Klaus Kursawe

According to our database1, Klaus Kursawe authored at least 41 papers between 2000 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Wendy Grows Up: More Order Fairness.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

2020
Wendy, the Good Little Fairness Widget.
IACR Cryptol. ePrint Arch., 2020

Wendy, the Good Little Fairness Widget: Achieving Order Fairness for Blockchains.
Proceedings of the AFT '20: 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
A Dinosaurs view on Blockchains.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Securing Industrial Control Systems.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2015
Structural Weaknesses in the Open Smart Grid Protocol.
IACR Cryptol. ePrint Arch., 2015

2014
Forward-Secure Distributed Encryption.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Second Smart Energy Grid Security Workshop (SEGS 2014).
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Smart energy grid security workshop (SEGS'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Implementation of privacy-friendly aggregation for the smart grid.
Proceedings of the SEGS'13, 2013

2011
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511).
Dagstuhl Reports, 2011

Privacy-Friendly Aggregation for the Smart-Grid.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2009
Revocation of TPM Keys.
Proceedings of the Trusted Computing, 2009

Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Flexible muTPMs through disembedding.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Privacy-Preserving Matching of DNA Profiles.
IACR Cryptol. ePrint Arch., 2008

Trust in Consumer Electronics.
Proceedings of the ISSE 2008, 2008

2007
Computing under occupation.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

Rights Management Technologies: A Good Choice for Securing Electronic Health Records?
Proceedings of the ISSE/SECURE 2007, 2007

Intrinsic Physical Unclonable Functions in Field Programmable Gate Arrays.
Proceedings of the ISSE/SECURE 2007, 2007

Trusted Platforms.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Personal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Security in Next Generation Consumer Electronic Devices.
Proceedings of the ISSE 2006, 2006

Private Policy Negotiation.
Proceedings of the Financial Cryptography and Data Security, 2006

Graceful infringement reactions in DRM systems.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

2005
Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography.
J. Cryptol., 2005

Trusted Computing, or the Gatekeeper.
Proceedings of the Information Society: Emerging Landscapes, 2005

Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Personal Rights Management- Enabling Privacy Rights in Digital Online Content.
Proceedings of the Communications and Multimedia Security, 2005

Secure Data Management in Trusted Computing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2004
Trusted Computing and its Applications: An Overview.
Proceedings of the ISSE 2004, 2004

2003
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
IEEE Distributed Syst. Online, 2003

PoDSy 2003: Principles of Dependable Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems.
IACR Cryptol. ePrint Arch., 2002

Exploring Unknown Environments with Obstacles.
Algorithmica, 2002

Asynchronous Byzantine Group Communication.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Optimistic Byzantine Agreement.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

2001
Distributed trust.
PhD thesis, 2001

Optimistic Asynchronous Atomic Broadcast.
IACR Cryptol. ePrint Arch., 2001

Secure and Efficient Asynchronous Broadcast Protocols.
IACR Cryptol. ePrint Arch., 2001

2000
Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000


  Loading...