automated Software Diversity
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2015

Building Secure Defenses Against Code-Reuse Attacks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-25546-0, 2015

Guest Editorial Special Section on Hardware Security and Trust.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
IACR Cryptology ePrint Archive, 2015

OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
CoRR, 2015

How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Readactor: Practical Code Randomization Resilient to Memory Disclosure.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Market-Driven Code Provisioning to Mobile Secure Hardware.
Proceedings of the Financial Cryptography and Data Security, 2015

Smart and Secure Cross-Device Apps for the Internet of Advanced Things.
Proceedings of the Financial Cryptography and Data Security, 2015

Compacting privacy-preserving k-nearest neighbor search using logic synthesis.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Security and privacy challenges in industrial internet of things.
Proceedings of the 52nd Annual Design Automation Conference, 2015

HAFIX: hardware-assisted flow integrity extension.
Proceedings of the 52nd Annual Design Automation Conference, 2015

TyTAN: tiny trust anchor for tiny devices.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Proceedings of the 10th ACM Symposium on Information, 2015

I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Proceedings of the 10th ACM Symposium on Information, 2015

Automated Synthesis of Optimized Circuits for Secure Computation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

XiOS: Extended Application Sandboxing on iOS.
Proceedings of the 10th ACM Symposium on Information, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, 2014

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
IEEE Trans. Information Forensics and Security, 2014

Mobile Trusted Computing.
Proceedings of the IEEE, 2014

A trusted versioning file system for passive mobile storage devices.
J. Network and Computer Applications, 2014

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
CoRR, 2014

ASM: A Programmable Interface for Extending Android Security.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

On Offline Payments with Bitcoin (Poster Abstract).
Proceedings of the Financial Cryptography and Data Security, 2014

On the (In)Security of Mobile Two-Factor Authentication.
Proceedings of the Financial Cryptography and Data Security, 2014

TrustLite: a security architecture for tiny embedded devices.
Proceedings of the Ninth Eurosys Conference 2014, 2014

Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ConXsense: automated context classification for context-aware access control.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Swap and Play: Live Updating Hypervisors and Its Application to Xen.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
Journal of Computer Security, 2013

Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptology ePrint Archive, 2013

Towards Provably Secure Software Attestation.
IACR Cryptology ePrint Archive, 2013

ConXsense - Context Sensing for Adaptive Usable Access Control.
CoRR, 2013

Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Mobile security and privacy: the quest for the mighty access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

Memristor PUFs: a new generation of memory-based physically unclonable functions.
Proceedings of the Design, Automation and Test in Europe, 2013

Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

PSiOS: bring your own privacy & security to iOS devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications.
Proceedings of the Annual Computer Security Applications Conference, 2013

Client-Controlled Cryptography-as-a-Service in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2013

CrowdShare: Secure Mobile Resource Sharing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version).
IACR Cryptology ePrint Archive, 2012

SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version).
IACR Cryptology ePrint Archive, 2012

Tetherway: a framework for tethering camouflage.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Unsafe exposure analysis of mobile in-app advertisements.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Converse PUF-Based Authentication.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

SmartTokens: Delegable Access Control with NFC-Enabled Smartphones.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Towards Taming Privilege-Escalation Attacks on Android.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Flexible patient-controlled security for electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Proceedings of the Financial Cryptography and Data Security, 2012

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution.
Proceedings of the Financial Cryptography and Data Security, 2012

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
Proceedings of the Financial Cryptography and Data Security, 2012

The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Proceedings of the Computer Security - ESORICS 2012, 2012

PUF-based secure test wrapper design for cryptographic SoC testing.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

EDA for secure and dependable cybercars: challenges and opportunities.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Information Forensics and Security, 2011

Recyclable PUFs: logically reconfigurable PUFs.
J. Cryptographic Engineering, 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
IACR Cryptology ePrint Archive, 2011

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
IACR Cryptology ePrint Archive, 2011

On Constructing Homomorphic Encryption Schemes from Coding Theory.
IACR Cryptology ePrint Archive, 2011

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptology ePrint Archive, 2011

Secure Computing in the Cloud (Dagstuhl Seminar 11491).
Dagstuhl Reports, 2011

Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511).
Dagstuhl Reports, 2011

Short paper: lightweight remote attestation using physical functions.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

On Constructing Homomorphic Encryption Schemes from Coding Theory.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Trustworthy Clouds Underpinning the Future Internet.
Proceedings of the Future Internet, 2011

hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 2011

Uni-directional trusted path: Transaction confirmation on just one device.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Secure Set Intersection with Untrusted Hardware Tokens.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Proceedings of the Communications and Multimedia Security, 2011

Recyclable PUFs: Logically Reconfigurable PUFs.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

Poster: practical embedded remote attestation using physically unclonable functions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

ROPdefender: a detection tool to defend against return-oriented programming attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: control-flow integrity for smartphones.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Practical and lightweight domain isolation on Android.
Proceedings of the SPSM'11, 2011

Poster: the quest for security against privilege escalation attacks on android.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

A Security Architecture for Accessing Health Records on Mobile Phones.
Proceedings of the HEALTHINF 2011, 2011

Securing the Access to Electronic Health Records on Mobile Phones.
Proceedings of the Biomedical Engineering Systems and Technologies, 2011

2010
Enhancing RFID Security and Privacy by Physically Unclonable Functions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Trusted Computing.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Impossibility Results for RFID Privacy Notions.
Trans. Computational Science, 2010

Towards automated security policy enforcement in multi-tenant virtual data centers.
Journal of Computer Security, 2010

Key agreement for heterogeneous mobile ad-hoc groups.
IJWMC, 2010

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptology ePrint Archive, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptology ePrint Archive, 2010

TASTY: Tool for Automating Secure Two-partY computations.
IACR Cryptology ePrint Archive, 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptology ePrint Archive, 2010

Trusted virtual domains: Color your network.
Datenschutz und Datensicherheit, 2010

Token-Based Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Anonymous Authentication with TLS and DAA.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Proceedings of the perspeGKtive 2010, 2010

Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Proceedings of the Information Security - 13th International Conference, 2010

Video Streaming Forensic - Content Identification with Traffic Snooping.
Proceedings of the Information Security - 13th International Conference, 2010

Privilege Escalation Attacks on Android.
Proceedings of the Information Security - 13th International Conference, 2010

TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

Securing the e-health cloud.
Proceedings of the ACM International Health Informatics Symposium, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

Breaking Randomized Linear Generation Functions Based Virtual Password System.
Proceedings of IEEE International Conference on Communications, 2010

Extending IPsec for Efficient Remote Attestation.
Proceedings of the Financial Cryptography and Data Security, 2010

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Embedded SFE: Offloading Server and Network Using Hardware Tokens.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
Proceedings of the Computer Security, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

TASTY: tool for automating secure two-party computations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Return-oriented programming without returns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Breaking e-banking CAPTCHAs.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Patterns for Secure Boot and Secure Storage in Computer Systems.
Proceedings of the ARES 2010, 2010

2009
Efficient Privacy-Preserving Face Recognition.
IACR Cryptology ePrint Archive, 2009

Practical Secure Evaluation of Semi-Private Functions.
IACR Cryptology ePrint Archive, 2009

On the Security of PAS (Predicate-based Authentication Service).
IACR Cryptology ePrint Archive, 2009

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptology ePrint Archive, 2009

Embedded SFE: Offloading Server and Network using Hardware Tokens.
IACR Cryptology ePrint Archive, 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptology ePrint Archive, 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptology ePrint Archive, 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Secure VPNs for Trusted Computing Environments.
Proceedings of the Trusted Computing, 2009

Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Proceedings of the Trusted Computing, 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
Proceedings of the Security Protocols XVII, 2009

Transparent Mobile Storage Protection in Trusted Virtual Domains.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Future of Assurance: Ensuring that a System is Trustworthy.
Proceedings of the ISSE 2009, 2009

Using Compilers to Enhance Cryptographic Product Development.
Proceedings of the ISSE 2009, 2009

Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Proceedings of the Information Security Practice and Experience, 2009

Trusted Virtual Domains - Design, Implementation and Lessons Learned.
Proceedings of the Trusted Systems, First International Conference, 2009

Software distribution as a malware infection vector.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Efficient Privacy-Preserving Face Recognition.
Proceedings of the Information, Security and Cryptology, 2009

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Automatic Generation of Sigma-Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

Location Privacy in RFID Applications.
Proceedings of the Privacy in Location-Based Applications, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Proceedings of the Computer Security, 2009

A Pattern for Secure Graphical User Interface Systems.
Proceedings of the Database and Expert Systems Applications, 2009

09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009

A practical property-based bootstrap architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

TruWallet: trustworthy and migratable wallet-based web authentication.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Anonymizer-Enabled Security and Privacy for RFID.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Advances in Cryptology, 2009

On the Security of PAS (Predicate-Based Authentication Service).
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Practical Secure Evaluation of Semi-private Functions.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
IACR Cryptology ePrint Archive, 2008

Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols.
IACR Cryptology ePrint Archive, 2008

Automatic Generation of Sound Zero-Knowledge Protocols.
IACR Cryptology ePrint Archive, 2008

A New Approach for Algebraically Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2008

Trusted Computing - Special Aspects and Challenges.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Universally Composable Security Analysis of TLS.
Proceedings of the Provable Security, Second International Conference, 2008

Property-Based TPM Virtualization.
Proceedings of the Information Security, 11th International Conference, 2008

Property-Based Attestation without a Trusted Third Party.
Proceedings of the Information Security, 11th International Conference, 2008

A Demonstrative Ad Hoc Attestation System.
Proceedings of the Information Security, 11th International Conference, 2008

Securing Peer-to-Peer Distributions for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
Proceedings of the Information Security and Cryptology, 2008

User Privacy in Transport Systems Based on RFID E-Tickets.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Improved Security Notions and Protocols for Non-transferable Identification.
Proceedings of the Computer Security, 2008

Efficient Helper Data Key Extractor on FPGAs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Flexible and secure enterprise rights management based on trusted virtual domains.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Provably secure browser-based user-aware mutual authentication over TLS.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

An efficient implementation of trusted channels based on openssl.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Proceedings of the Advances in Cryptology, 2008

2007
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
Trans. Data Hiding and Multimedia Security, 2007

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptology ePrint Archive, 2007

Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit.
Datenschutz und Datensicherheit, 2007

The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007

Combining Tardos Fingerprinting Codes and Fingercasting.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A Forensic Framework for Tracing Phishers.
Proceedings of the Future of Identity in the Information Society, 2007

A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme.
Proceedings of the INFORMATIK 2007: Informatik trifft Logistik. Band 2. Beiträge der 37. Jahrestagung der Gesellschaft für Informatik e.V. (GI), 2007

Establishing Chain of Trust in Reconfigurable Hardware.
Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines, 2007

A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Proceedings of the Financial Cryptography and Data Security, 2007

Beyond secure channels.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Reconfigurable trusted computing in hardware.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

Enhancing Grid Security Using Trusted Virtualization.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing.
Proceedings of the The Second International Conference on Availability, 2007

2006
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data.
, 2006

Linkable Democratic Group Signatures.
IACR Cryptology ePrint Archive, 2006

E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption.
Proceedings of the Information Security, 9th International Conference, 2006

Security Architecture for Device Encryption and VPN.
Proceedings of the ISSE 2006, 2006

Linkable Democratic Group Signatures.
Proceedings of the Information Security Practice and Experience, 2006

A Computational Model for Watermark Robustness.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Challenges for Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

TCG inside?: a note on TPM specification compliance.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

A protocol for property-based attestation.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

Property-Based Taming of Lying Mobile Nodes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Physical Security Bounds Against Tampering.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it.
Multimedia Syst., 2005

Towards multilaterally secure computing platforms - with open source and trusted computing.
Inf. Sec. Techn. Report, 2005

Browser Model for Security Analysis of Browser-Based Protocols.
IACR Cryptology ePrint Archive, 2005

Proving a WS-federation passive requestor profile with a browser model.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Towards Multilateral-Secure DRM Platforms.
Proceedings of the Information Security Practice and Experience, 2005

An Open Approach for Designing Secure Electronic Immobilizers.
Proceedings of the Information Security Practice and Experience, 2005

Secure Software Delivery and Installation in Embedded Systems.
Proceedings of the Information Security Practice and Experience, 2005

Property-Based Broadcast Encryption for Multi-level Security Policies.
Proceedings of the Information Security and Cryptology, 2005

A Privacy-Protecting Coupon System.
Proceedings of the Financial Cryptography and Data Security, 2005

Browser Model for Security Analysis of Browser-Based Protocols.
Proceedings of the Computer Security, 2005

Towards multilateral secure digital rights distribution infrastructures.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme.
Proceedings of the Communications and Multimedia Security, 2005

Secure Data Management in Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Property-based attestation for computing platforms: caring about properties, not mechanisms.
Proceedings of the New Security Paradigms Workshop 2004, 2004

Overcoming the obstacles of zero-knowledge watermark detection.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Enhancing Security of Computing Platforms with TC-Technology.
Proceedings of the ISSE 2004, 2004

2003
Secure fingerprinting on sound foundations.
PhD thesis, 2003

Watermark detection with zero-knowledge disclosure.
Multimedia Syst., 2003

Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Datenschutz und Datensicherheit, 2003

Taming "Trusted Platforms" by Operating System Design.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Advanced techniques for dispute resolving and authorship proofs on digital works.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Secure object identification: or: solving the Chess Grandmaster Problem.
Proceedings of the New Security Paradigms Workshop 2003, 2003

On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Electronic Payment Systems.
Proceedings of the Digital Rights Management, 2003

2002
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
IACR Cryptology ePrint Archive, 2002

Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure.
Proceedings of the 11th European Signal Processing Conference, 2002

Private Auctions with Multiple Rounds and Multiple Items.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

2001
How to Break a Semi-anonymous Fingerprinting Scheme.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Zero-Knowledge Watermark Detection and Proof of Ownership.
Proceedings of the Information Hiding, 4th International Workshop, 2001

Optimized Self-Synchronizing Mode of Operation.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Proceedings of the Advances in Cryptology, 2001

2000
Anonymous Fingerprinting with Direct Non-Repudiation.
IACR Cryptology ePrint Archive, 2000

Self-Escrowed Cash against User Blackmailing.
Proceedings of the Financial Cryptography, 2000

Anonymous Fingerprinting with Direct Non-repudiation.
Proceedings of the Advances in Cryptology, 2000

1999
Proving Ownership of Digital Content.
Proceedings of the Information Hiding, Third International Workshop, 1999

Coin-Based Anonymous Fingerprinting.
Proceedings of the Advances in Cryptology, 1999


  Loading...