Michael Brenner

Orcid: 0000-0003-2690-7340

Affiliations:
  • University of Hanover, Hannover, Germany


According to our database1, Michael Brenner authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryptions.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
CloudDBGuard: A framework for encrypted data storage in NoSQL wide column stores.
Data Knowl. Eng., 2020

2019
WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse.
Proceedings of the Sicherheit 2018, 2018

WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Who Are You Now? Fading to Multiple Personas.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

2015
METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Privacy/performance trade-off in private search on bio-medical data.
Future Gener. Comput. Syst., 2014

2013
Selective cloaking: Need-to-know for location-based apps.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Caching oblivious memory access: an extension to the HCRYPT virtual machine.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Rechnen mit verschlüsselten Programmen und Daten.
PhD thesis, 2012

How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Practical Applications of Homomorphic Encryption.
Proceedings of the SECRYPT 2012, 2012

Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Fast confidential search for bio-medical data using Bloom filters and Homomorphic Cryptography.
Proceedings of the 8th IEEE International Conference on E-Science, 2012

2011
A Smart-gentry based Software System for Secret Program Execution.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Early defense: enabling attribute-based authorization in Grid firewalls.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010


  Loading...