According to our database1, Henning Perl
Legend:Book In proceedings Article PhD thesis Other
Security and Data Analysis - Three Case Studies.
PhD thesis, 2017
SoK: Secure Messaging.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Privacy/performance trade-off in private search on bio-medical data.
Future Generation Comp. Syst., 2014
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores.
Proceedings of the Financial Cryptography and Data Security, 2014
Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Rethinking SSL development in an appified world.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Practical Applications of Homomorphic Encryption.
Proceedings of the SECRYPT 2012, 2012
Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography.
Proceedings of the 8th IEEE International Conference on E-Science, 2012
Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011