Sebastian Meiser

Affiliations:
  • VISA Research
  • University College London, UK (former)
  • Saarland University (former)


According to our database1, Sebastian Meiser authored at least 25 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation.
CoRR, 2023

"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality.
CoRR, 2023

2022
"Tell me, how do you know it's me?" Expectations of security and personalization measures for smart speaker applications.
CoRR, 2022

Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale.
CoRR, 2022

2021
Divide and Funnel: a Scaling Technique for Mix-Networks.
IACR Cryptol. ePrint Arch., 2021

2020
Comprehensive Anonymity Trilemma: User Coordination is not enough.
Proc. Priv. Enhancing Technol., 2020

2019
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy.
Proc. Priv. Enhancing Technol., 2019

2018
Delegatable functional signatures.
IET Inf. Secur., 2018

Approximate and Probabilistic Differential Privacy Definitions.
IACR Cryptol. ePrint Arch., 2018

PrivacyBuDe: Privacy Buckets Demo Tight Differential Privacy Guarantees made Simple.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Quantitative anonymity guarantees for Tor.
PhD thesis, 2017

Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
IACR Cryptol. ePrint Arch., 2017

Ratio Buckets: A Numeric Method for r-Fold Tight Differential Privacy.
IACR Cryptol. ePrint Arch., 2017

The Loopix Anonymity System.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Proc. Priv. Enhancing Technol., 2016

AnoA: A Framework for Analyzing Anonymous Communication Protocols.
J. Priv. Confidentiality, 2016

Delegatable Functional Signatures.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
IACR Cryptol. ePrint Arch., 2014

Operational Signature Schemes.
IACR Cryptol. ePrint Arch., 2014

2013
Highly Controlled, Fine-grained Delegation of Signing Capabilities.
IACR Cryptol. ePrint Arch., 2013

Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013

2012
Differentially Private Smart Metering with Battery Recharging.
IACR Cryptol. ePrint Arch., 2012


  Loading...