Andreas Peter

Orcid: 0000-0003-2929-5001

According to our database1, Andreas Peter authored at least 73 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable Within a Designated Area.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Privacy-friendly statistical counting for pedestrian dynamics.
Comput. Commun., November, 2023

Private Sampling with Identifiable Cheaters.
Proc. Priv. Enhancing Technol., April, 2023

The statistical nature of leakage in SSE schemes and its role in passive attacks.
IACR Cryptol. ePrint Arch., 2023

LocKey: Location-Based Key Extraction from the WiFi Environment in the User's Vicinity.
Proceedings of the Information Security Practice and Experience, 2023

Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption.
IET Biom., September, 2022

DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Balancing privacy and accountability in digital payment methods using zk-SNARKs.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds.
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022

Multiplication-Free Biometric Recognition for Faster Processing under Encryption.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2022

Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Challenges in Automated Measurement of Pedestrian Dynamics.
Proceedings of the Distributed Applications and Interoperable Systems: 22nd IFIP WG 6.1 International Conference, 2022

Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Proceedings of the Applied Cryptography and Network Security, 2022

Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Proc. Priv. Enhancing Technol., 2021

Biometric Verification Secure Against Malicious Adversaries.
CoRR, 2021

A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents.
Proceedings of the 30th USENIX Security Symposium, 2021

Obfuscated Access and Search Patterns in Searchable Encryption.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption.
Proceedings of the EdgeSys@EuroSys 2021: 4th International Workshop on Edge Systems, 2021

BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Consolidation of Reward Memory during Sleep Does Not Require Dopaminergic Activation.
J. Cogn. Neurosci., 2020

A multi-authority approach to various predicate encryption types.
Des. Codes Cryptogr., 2020

Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports.
CoRR, 2020

HeadPrint: detecting anomalous communications through header-based application fingerprinting.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

k-Anonymous Crowd Flow Analytics.
Proceedings of the MobiQuitous '20: Computing, 2020

Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim's Perspective.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2019
SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities.
Proceedings of the Information Security Theory and Practice, 2019

Victim-Aware Adaptive Covert Channels.
Proceedings of the Security and Privacy in Communication Networks, 2019

BACRank: Ranking Building Automation and Control System Components by Business Continuity Impact.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Two-Client and Multi-client Functional Encryption for Set Intersection.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
uMine: a Blockchain based on Human Miners.
IACR Cryptol. ePrint Arch., 2018

Multi-client Predicate-only Encryption for Conjunctive Equality Tests.
IACR Cryptol. ePrint Arch., 2018

Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
CoRR, 2018

2017
Fast and Accurate Likelihood Ratio Based Biometric Comparison in the Encrypted Domain.
CoRR, 2017

Using Oblivious RAM in Genomic Studies.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Blurry-ORAM: A Multi-Client Oblivious Storage Architecture.
IACR Cryptol. ePrint Arch., 2016

Private Sharing of IOCs and Sightings.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Reliably determining data leakage in the presence of strong attackers.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Indicators of Malicious SSL Connections.
Proceedings of the Network and System Security - 9th International Conference, 2015

Publicly Verifiable Private Aggregation of Time-Series Data.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM.
IACR Cryptol. ePrint Arch., 2014

Privacy-Enhanced Participatory Sensing with Collusion-Resistance and Data Aggregation.
IACR Cryptol. ePrint Arch., 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
IACR Cryptol. ePrint Arch., 2014

A Survey of Provably Secure Searchable Encryption.
ACM Comput. Surv., 2014

Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

SOFIR: Securely outsourced Forensic image recognition.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Securely outsourcing computations using homomorphic encryption.
PhD thesis, 2013

Efficiently Outsourcing Multiparty Computation Under Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2013

Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013

Privacy-Preserving Verification of Clinical Research.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Efficient Privacy-Enhanced Familiarity-Based Recommender System.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Privacy-preserving architecture for forensic image recognition.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Converse PUF-Based Authentication.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
Proceedings of the Information Security - 15th International Conference, 2012

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Oblivious Outsourced Storage with Delegation.
Proceedings of the Financial Cryptography and Data Security, 2011

Analog circuit synthesis using two-port theory and genetic programming.
Proceedings of the AFRICON 2011, 2011

2010
An MRI Receiver Coil Produced by Inkjet Printing Directly on to a Flexible Substrate.
IEEE Trans. Medical Imaging, 2010

A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP.
IACR Cryptol. ePrint Arch., 2010

Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010


  Loading...