Alexander Marsalek

According to our database1, Alexander Marsalek authored at least 20 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Total Eclipse of the Heart - Disrupting the InterPlanetary File System.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Compressing the Bitcoin Blockchain using Incremental Snapshots.
Proceedings of the 20th IEEE International Conference on Trust, 2021

White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Efficient Revocable Attribute-Based Encryption with Hidden Policies.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

This Selfie Does Not Exist: On the Security of Electroneum Cloud Mining.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Tackling Data Inefficiency: Compressing the Bitcoin Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Correctable Public Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2018
A Security Analysis of FirstCoin.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
WebRTC: your privacy is at risk.
Proceedings of the Symposium on Applied Computing, 2017

Leveraging the adoption of electronic identities and electronic-signature solutions in Europe.
Proceedings of the Symposium on Applied Computing, 2017

Structuring the Scope: Enabling adaptive and multilateral authorization management.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Balancing Utility and Security: Securing Cloud Federations of Public Entities.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Emulating U2F authenticator devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2014
Android encryption systems.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2011
Android Market Analysis with Activation Patterns.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

Android Security Permissions - Can We Trust Them?
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011


  Loading...