Peter Schartner

Orcid: 0000-0002-5964-8480

According to our database1, Peter Schartner authored at least 49 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
False-Bottom Encryption: Deniable Encryption From Secret Sharing.
IEEE Access, 2023

2021
In Search of a Conversational User Interface for Personal Health Assistance.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2020
Generic Parity-Based Concurrent Error Detection for Lightweight ARX Ciphers.
IEEE Access, 2020

Smart city technology meets smart health assistive systems - on the example of the project AYUDO.
Proceedings of the PETRA '20: The 13th PErvasive Technologies Related to Assistive Environments Conference, Corfu, Greece, June 30, 2020

2019
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys.
IACR Cryptol. ePrint Arch., 2019

2018
Community-Based Security for the Internet of Things.
CoRR, 2018

Secure Data Recording and Bio-Inspired Functional Integrity for Intelligent Robots.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Guaranteeing High Availability of the "Secure Exam Environment" (SEE).
Proceedings of the 10th International Conference on Computer Supported Education, 2018

2017
Security for the Robot Operating System.
Robotics Auton. Syst., 2017

The "Secure Exam Environment": E-Testing with Students' Own Devices.
Proceedings of the Tomorrow's Learning: Involving Everyone. Learning with and about Technologies and Computing, 2017

Pathways to Successful Online Testing: eExams with the "Secure Exam Environment" (SEE).
Proceedings of the Technology Enhanced Assessment, 20th International Conference, 2017

Secure communication for the robot operating system.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

2016
On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack.
IEEE Access, 2016

Application-level security for ROS-based applications.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

2015
Private function evaluation by local two-party computation.
EURASIP J. Inf. Secur., 2015

Oblivious Lookup Tables.
CoRR, 2015

Licensed processing of encrypted information.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Hardware-Sicherheit.
Datenschutz und Datensicherheit, 2014

Chameleon-Hashing für Interaktive Beweise der Verfügbarkeit dynamischer Daten in der Cloud.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

2013
On-demand video streaming based on dynamic adaptive encrypted content chunks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Shared Crowds: A Token-Ring Approach to Hide the Receiver.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Random but System-Wide Unique Unlinkable Parameters.
J. Information Security, 2012

Secure online exams using students' devices.
Proceedings of the IEEE Global Engineering Education Conference, 2012

Effective Online Testing - Nurturing the Digital Natives.
Proceedings of the CSEDU 2012, 2012

Anonymous Communication by Branch-and-Bound.
Proceedings of the Seventh International Conference on Availability, 2012

2011
A Unified Framework for the Analysis of Availability, Reliability and Security, With Applications to Quantum Networks.
IEEE Trans. Syst. Man Cybern. Part C, 2011

Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Geheimschriften in der Praxis.
Datenschutz und Datensicherheit, 2011

Information-leakage in Hybrid Randomized Protocols.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Crowds Based on Secret-Sharing.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Building a Quantum Network: How to Optimize Security and Expenses.
J. Netw. Syst. Manag., 2010

Quantenkryptographie - Überblick und aktuelle Entwicklungen.
Datenschutz und Datensicherheit, 2010

Multipath Authentication without shared Secrets and with Applications in Quantum Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010

Non-interactive Information Reconciliation for Quantum Key Distribution.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Practical Traceable Anonymous Identification.
Proceedings of the SECRYPT 2009, 2009

Quantum Coin-Flipping-Based Authentication.
Proceedings of IEEE International Conference on Communications, 2009

How to overcome the 'Trusted Node Model' in Quantum Cryptography.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Security in Quantum Networks as an Optimization Problem.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Secure Resource Sharing in Ad hoc Networks.
Proceedings of the 2008 International Conference on Security & Management, 2008

Efficient Privacy-Enhancing Techniques for Medical Databases.
Proceedings of the Biomedical Engineering Systems and Technologies, 2008

Protecting Privacy in Medical Databases - Efficient Local Generation of System-Wide Unique Health IDs.
Proceedings of the First International Conference on Health Informatics, 2008

2007
Universally Unique Identifiers: How To Ensure Uniqueness While Protecting The Issuer's Privacy.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability.
Proceedings of the Smart Card Research and Advanced Applications, 2006

2005
Unique User-Generated Digital Pseudonyms.
Proceedings of the Computer Network Security, 2005

Key Escrow with Tree-Based Access Structure.
Proceedings of the Computer Network Security, 2005

Video Surveillance: A Distributed Approach to Protect Privacy.
Proceedings of the Communications and Multimedia Security, 2005

2003
PDA-based Signature Device.
Proceedings of the BIOSIG 2003, 2003

2002
Internetbanking - Sicherheitsaspekte und Haftungsfragen.
Datenschutz und Datensicherheit, 2002

2001
Secure Internet Phone.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001


  Loading...