Florian Kerschbaum

According to our database1, Florian Kerschbaum authored at least 118 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Private Evaluation of Decision Trees using Sublinear Cost.
PoPETs, 2019

Secure Computation of the kth-ranked Integer on Blockchains.
IACR Cryptology ePrint Archive, 2019

Joins Over Encrypted Data with Fine Granular Security.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Attacks on Digital Watermarks for Deep Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles.
Proceedings of the IEEE, 2018

HardIDX: Practical and secure index with SGX in a malicious environment.
Journal of Computer Security, 2018

Practical and Secure Substring Search.
Proceedings of the 2018 International Conference on Management of Data, 2018

SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

Strain: A Secure Auction for Blockchains.
Proceedings of the Computer Security, 2018

2017
Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

HardIDX: Practical and Secure Index with SGX.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Privacy-Preserving Outlier Detection for Data Streams.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Selective access for supply chain management in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Encrypting Analytical Web Applications.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
ENKI: Access Control for Encrypted Query Processing.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Oblivious outsourcing of garbled circuit generation.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Privacy-Preserving Observation in Public Spaces.
Proceedings of the Computer Security - ESORICS 2015, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Frequency-Hiding Order-Preserving Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492).
Dagstuhl Reports, 2014

Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Client-Controlled Cloud Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Searchable Encryption with Secure and Efficient Updates.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Automatic Protocol Selection in Secure Two-Party Computations.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Privacy-preserving billing for e-ticketing systems in public transportation.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Secure benchmarking in the cloud.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Searching over encrypted data in cloud systems.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Automatic Protocol Selection in Secure Two-Party Computations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Expression rewriting for optimizing secure computation.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Efficient secure computation optimization.
Proceedings of the PETShop'13, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An information-flow type-system for mixed protocol secure computation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

k-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Workflow Signatures for Business Process Compliance.
IEEE Trans. Dependable Sec. Comput., 2012

Privacy-Preserving Techniques and System for Streaming Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Encryption-enforced access control for an RFID discovery service.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Collusion-resistant outsourcing of private set intersection.
Proceedings of the ACM Symposium on Applied Computing, 2012

Fault-Tolerant Privacy-Preserving Statistics.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Encrypted Searchable Storage of RFID Tracking Data.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids.
Proceedings of the International Conference on Information Systems, 2012

Outsourced private set intersection using homomorphic encryption.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Privacy-Preserving Computation - (Position Paper).
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauenswürdigen Dienstanbieter.
Wirtschaftsinformatik, 2011

Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation.
IACR Cryptology ePrint Archive, 2011

Secure collaborative supply chain planning and inverse optimization - The JELS model.
European Journal of Operational Research, 2011

Secure Collaborative Supply-Chain Management.
IEEE Computer, 2011

Secure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider.
Business & Information Systems Engineering, 2011

NAT/Firewall traversal cost model for publish-subscribe systems.
Proceedings of the ICPE'11, 2011

Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Forecasting Run-Times of Secure Two-Party Computation.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Plug-In Privacy for Smart Metering Billing.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Secure conjunctive keyword searches for unstructured text.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards Privacy-Preserving XML Transformation.
Proceedings of the IEEE International Conference on Web Services, 2011

Confidential Information-Sharing for Automated Sustainability Benchmarks.
Proceedings of the International Conference on Information Systems, 2011

Securely disseminating RFID events.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

L1 - An Intermediate Language for Mixed-Protocol Secure Computation.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Demo: secure computation in JavaScript.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Automatically optimizing secure computation.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Secure Sharing of Item-Level Data in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection.
Proceedings of the Insider Threats in Cyber Security, 2010

A privacy-preserving benchmarking platform.
PhD thesis, 2010

Privacy-preserving computation of benchmarks on item-level data using RFID.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Privacy-Preserving Outsourced Profiling.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

An access control model for mobile physical objects.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Privacy-Preserving Multi-Objective Evolutionary Algorithms.
Proceedings of the Parallel Problem Solving from Nature, 2010

Leakage Quantification of Cryptographic Operations.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Searchable Encryption for Outsourced Data Analytics.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
Optimizations for Risk-Aware Secure Supply Chain Master Planning.
J. UCS, 2009

Security architecture for virtual organizations of business web services.
Journal of Systems Architecture - Embedded Systems Design, 2009

Parallelizing secure linear programming.
Concurrency and Computation: Practice and Experience, 2009

A verifiable, centralized, coercion-free reputation system.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

RFID-based supply chain partner authentication and key agreement.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Risk-Aware Secure Supply Chain Master Planning.
Proceedings of the Security in Information Systems, 2009

On the practical importance of communication complexity for secure multi-party computation protocols.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Practical privacy-preserving protocols for criminal investigations.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Performance Comparison of Secure Comparison Protocols.
Proceedings of the Database and Expert Systems Applications, 2009

Improving Practical Performance on Secure and Private Collaborative Linear Programming.
Proceedings of the Database and Expert Systems Applications, 2009

Adapting Privacy-Preserving Computation to the Service Provider Model.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Privacy-preserving social network analysis for criminal investigations.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Privacy-preserving data analytics as an outsourced service.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security against the business partner.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Practical Privacy-Preserving Benchmarking.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Industrial Privacy in RFID-based Batch Recalls.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

Fostering the Uptake of Secure Multiparty Computation in E-Commerce.
Proceedings of the The Third International Conference on Availability, 2008

2007
Security and Trust in IT Business Outsourcing: a Manifesto.
Electr. Notes Theor. Comput. Sci., 2007

Distance-preserving pseudonymization for timestamps and spatial data.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Securing VO Management.
Proceedings of the Trust, 2007

A New Way to Think About Secure Computation: Language-based Secure Computation.
Proceedings of the Security in Information Systems, 2007

Simple cross-site attack prevention.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Privacy-preserving logical vector clocks using secure computation techniques.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Building a Privacy-Preserving Benchmarking Enterprise System.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

2006
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Practical Private Regular Expression Matching.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation.
Proceedings of the Trust Management, 4th International Conference, 2006

Filtering for Private Collaborative Benchmarking.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

From Business Process Choreography to Authorization Policies.
Proceedings of the Data and Applications Security XX, 2006

2004
Private Fingerprint Verification without Local Storage.
Proceedings of the Biometric Authentication, First International Conference, 2004

2003
Analysis of vulnerabilities in Internet firewalls.
Computers & Security, 2003

Secure and private sequence comparisons.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

2002
Using Internal Sensors and Embedded Detectors for Intrusion Detection.
Journal of Computer Security, 2002

2001
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Computers & Security, 2001

Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.
Proceedings of the Information Hiding, 4th International Workshop, 2001


  Loading...