Florian Kerschbaum

Orcid: 0000-0003-4288-2286

Affiliations:
  • University of Waterloo, ON, Canada


According to our database1, Florian Kerschbaum authored at least 199 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge.
CoRR, 2024

2023
Differentially Private Simple Genetic Algorithms.
Proc. Priv. Enhancing Technol., October, 2023

Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates.
Proc. Priv. Enhancing Technol., October, 2023

Cryptographically Secure Private Record Linkage Using Locality-Sensitive Hashing.
Proc. VLDB Endow., 2023

Privacy-Preserving Machine Learning [Cryptography].
IEEE Secur. Priv., 2023

Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns.
IACR Cryptol. ePrint Arch., 2023

Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Universal Backdoor Attacks.
CoRR, 2023

PEPSI: Practically Efficient Private Set Intersection in the Unbalanced Setting.
CoRR, 2023

Differentially Private Data Generation with Missing Data.
CoRR, 2023

Leveraging Optimization for Adaptive Attacks on Image Watermarks.
CoRR, 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

Backdooring Textual Inversion for Concept Censorship.
CoRR, 2023

Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions.
CoRR, 2023

Pick your Poison: Undetectability versus Robustness in Data Poisoning Attacks against Deep Image Classification.
CoRR, 2023

HE is all you need: Compressing FHE Ciphertexts using Additive HE.
CoRR, 2023

PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators.
Proceedings of the 32nd USENIX Security Symposium, 2023

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Gaggle: Genetic Algorithms on the GPU using PyTorch.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Investigating Membership Inference Attacks under Data Dependencies.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Level Up: Private Non-Interactive Decision Tree Evaluation using Levelled Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Comprehension from Chaos: Towards Informed Consent for Private Computation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Computation on Encrypted Data Using Dataflow Authentication.
ACM Trans. Priv. Secur., 2022

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2022

Private Collaborative Data Cleaning via Non-Equi PSI.
IACR Cryptol. ePrint Arch., 2022

Towards Robust Dataset Learning.
CoRR, 2022

Comprehension from Chaos: What Users Understand and Expect from Private Computation.
CoRR, 2022

DP-VAE: Human-Readable Text Anonymization for Online Reviews with Differentially Private Variational Autoencoders.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization.
Proceedings of the 31st USENIX Security Symposium, 2022

Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators.
Proceedings of the 31st USENIX Security Symposium, 2022

Caring about Sharing: User Perceptions of Multiparty Data Sharing.
Proceedings of the 31st USENIX Security Symposium, 2022

SoK: How Robust is Image Classification Deep Neural Network Watermarking?
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

The Limits of Word Level Differential Privacy.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022

Equi-Joins over Encrypted Data for Series of Queries.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Mixed-Technique Multi-Party Computations Composed of Two-Party Computations.
Proceedings of the Computer Security - ESORICS 2022, 2022

Assessing Differentially Private Variational Autoencoders Under Membership Inference.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Selective MPC: Distributed Computation of Differentially Private Key-Value Statistics.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Quantifying identifiability to choose and audit epsilon in differentially private deep learning.
Proc. VLDB Endow., 2021

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2021

Iterative Oblivious Pseudo-Random Functions and Applications.
IACR Cryptol. ePrint Arch., 2021

Generalization Techniques Empirically Outperform Differential Privacy against Membership Inference.
CoRR, 2021

SoK: How Robust is Image Classification Deep Neural Network Watermarking? (Extended Version).
CoRR, 2021

Quantifying identifiability to choose and audit ε in differentially private deep learning.
CoRR, 2021

RIGA: Covert and Robust White-Box Watermarking of Deep Neural Networks.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption.
Proceedings of the 30th USENIX Security Symposium, 2021

Towards Privacy in Deep Learning.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

PCOR: Private Contextual Outlier Release via Differentially Private Search.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Obfuscated Access and Search Patterns in Searchable Encryption.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

On the Robustness of Backdoor-based Watermarking in Deep Neural Networks.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Deep Neural Network Fingerprinting by Conferrable Adversarial Examples.
Proceedings of the 9th International Conference on Learning Representations, 2021

Practical Witness-Key-Agreement for Blockchain-Based Dark Pools Financial Trading.
Proceedings of the Financial Cryptography and Data Security, 2021

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Comparing Local and Central Differential Privacy Using Membership Inference Attacks.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Differential Privacy for Directional Data.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Secure Multi-party Computation of Differentially Private Heavy Hitters.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Low-Cost Hiding of the Query Pattern.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Efficient Oblivious Database Joins.
Proc. VLDB Endow., 2020

Mind the Gap: Ceremonies for Applied Secret Sharing.
Proc. Priv. Enhancing Technol., 2020

Computation on Encrypted Data using Dataflow Authentication.
Proc. Priv. Enhancing Technol., 2020

Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations.
IACR Cryptol. ePrint Arch., 2020

Differentially Private Learning Does Not Bound Membership Inference.
CoRR, 2020

Secure Multi-party Computation of Differentially Private Median.
Proceedings of the 29th USENIX Security Symposium, 2020

SAGMA: Secure Aggregation Grouped by Multiple Attributes.
Proceedings of the 2020 International Conference on Management of Data, 2020

Secure Sublinear Time Differentially Private Median Computation.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SFour: A Protocol for Cryptographically Secure Record Linkage at Scale.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Secure Computation of the k<sup>th</sup>-Ranked Element in a Star Network.
Proceedings of the Financial Cryptography and Data Security, 2020

Differentially Private Two-Party Set Operations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

SeGShare: Secure Group File Sharing in the Cloud using Enclaves.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Non-interactive Private Decision Tree Evaluation.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Efficient Secure Computation of Order-Preserving Encryption.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

BOREALIS: Building Block for Sealed Bid Auctions on Blockchains.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Practical Over-Threshold Multi-Party Private Set Intersection.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Secure Multi-Party Functional Dependency Discovery.
Proc. VLDB Endow., 2019

Private Evaluation of Decision Trees using Sublinear Cost.
Proc. Priv. Enhancing Technol., 2019

Secure Computation of the k<sup>th</sup>-ranked Integer on Blockchains.
IACR Cryptol. ePrint Arch., 2019

Assessing differentially private deep learning with Membership Inference.
CoRR, 2019

Robust and Undetectable White-Box Watermarks for Deep Neural Networks.
CoRR, 2019

Secure Computation of the kth-Ranked Element in a Star Network.
CoRR, 2019

On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks.
CoRR, 2019

Joins Over Encrypted Data with Fine Granular Security.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Attacks on Digital Watermarks for Deep Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2019

An Efficiently Searchable Encrypted Data Structure for Range Queries.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Privacy and Integrity Considerations in Hyperconnected Autonomous Vehicles.
Proc. IEEE, 2018

HardIDX: Practical and secure index with SGX in a malicious environment.
J. Comput. Secur., 2018

Secure Range Queries for Multiple Users.
CoRR, 2018

Practical and Secure Substring Search.
Proceedings of the 2018 International Conference on Management of Data, 2018

SynTF: Synthetic and Differentially Private Term Frequency Vectors for Privacy-Preserving Text Mining.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

2017
Strain: A Secure Auction for Blockchains.
IACR Cryptol. ePrint Arch., 2017

Computation on Encrypted Data using Data Flow Authentication.
CoRR, 2017

Searchable Encryption to Reduce Encryption Degradation in Adjustably Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

HardIDX: Practical and Secure Index with SGX.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Privacy-Preserving Outlier Detection for Data Streams.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Selective access for supply chain management in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Encrypting Analytical Web Applications.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
ENKI: Access Control for Encrypted Query Processing.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Oblivious outsourcing of garbled circuit generation.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Privacy-Preserving Observation in Public Spaces.
Proceedings of the Computer Security - ESORICS 2015, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

CCSW 2015: The 7th ACM Cloud Computing Security Workshop.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Frequency-Hiding Order-Preserving Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Automatic Protocol Selection in Secure Two-Party Computations.
IACR Cryptol. ePrint Arch., 2014

The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492).
Dagstuhl Reports, 2014

Inference Control for Privacy-Preserving Genome Matching.
CoRR, 2014

Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Client-Controlled Cloud Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Searchable Encryption with Secure and Efficient Updates.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation.
IACR Cryptol. ePrint Arch., 2013

Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently.
IACR Cryptol. ePrint Arch., 2013

Secure benchmarking in the cloud.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Searching over encrypted data in cloud systems.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Expression rewriting for optimizing secure computation.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Efficient secure computation optimization.
Proceedings of the PETShop'13, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

An information-flow type-system for mixed protocol secure computation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

<i>k</i>-anonymous reputation.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Workflow Signatures for Business Process Compliance.
IEEE Trans. Dependable Secur. Comput., 2012

Privacy-Preserving Techniques and System for Streaming Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Encryption-enforced access control for an RFID discovery service.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Collusion-resistant outsourcing of private set intersection.
Proceedings of the ACM Symposium on Applied Computing, 2012

Fault-Tolerant Privacy-Preserving Statistics.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Encrypted Searchable Storage of RFID Tracking Data.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

From a Barrier to a Bridge: Data-Privacy in Deregulated Smart Grids.
Proceedings of the International Conference on Information Systems, 2012

Outsourced private set intersection using homomorphic encryption.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Privacy-Preserving Computation - (Position Paper).
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
Sicheres und nachhaltiges Benchmarking in der Cloud - Eine Mehrparteien-Cloud-Anwendung ohne vertrauenswürdigen Dienstanbieter.
Wirtschaftsinf., 2011

Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation.
IACR Cryptol. ePrint Arch., 2011

Secure collaborative supply chain planning and inverse optimization - The JELS model.
Eur. J. Oper. Res., 2011

Secure Collaborative Supply-Chain Management.
Computer, 2011

Secure and Sustainable Benchmarking in Clouds - A Multi-Party Cloud Application with an Untrusted Service Provider.
Bus. Inf. Syst. Eng., 2011

NAT/Firewall traversal cost model for publish-subscribe systems.
Proceedings of the ICPE'11, 2011

Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Forecasting Run-Times of Secure Two-Party Computation.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Plug-In Privacy for Smart Metering Billing.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Secure conjunctive keyword searches for unstructured text.
Proceedings of the 5th International Conference on Network and System Security, 2011

Towards Privacy-Preserving XML Transformation.
Proceedings of the IEEE International Conference on Web Services, 2011

Confidential Information-Sharing for Automated Sustainability Benchmarks.
Proceedings of the International Conference on Information Systems, 2011

Securely disseminating RFID events.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Demo: secure computation in JavaScript.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Automatically optimizing secure computation.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Secure Sharing of Item-Level Data in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection.
Proceedings of the Insider Threats in Cyber Security, 2010

A privacy-preserving benchmarking platform.
PhD thesis, 2010

L1 - An Intermediate Language for Mixed-Protocol Secure Computation.
IACR Cryptol. ePrint Arch., 2010

Privacy-Preserving Multi-Objective Evolutionary Algorithms.
IACR Cryptol. ePrint Arch., 2010

Privacy-preserving computation of benchmarks on item-level data using RFID.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Privacy-Preserving Outsourced Profiling.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

An access control model for mobile physical objects.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Privacy-Preserving Pattern Matching for Anomaly Detection in RFID Anti-Counterfeiting.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Leakage Quantification of Cryptographic Operations.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Searchable Encryption for Outsourced Data Analytics.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
Optimizations for Risk-Aware Secure Supply Chain Master Planning.
J. Univers. Comput. Sci., 2009

Security architecture for virtual organizations of business web services.
J. Syst. Archit., 2009

Parallelizing secure linear programming.
Concurr. Comput. Pract. Exp., 2009

A verifiable, centralized, coercion-free reputation system.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

RFID-based supply chain partner authentication and key agreement.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Risk-Aware Secure Supply Chain Master Planning.
Proceedings of the Security in Information Systems, 2009

On the practical importance of communication complexity for secure multi-party computation protocols.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Practical privacy-preserving protocols for criminal investigations.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Performance Comparison of Secure Comparison Protocols.
Proceedings of the Database and Expert Systems Applications, 2009

Improving Practical Performance on Secure and Private Collaborative Linear Programming.
Proceedings of the Database and Expert Systems Applications, 2009

Adapting Privacy-Preserving Computation to the Service Provider Model.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Building a privacy-preserving benchmarking enterprise system.
Enterp. Inf. Syst., 2008

Privacy-preserving social network analysis for criminal investigations.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Privacy-preserving data analytics as an outsourced service.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security against the business partner.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Practical Privacy-Preserving Benchmarking.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Industrial Privacy in RFID-based Batch Recalls.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

Fostering the Uptake of Secure Multiparty Computation in E-Commerce.
Proceedings of the The Third International Conference on Availability, 2008

2007
Distance-preserving pseudonymization for timestamps and spatial data.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Securing VO Management.
Proceedings of the Trust, 2007

A New Way to Think About Secure Computation: Language-based Secure Computation.
Proceedings of the Security in Information Systems, 2007

Simple cross-site attack prevention.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Privacy-preserving logical vector clocks using secure computation techniques.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

2006
Security and Trust in IT Business Outsourcing: a Manifesto.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

A comprehensive security architecture for dynamic, web service based virtual organizations for businesses.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Practical Private Regular Expression Matching.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation.
Proceedings of the Trust Management, 4th International Conference, 2006

Filtering for Private Collaborative Benchmarking.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

From Business Process Choreography to Authorization Policies.
Proceedings of the Data and Applications Security XX, 2006

2004
Private Fingerprint Verification without Local Storage.
Proceedings of the Biometric Authentication, First International Conference, 2004

2003
Analysis of vulnerabilities in Internet firewalls.
Comput. Secur., 2003

Secure and private sequence comparisons.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

2002
Using Internal Sensors and Embedded Detectors for Intrusion Detection.
J. Comput. Secur., 2002

2001
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals.
Comput. Secur., 2001

Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation.
Proceedings of the Information Hiding, 4th International Workshop, 2001


  Loading...