Erik-Oliver Blass

Orcid: 0009-0008-2791-1564

According to our database1, Erik-Oliver Blass authored at least 60 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Forward Security with Crash Recovery for Secure Logs.
ACM Trans. Priv. Secur., 2024

2023
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network.
Proc. Priv. Enhancing Technol., January, 2023

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Private Collaborative Data Cleaning via Non-Equi PSI.
IACR Cryptol. ePrint Arch., 2022

Mixed-Technique Multi-Party Computations Composed of Two-Party Computations.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Iterative Oblivious Pseudo-Random Functions and Applications.
IACR Cryptol. ePrint Arch., 2021

SELEST: secure elevation estimation of drones using MPC.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations.
IACR Cryptol. ePrint Arch., 2020

BOREALIS: Building Block for Sealed Bid Auctions on Blockchains.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Practical Over-Threshold Multi-Party Private Set Intersection.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Forward Integrity and Crash Recovery for Secure Logs.
IACR Cryptol. ePrint Arch., 2019

Secure Computation of the k<sup>th</sup>-ranked Integer on Blockchains.
IACR Cryptol. ePrint Arch., 2019

A Privacy-Preserving Longevity Study of Tor's Hidden Services.
CoRR, 2019

2017
Secure Logging with Crash Tolerance.
IACR Cryptol. ePrint Arch., 2017

Strain: A Secure Auction for Blockchains.
IACR Cryptol. ePrint Arch., 2017

Multi-client Oblivious RAM Secure Against Malicious Servers.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Recursive Trees for Practical ORAM.
Proc. Priv. Enhancing Technol., 2015

Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists.
Proc. Priv. Enhancing Technol., 2015

Constant Communication Oblivious RAM.
IACR Cryptol. ePrint Arch., 2015

Constant Communication ORAM without Encryption.
IACR Cryptol. ePrint Arch., 2015

Oblivious Substring Search with Updates.
IACR Cryptol. ePrint Arch., 2015

Multi-User Oblivious RAM Secure Against Malicious Servers.
IACR Cryptol. ePrint Arch., 2015

BaPu: Efficient and Practical Bunching of Access Point Uplinks.
Proceedings of the Networked Systems - Third International Conference, 2015

Resizable Tree-Based Oblivious RAM.
Proceedings of the Financial Cryptography and Data Security, 2015

Constant Communication ORAM with Small Blocksize.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Authenticating Privately over Public Wi-Fi Hotspots.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Resizable Tree-Based Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Toward Robust Hidden Volumes using Write-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

Efficient Private File Retrieval by Combining ORAM and PIR.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR.
IACR Cryptol. ePrint Arch., 2013

Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists.
IACR Cryptol. ePrint Arch., 2013

PSP: Private and secure payment with RFID.
Comput. Commun., 2013

Counter-jamming using mixed mechanical and software interference cancellation.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Implementation and implications of a stealth hard-drive backdoor.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
PIRMAP: Efficient Private Information Retrieval for MapReduce.
IACR Cryptol. ePrint Arch., 2012

T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags.
IACR Cryptol. ePrint Arch., 2012

EPiC: Efficient Privacy-Preserving Counting for MapReduce.
IACR Cryptol. ePrint Arch., 2012

TRESOR-HUNT: attacking CPU-bound encryption.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011

CHECKER: On-site checking in RFID-based supply chains.
IACR Cryptol. ePrint Arch., 2011

PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptol. ePrint Arch., 2011

Demo: the f<sub>f</sub> hardware prototype for privacy-preserving RFID authentication.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Attacker Models for Wireless Sensor Networks (Angreifermodelle für drahtlose Sensornetze).
it Inf. Technol., 2010

ROTIV: RFID Ownership Transfer with Issuer Verification.
IACR Cryptol. ePrint Arch., 2010

Tracker: Security and Privacy for RFID-based Supply Chains.
IACR Cryptol. ePrint Arch., 2010

2009
A Framework for Probabilistic, Authentic Aggregation in Wireless Sensor Networks.
Prax. Inf.verarb. Kommun., 2009

PPS: Privacy Preserving Statistics using RFID Tags.
IACR Cryptol. ePrint Arch., 2009

Tailored Security and Safety for Pervasive Computing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

New Directions in RFID Security.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

2008
The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008

Analyzing Data Prediction in Wireless Sensor Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Relaxed authenticity for data aggregation in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Sicherer, aggregierender Datentransport in drahtlosen Sensornetzen.
PhD thesis, 2007

Security.
Proceedings of the Algorithms for Sensor and Ad Hoc Networks, 2007

2006
An efficient key establishment scheme for secure aggregating sensor networks.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Towards Acceptable Public-Key Encryption in Sensor Networks.
Proceedings of the Ubiquitous Computing, 2005

Effiziente Implementierung von Public-Key Algorithmen für Sensornetze.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

2004
Design of a Secure Distributed Service Directory for Wireless Sensornetworks.
Proceedings of the Wireless Sensor Networks, First European Workshop, 2004

Secure Overlay for Service Centric Wireless Sensor Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004


  Loading...