Skip to main content

PRIvacy and Security MAintaining services in the CLOUD

Deliverables

HCI Research Report

Presentation of the project's HCI Research results including final HCI guidelines.

Advanced architecture for distributed storage in dynamic environments

Design of a storage layer with increased dynamicity and additional user privacy for intra-cloud deployment.

Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing

Report describing the usage and limitations of malleable sign. to build cryptographic checks that detect non-conformance of processing and allows to honour compliant processor by keeping the authenticity verifiable on the result of the processing.

Improved guidelines and architecture for secure service composition

Improved and revised final version of report.

Security and privacy by design guidelines for PRISMACLOUD

Security and privacy by design guidelines for PRISMACLOUD

Dissemination and exploitation report 1

Summary of diss. and exploitation activities for the reporting period.

User advisory board communication summary 1

Summary of UAB establishment, first interactions, workshops.

User advisory board communication summary 2

Summary of communication activities and feedback from UAB.

Domain independent generic security models

Presents a security model indepenent for domain specific use cases.

Secure cloud usage for end user

Final report- in form of a handbook or book.

Risk and threat analysis with security requirements

Summarizes the threat and risk analysis as well as derived security requirements.

Final report on privacy and anonymisation techniques

Final report on privacy and anonymisation techn.

Analysis of the State of the Art of FPE, OPE and Tokenization schemes

A review of current solutions for FPE, OPE and Tokenization schemes.

Report on Privacy-enhancing cryptography

Final report on the advancements of privacy-enhancing cryptography.

Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

Proposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3.

Overview of functional and malleable signature schemes

Overview of state of the art malleable and functional signature schemes and their properties, such as, efficiency, privacy, and unforgeability.

Legal, social and HCI requirements

Presents and discusses the requirements that are elicited by task 1.1.

Overview of verifiable computing techniques providing private and public verification

Overview of state of the art privately and publicly verifiable computing techniques and an analysis of their properties, e.g., privacy, efficiency, and applicability.

Holistic security model for secure service composition

Holistic security model for secure service composition

Publicly verifiable computing techniques providing long-term privacy

Proposal for a publicly verifiable computing technique that provides long-term privacy.

Searching for OpenAIRE data...

Publications

Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0

Author(s): Gallego-Nicasio Crespo, Beatriz; Prieto, Elsa; Rios, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Published in: Fraunhofer FOKUS, Issue 8, 2016
DOI: 10.13140/RG.2.2.22406.37444

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Author(s): Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Published in: 2016

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Author(s): Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 1825-1842
DOI: 10.1145/3133956.3133997

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Author(s): David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
Published in: 2018, Page(s) 219-250
DOI: 10.1007/978-3-319-76578-5_8

A Linearly Homomorphic Signature Scheme from Weaker Assumptions

Author(s): Lucas Schabhüser, Johannes Buchmann, Patrick Struck
Published in: 2017, Page(s) 261-279
DOI: 10.1007/978-3-319-71045-7_14

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives

Author(s): David Derler, Sebastian Ramacher, Daniel Slamanig
Published in: 2018, Page(s) 419-440
DOI: 10.1007/978-3-319-79063-3_20

Performing Computations on Hierarchically Shared Secrets

Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in: 2018, Page(s) 141-161
DOI: 10.1007/978-3-319-89339-6_9

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: 2018, Page(s) 11-32
DOI: 10.1007/978-3-319-89339-6_2

CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case

Author(s): Lucas Schabhüser, Denis Butin, Johannes Buchmann
Published in: 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Author(s): David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Published in: 2018, Page(s) 425-455
DOI: 10.1007/978-3-319-78372-7_14

UniGuard: Protecting Unikernels Using Intel SGX

Author(s): Ioannis Sfyrakis, Thomas Gross
Published in: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Page(s) 99-105
DOI: 10.1109/IC2E.2018.00032

Function-Dependent Commitments for Verifiable Multi-Party Computation

Author(s): Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann
Published in: 2018

Protean Signature Schemes

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: 2018

Secure and Privacy-Friendly Storage and Data Processing in the Cloud

Author(s): Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini
Published in: 2017, Page(s) 153-169
DOI: 10.1007/978-3-319-92925-5_10

Highly-Efficient Fully-Anonymous Dynamic Group Signatures

Author(s): David Derler, Daniel Slamanig
Published in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Page(s) 551-565
DOI: 10.1145/3196494.3196507

Rasta: A cipher with low ANDdepth and few ANDs per bit

Author(s): Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
Published in: 2018, Page(s) 662-692
DOI: 10.1007/978-3-319-96884-1_22

CryptSDLC - Embedding Cryptographic Engineering into Secure Software Development Lifecycle

Author(s): Thomas Loruenser, Henrich C. Pöhls, Leon Sell, Thomas Laenger
Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Page(s) 1-9
DOI: 10.1145/3230833.3233765

HCI Patterns for Cryptographically Equipped Cloud Services

Author(s): Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer
Published in: 2018, Page(s) 567-586
DOI: 10.1007/978-3-319-91238-7_44

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System

Author(s): Denise Demirel, Stephan Krenn, Thomas Lorunser, Giulia Traverso
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 88-97
DOI: 10.1109/ARES.2016.88

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle

Author(s): Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 428-436
DOI: 10.1109/ARES.2016.73

Dynamic and Verifiable Hierarchical Secret Sharing

Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in: 2016, Page(s) 24-43
DOI: 10.1007/978-3-319-49175-2_2

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions

Author(s): Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Published in: 2016, Page(s) 391-408
DOI: 10.1007/978-3-319-44618-9_21

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

Author(s): Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann
Published in: 2017, Page(s) 142-160
DOI: 10.1007/978-3-319-55589-8_10

An unconditionally hiding auditing procedure for computations over distributed data

Author(s): Lucas Schabhuser, Denise Demirel, Johannes Buchmann
Published in: 2016 IEEE Conference on Communications and Network Security (CNS), 2016, Page(s) 552-560
DOI: 10.1109/CNS.2016.7860547

AS 3 : Adaptive social secret sharing for distributed storage systems

Author(s): Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 528-535
DOI: 10.1109/PST.2016.7907011

Universal Composition with Responsive Environments

Author(s): Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch
Published in: 2016, Page(s) 807-840
DOI: 10.1007/978-3-662-53890-6_27

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality

Author(s): Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 461-468
DOI: 10.1145/3052973.3053043

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing

Author(s): David Derler, Stephan Krenn, Daniel Slamanig
Published in: 2016, Page(s) 211-227
DOI: 10.1007/978-3-319-48965-0_13

Cryptographically Enforced Four-Eyes Principle

Author(s): Arne Bilzhause, Manuel Huber, Henrich C. Pohls, Kai Samelin
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 760-767
DOI: 10.1109/ARES.2016.28

Signatures for Trust and Accountability in the Cloud: A Technical and User Perspective

Author(s): Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig
Published in: 2016, Page(s) 79-96
DOI: 10.1007/978-3-319-41763-9_6

Malicious Clients in Distributed Secret Sharing Based Storage Networks

Author(s): Andreas Happe, Stephan Krenn, Thomas Lorünser
Published in: 2017, Page(s) 206-214
DOI: 10.1007/978-3-319-62033-6_23

Towards Authenticity and Privacy Preserving Accountable Workflows

Author(s): David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig
Published in: 2016, Page(s) 170-186
DOI: 10.1007/978-3-319-41763-9_12

Practical Signing-Right Revocation

Author(s): Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin
Published in: 2016, Page(s) 21-39
DOI: 10.1007/978-3-319-45572-3_2

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT

Author(s): Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin
Published in: 2016, Page(s) 197-213
DOI: 10.1007/978-3-319-50011-9_16

Efficient proactive secret sharing

Author(s): Jacqueline Brendel, Denise Demirel
Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 543-550
DOI: 10.1109/PST.2016.7907013

Formal Policy-based Provenance Audit

Author(s): Denis Butin, Denise Demirel, Johannes Buchmann
Published in: 2016, Page(s) 234-253
DOI: 10.1007/978-3-319-44524-3_14

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks (change title in the website)

Author(s): Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Published in: 2017, Page(s) 364-388
DOI: 10.1007/978-3-319-61273-7_18

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

Author(s): Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
Published in: 2016, Page(s) 191-219
DOI: 10.1007/978-3-662-53887-6_7

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures

Author(s): Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: 2017, Page(s) 152-182
DOI: 10.1007/978-3-662-54388-7_6

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

Author(s): Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti
Published in: 2016, Page(s) 115-132
DOI: 10.1007/978-3-319-44760-5_8

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Author(s): Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: 2017, Page(s) 437-452
DOI: 10.1007/978-3-319-60055-0_23

A security analysis of techniques for long-term integrity protection

Author(s): Matthias Geihs, Denise Demirel, Johannes Buchmann
Published in: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Page(s) 449-456
DOI: 10.1109/PST.2016.7906995

Accountable Redactable Signatures

Author(s): Henrich C. Pohls, Kai Samelin
Published in: 2015 10th International Conference on Availability, Reliability and Security, 2015, Page(s) 60-69
DOI: 10.1109/ARES.2015.10

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing

Author(s): Thomas Loruenser, Andreas Happe, Daniel Slamanig
Published in: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, Page(s) 371-378
DOI: 10.1109/CloudCom.2015.71

Proactive Security Analysis of Changes in Virtualized Infrastructures

Author(s): Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim
Published in: Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Page(s) 51-60
DOI: 10.1145/2818000.2818034

The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014




MoPS - A Modular Protection Scheme for Long-Term Storage

Author(s): Christian Weinert, Denise Demirel, Martín Vigil, Matthias Geihs, Johannes Buchmann
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 436-448
DOI: 10.1145/3052973.3053025

Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security

Author(s): Andreas Happe, Bob Duncan, Alfred Bratterud
Published in: Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk, 2017, Page(s) 30-41
DOI: 10.5220/0006282800300041

Enterprise IoT security and scalability - how unikernels can improve the status Quo

Author(s): Bob Duncan, Andreas Happe, Alfred Bratterud
Published in: Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16, 2016, Page(s) 292-297
DOI: 10.1145/2996890.3007875

Exchanging Database Wirtes with Modern Cryptography

Author(s): Andreas Happe, Thomas Loruneser
Published in: 2016

The Archistar Secret-Sharing Backup Proxy

Author(s): Andreas Happe, Florian Wohner and Thomas Loruenser
Published in: 2017

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

Author(s): Arne Bilzhause, Henrich C. Pöhls and Kai Samelin
Published in: 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

Author(s): Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Denise Demirel, Reza Azarderakhsh, Sheikh Mahbub Habib, Johannes A.Buchmann
Published in: 2017

Batch-verifiable Secret Sharing with Unconditional Privacy

Author(s): Stephan Krenn, Thomas Lorünser, Christoph Striecks
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 303-311
DOI: 10.5220/0006133003030311

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Author(s): David Derler, Sebastian Ramacher, Daniel Slamanig
Published in: 2017

LoT: a Reputation-based Trust System for Long-term Archiving

Author(s): Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, Max Mühlhäuser
Published in: 2016

Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario

Author(s): A. Alaqra, S. Fischer- Hübner, J.S. Pettersson and E. Wästlund
Published in: 2016

TRUSTEE – Data Privacy and Cloud Security Cluster Europe

Author(s): Justina Bieliauskaite, Agi Karyda, Stephan Krenn, Erkuden Rios, George Suciu Jr
Published in: ERCIM News, Issue No. 114, 2018, Page(s) 37, ISSN 0926-4981

PRISMACLoUD – Privacy and Security Maintaining Services in the Cloud

Author(s): Daniel Slamanig, Agi Karyda, Thomas Lorünser
Published in: ERCIM News, Issue Number 104, 2016, Page(s) 46, ISSN 0926-4981

Secure and Robust Multi-Cloud Storage for Public Sector

Author(s): Thomas Lorünser, Eva Munoz, Marco Decandia Brocca
Published in: ERCIM News, 2018, ISSN 0926-4981

Engineering Cryptography for Security and Privacy in the Cloud

Author(s): Stephan Krenn, Thomas Lorünser and Christoph Striecks
Published in: ERCIM News, Issue No. 113, 2018, ISSN 0926-4981

Practical witness encryption for algebraic languages or how to encrypt under Groth–Sahai proofs

Author(s): David Derler, Daniel Slamanig
Published in: Designs, Codes and Cryptography, 2018, ISSN 0925-1022
DOI: 10.1007/s10623-018-0460-y

Einsetzbare Kryptografie für die Cloud

Author(s): Henrich C. Pöhls, Thomas Länger
Published in: Zeitschrift für Datenrecht und informationssicherheit, 2017, ISSN 1424-9944

A New Architecture for Developing Cryptographic Cloud Services

Author(s): Thomas Lorünser (AIT Austrian Institute of Technology GmbH), Daniel Slamanig (TU Graz), Thomas Länger (University of Lausanne) and Henrich C. Pöhls (Universiy of Passau)
Published in: ERCIM News, Issue No. 106 July 2016, 2016, ISSN 0926-4981

Agile cryptographic solutions for the cloud


Published in: ISSN 0932-383X
DOI: 10.1007/s00502-017-0519-x

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.

Author(s): Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Published in: Journal of Cryptology, 2017, ISSN 0933-2790

A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions, and Novel Building Blocks

Author(s): David Derler
Published in: 2018

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

Author(s): Henrich C. Pöhls
Published in: 2018

The Wicket Problem of Privacy - Design Challenges for crypto-based solutions

Author(s): Ala Alaqra
Published in: 2018

Verifiably Encrypted Signatures: Security Revisited and a New Construction

Author(s): Christian Hanser, Max Rabkin, Dominique Schröder
Published in: Computer Security -- ESORICS 2015, 2015, Page(s) 146-164
DOI: 10.1007/978-3-319-24174-6_8

Stronger Security for Sanitizable Signatures

Author(s): Stephan Krenn, Kai Samelin, Dieter Sommer
Published in: Data Privacy Management, and Security Assurance, 2016, Page(s) 100-117
DOI: 10.1007/978-3-319-29883-2_7

Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes

Author(s): David Derler, Daniel Slamanig
Published in: Provable Security, 2015, Page(s) 455-474
DOI: 10.1007/978-3-319-26059-4_25

Privacy-Aware Authentication in the Internet of Things

Author(s): Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
Published in: Cryptology and Network Security, 2015, Page(s) 32-39
DOI: 10.1007/978-3-319-26823-1_3

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials

Author(s): David Derler, Christian Hanser, Daniel Slamanig
Published in: Cryptography and Coding, 2015, Page(s) 57-74
DOI: 10.1007/978-3-319-27239-9_4

A General Framework for Redactable Signatures and New Constructions

Author(s): David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: Information Security and Cryptology - ICISC 2015, 2016, Page(s) 3-19
DOI: 10.1007/978-3-319-30840-1_1

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability

Author(s): Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
Published in: Topics in Cryptology - CT-RSA 2016, 2016, Page(s) 127-143
DOI: 10.1007/978-3-319-29485-8_8

Cloud Security and Privacy by Design

Author(s): Thomas Lorünser, Thomas Länger, Daniel Slamanig
Published in: E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015, Page(s) 202-206
DOI: 10.1007/978-3-319-27164-4_16

Towards a New Paradigm for Privacy and Security in Cloud Services

Author(s): Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig
Published in: Cyber Security and Privacy, 2015, Page(s) 14-25
DOI: 10.1007/978-3-319-25360-2_2

Signatures and Efficient Proofs on Committed Graphs and NP-Statements

Author(s): Thomas Groß
Published in: Financial Cryptography and Data Security, 2015, Page(s) 293-314
DOI: 10.1007/978-3-662-47854-7_18

Formal Treatment of Privacy-Enhancing Credential Systems

Author(s): Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
Published in: Selected Areas in Cryptography - SAC 2015, 2016, Page(s) 3-24
DOI: 10.1007/978-3-319-31301-6_1

Securing the Internet of Things – Security and Privacy in a Hyperconnected World

Author(s): Elias Z. Tragos, Henrich C. Pöhls, Ralf C. Staudemeyer, Daniel Slamanig, Adam Kapovits, Santiago Suppan, Alexandros Fragkiadakis, Gianmarco Baldini, Ricardo Neisse, Peter Langendörfer, Zoya Dyka, Christian Wittke
Published in: Building the Hyperconnected Society, Issue 29/06/2015, 2015, Page(s) 189-219

Homomorphic Signature Schemes

Author(s): Giulia Traverso, Denise Demirel, Johannes Buchmann
Published in: SpringerBriefs in Computer Science, 2016
DOI: 10.1007/978-3-319-32115-8

Privately and Publicly Verifiable Computing Techniques

Author(s): Denise Demirel, Lucas Schabhüser, Johannes Buchmann
Published in: SpringerBriefs in Computer Science, 2017
DOI: 10.1007/978-3-319-53798-6