Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

PRIvacy and Security MAintaining services in the CLOUD

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

HCI Research Report (se abrirá en una nueva ventana)

Presentation of the project's HCI Research results including final HCI guidelines.

Advanced architecture for distributed storage in dynamic environments (se abrirá en una nueva ventana)

Design of a storage layer with increased dynamicity and additional user privacy for intra-cloud deployment.

Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing (se abrirá en una nueva ventana)

Report describing the usage and limitations of malleable sign. to build cryptographic checks that detect non-conformance of processing and allows to honour compliant processor by keeping the authenticity verifiable on the result of the processing.

Improved guidelines and architecture for secure service composition (se abrirá en una nueva ventana)

Improved and revised final version of report.

Security and privacy by design guidelines for PRISMACLOUD (se abrirá en una nueva ventana)
Dissemination and exploitation report 1 (se abrirá en una nueva ventana)

Summary of diss. and exploitation activities for the reporting period.

User advisory board communication summary 1 (se abrirá en una nueva ventana)

Summary of UAB establishment, first interactions, workshops.

User advisory board communication summary 2 (se abrirá en una nueva ventana)

Summary of communication activities and feedback from UAB.

Domain independent generic security models (se abrirá en una nueva ventana)

Presents a security model indepenent for domain specific use cases.

Secure cloud usage for end user (se abrirá en una nueva ventana)

Final report- in form of a handbook or book.

Risk and threat analysis with security requirements (se abrirá en una nueva ventana)

Summarizes the threat and risk analysis as well as derived security requirements.

Final report on privacy and anonymisation techniques (se abrirá en una nueva ventana)

Final report on privacy and anonymisation techn.

Analysis of the State of the Art of FPE, OPE and Tokenization schemes (se abrirá en una nueva ventana)

A review of current solutions for FPE, OPE and Tokenization schemes.

Report on Privacy-enhancing cryptography (se abrirá en una nueva ventana)

Final report on the advancements of privacy-enhancing cryptography.

Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions (se abrirá en una nueva ventana)

Proposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3.

Overview of functional and malleable signature schemes (se abrirá en una nueva ventana)

Overview of state of the art malleable and functional signature schemes and their properties, such as, efficiency, privacy, and unforgeability.

Legal, social and HCI requirements (se abrirá en una nueva ventana)

Presents and discusses the requirements that are elicited by task 1.1.

Overview of verifiable computing techniques providing private and public verification (se abrirá en una nueva ventana)

Overview of state of the art privately and publicly verifiable computing techniques and an analysis of their properties, e.g., privacy, efficiency, and applicability.

Holistic security model for secure service composition (se abrirá en una nueva ventana)
Publicly verifiable computing techniques providing long-term privacy (se abrirá en una nueva ventana)

Proposal for a publicly verifiable computing technique that provides long-term privacy.

Publicaciones

Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0 (se abrirá en una nueva ventana)

Autores: Gallego-Nicasio Crespo, Beatriz; Prieto, Elsa; Rios, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Publicado en: Fraunhofer FOKUS, Edición 8, 2016
Editor: DPSP Cluster
DOI: 10.13140/RG.2.2.22406.37444

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Autores: Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Publicado en: 2016
Editor: DPSP Cluster

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives (se abrirá en una nueva ventana)

Autores: Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
Publicado en: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Página(s) 1825-1842, ISBN 9781-450349468
Editor: ACM Press
DOI: 10.1145/3133956.3133997

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications (se abrirá en una nueva ventana)

Autores: David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
Publicado en: 2018, Página(s) 219-250
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-76578-5_8

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More (se abrirá en una nueva ventana)

Autores: David Derler, Sebastian Ramacher, Daniel Slamanig
Publicado en: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, Página(s) 273-287, ISBN 978-1-5386-4228-3
Editor: IEEE
DOI: 10.1109/EuroSP.2018.00027

A Linearly Homomorphic Signature Scheme from Weaker Assumptions (se abrirá en una nueva ventana)

Autores: Lucas Schabhüser, Johannes Buchmann, Patrick Struck
Publicado en: 2017, Página(s) 261-279
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-71045-7_14

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives (se abrirá en una nueva ventana)

Autores: David Derler, Sebastian Ramacher, Daniel Slamanig
Publicado en: 2018, Página(s) 419-440
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-79063-3_20

Performing Computations on Hierarchically Shared Secrets (se abrirá en una nueva ventana)

Autores: Giulia Traverso, Denise Demirel, Johannes Buchmann
Publicado en: 2018, Página(s) 141-161
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-89339-6_9

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications (se abrirá en una nueva ventana)

Autores: Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Publicado en: 2018, Página(s) 11-32
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-89339-6_2

CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case

Autores: Lucas Schabhüser, Denis Butin, Johannes Buchmann
Publicado en: 2018
Editor: Springer LNCS

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange (se abrirá en una nueva ventana)

Autores: David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Publicado en: 2018, Página(s) 425-455
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-78372-7_14

UniGuard: Protecting Unikernels Using Intel SGX (se abrirá en una nueva ventana)

Autores: Ioannis Sfyrakis, Thomas Gross
Publicado en: 2018 IEEE International Conference on Cloud Engineering (IC2E), 2018, Página(s) 99-105, ISBN 978-1-5386-5008-0
Editor: IEEE
DOI: 10.1109/IC2E.2018.00032

Function-Dependent Commitments for Verifiable Multi-Party Computation

Autores: Lucas Schabhüser, Denis Butin, Denise Demirel, Johannes Buchmann
Publicado en: 2018
Editor: Springer

Protean Signature Schemes

Autores: Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Publicado en: 2018
Editor: Springer

Secure and Privacy-Friendly Storage and Data Processing in the Cloud (se abrirá en una nueva ventana)

Autores: Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini
Publicado en: 2017, Página(s) 153-169
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-92925-5_10

Highly-Efficient Fully-Anonymous Dynamic Group Signatures (se abrirá en una nueva ventana)

Autores: David Derler, Daniel Slamanig
Publicado en: Proceedings of the 2018 on Asia Conference on Computer and Communications Security - ASIACCS '18, 2018, Página(s) 551-565, ISBN 9781-450355766
Editor: ACM Press
DOI: 10.1145/3196494.3196507

A fast and resource efficient FPGA implementation of secret sharing for storage applications (se abrirá en una nueva ventana)

Autores: Jakob Stangl, Thomas Lorunser, Sai Manoj Pudukotai Dinakarrao
Publicado en: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Página(s) 654-659, ISBN 978-3-9819263-0-9
Editor: IEEE
DOI: 10.23919/DATE.2018.8342091

Rasta: A cipher with low ANDdepth and few ANDs per bit (se abrirá en una nueva ventana)

Autores: Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger
Publicado en: 2018, Página(s) 662-692
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_22

CryptSDLC - Embedding Cryptographic Engineering into Secure Software Development Lifecycle (se abrirá en una nueva ventana)

Autores: Thomas Loruenser, Henrich C. Pöhls, Leon Sell, Thomas Laenger
Publicado en: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, 2018, Página(s) 1-9, ISBN 9781450364485
Editor: ACM Press
DOI: 10.1145/3230833.3233765

HCI Patterns for Cryptographically Equipped Cloud Services (se abrirá en una nueva ventana)

Autores: Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer
Publicado en: 2018, Página(s) 567-586
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-91238-7_44

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System (se abrirá en una nueva ventana)

Autores: Denise Demirel, Stephan Krenn, Thomas Lorunser, Giulia Traverso
Publicado en: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Página(s) 88-97, ISBN 978-1-5090-0990-9
Editor: IEEE
DOI: 10.1109/ARES.2016.88

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle (se abrirá en una nueva ventana)

Autores: Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless
Publicado en: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Página(s) 428-436, ISBN 978-1-5090-0990-9
Editor: IEEE
DOI: 10.1109/ARES.2016.73

Dynamic and Verifiable Hierarchical Secret Sharing (se abrirá en una nueva ventana)

Autores: Giulia Traverso, Denise Demirel, Johannes Buchmann
Publicado en: 2016, Página(s) 24-43
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-49175-2_2

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions (se abrirá en una nueva ventana)

Autores: Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig
Publicado en: 2016, Página(s) 391-408
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-44618-9_21

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability (se abrirá en una nueva ventana)

Autores: Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann
Publicado en: 2017, Página(s) 142-160
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-55589-8_10

An unconditionally hiding auditing procedure for computations over distributed data (se abrirá en una nueva ventana)

Autores: Lucas Schabhuser, Denise Demirel, Johannes Buchmann
Publicado en: 2016 IEEE Conference on Communications and Network Security (CNS), 2016, Página(s) 552-560, ISBN 978-1-5090-3065-1
Editor: IEEE
DOI: 10.1109/CNS.2016.7860547

AS 3 : Adaptive social secret sharing for distributed storage systems (se abrirá en una nueva ventana)

Autores: Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann
Publicado en: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Página(s) 528-535, ISBN 978-1-5090-4379-8
Editor: IEEE
DOI: 10.1109/PST.2016.7907011

Universal Composition with Responsive Environments (se abrirá en una nueva ventana)

Autores: Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch
Publicado en: 2016, Página(s) 807-840
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53890-6_27

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (se abrirá en una nueva ventana)

Autores: Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
Publicado en: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Página(s) 461-468, ISBN 9781-450349444
Editor: ACM Press
DOI: 10.1145/3052973.3053043

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing (se abrirá en una nueva ventana)

Autores: David Derler, Stephan Krenn, Daniel Slamanig
Publicado en: 2016, Página(s) 211-227
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-48965-0_13

Cryptographically Enforced Four-Eyes Principle (se abrirá en una nueva ventana)

Autores: Arne Bilzhause, Manuel Huber, Henrich C. Pohls, Kai Samelin
Publicado en: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Página(s) 760-767, ISBN 978-1-5090-0990-9
Editor: IEEE
DOI: 10.1109/ARES.2016.28

Signatures for Trust and Accountability in the Cloud: A Technical and User Perspective (se abrirá en una nueva ventana)

Autores: Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig
Publicado en: 2016, Página(s) 79-96
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-41763-9_6

Malicious Clients in Distributed Secret Sharing Based Storage Networks (se abrirá en una nueva ventana)

Autores: Andreas Happe, Stephan Krenn, Thomas Lorünser
Publicado en: 2017, Página(s) 206-214
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-62033-6_23

Towards Authenticity and Privacy Preserving Accountable Workflows (se abrirá en una nueva ventana)

Autores: David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig
Publicado en: 2016, Página(s) 170-186
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-41763-9_12

Practical Signing-Right Revocation (se abrirá en una nueva ventana)

Autores: Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin
Publicado en: 2016, Página(s) 21-39
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45572-3_2

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT (se abrirá en una nueva ventana)

Autores: Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin
Publicado en: 2016, Página(s) 197-213
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-50011-9_16

Efficient proactive secret sharing (se abrirá en una nueva ventana)

Autores: Jacqueline Brendel, Denise Demirel
Publicado en: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Página(s) 543-550, ISBN 978-1-5090-4379-8
Editor: IEEE
DOI: 10.1109/PST.2016.7907013

Formal Policy-based Provenance Audit (se abrirá en una nueva ventana)

Autores: Denis Butin, Denise Demirel, Johannes Buchmann
Publicado en: 2016, Página(s) 234-253
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-44524-3_14

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks (change title in the website) (se abrirá en una nueva ventana)

Autores: Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
Publicado en: 2017, Página(s) 364-388
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-61273-7_18

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity (se abrirá en una nueva ventana)

Autores: Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen
Publicado en: 2016, Página(s) 191-219
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53887-6_7

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures (se abrirá en una nueva ventana)

Autores: Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Publicado en: 2017, Página(s) 152-182
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-54388-7_6

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds (se abrirá en una nueva ventana)

Autores: Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti
Publicado en: 2016, Página(s) 115-132
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-44760-5_8

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures (se abrirá en una nueva ventana)

Autores: Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Publicado en: 2017, Página(s) 437-452
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-60055-0_23

A security analysis of techniques for long-term integrity protection (se abrirá en una nueva ventana)

Autores: Matthias Geihs, Denise Demirel, Johannes Buchmann
Publicado en: 2016 14th Annual Conference on Privacy, Security and Trust (PST), 2016, Página(s) 449-456, ISBN 978-1-5090-4379-8
Editor: IEEE
DOI: 10.1109/PST.2016.7906995

Accountable Redactable Signatures (se abrirá en una nueva ventana)

Autores: Henrich C. Pohls, Kai Samelin
Publicado en: 2015 10th International Conference on Availability, Reliability and Security, 2015, Página(s) 60-69, ISBN 978-1-4673-6590-1
Editor: IEEE
DOI: 10.1109/ARES.2015.10

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing (se abrirá en una nueva ventana)

Autores: Thomas Loruenser, Andreas Happe, Daniel Slamanig
Publicado en: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), 2015, Página(s) 371-378, ISBN 978-1-4673-9560-1
Editor: IEEE
DOI: 10.1109/CloudCom.2015.71

Proactive Security Analysis of Changes in Virtualized Infrastructures (se abrirá en una nueva ventana)

Autores: Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim
Publicado en: Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Página(s) 51-60, ISBN 9781-450336826
Editor: ACM Press
DOI: 10.1145/2818000.2818034

The legal status of malleable- and functional signatures in light of Regulation (EU) No 910/2014

Autores: F.W.J. van Geelkerken and H. C. Pöhls and S. Fischer-Hübner
Publicado en: "Proceedings of the 3rd International Academic Conference of Young Scientists ""Law & Psychology 2015"" (LPS-2015)", Edición 5th Edition, yearly, November 26–28, 2015, 2015, Página(s) 404-410, ISBN 978-617-607-856-2
Editor: Lviv polytechn. publ. house

MoPS - A Modular Protection Scheme for Long-Term Storage (se abrirá en una nueva ventana)

Autores: Christian Weinert, Denise Demirel, Martín Vigil, Matthias Geihs, Johannes Buchmann
Publicado en: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Página(s) 436-448, ISBN 9781-450349444
Editor: ACM Press
DOI: 10.1145/3052973.3053025

Unikernels for Cloud Architectures: How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud Security (se abrirá en una nueva ventana)

Autores: Andreas Happe, Bob Duncan, Alfred Bratterud
Publicado en: Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk, 2017, Página(s) 30-41, ISBN 978-989-758-244-8
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006282800300041

Enterprise IoT security and scalability - how unikernels can improve the status Quo (se abrirá en una nueva ventana)

Autores: Bob Duncan, Andreas Happe, Alfred Bratterud
Publicado en: Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16, 2016, Página(s) 292-297, ISBN 9781-450346160
Editor: ACM Press
DOI: 10.1145/2996890.3007875

Exchanging Database Wirtes with Modern Cryptography

Autores: Andreas Happe, Thomas Loruneser
Publicado en: 2016
Editor: IARIA

The Archistar Secret-Sharing Backup Proxy

Autores: Andreas Happe, Florian Wohner and Thomas Loruenser
Publicado en: 2017
Editor: ACM

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures

Autores: Arne Bilzhause, Henrich C. Pöhls and Kai Samelin
Publicado en: 2017
Editor: ACM

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems

Autores: Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Denise Demirel, Reza Azarderakhsh, Sheikh Mahbub Habib, Johannes A.Buchmann
Publicado en: 2017
Editor: IEEE

Batch-verifiable Secret Sharing with Unconditional Privacy (se abrirá en una nueva ventana)

Autores: Stephan Krenn, Thomas Lorünser, Christoph Striecks
Publicado en: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Página(s) 303-311, ISBN 978-989-758-209-7
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0006133003030311

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Autores: David Derler, Sebastian Ramacher, Daniel Slamanig
Publicado en: 2017
Editor: Springer

LoT: a Reputation-based Trust System for Long-term Archiving

Autores: Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, Max Mühlhäuser
Publicado en: 2016
Editor: IARIA

Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario

Autores: A. Alaqra, S. Fischer- Hübner, J.S. Pettersson and E. Wästlund
Publicado en: 2016
Editor: Plymouth University

TRUSTEE – Data Privacy and Cloud Security Cluster Europe

Autores: Justina Bieliauskaite, Agi Karyda, Stephan Krenn, Erkuden Rios, George Suciu Jr
Publicado en: ERCIM News, Edición No. 114, 2018, Página(s) 37, ISSN 0926-4981
Editor: ERCIM EEIG

PRISMACLoUD – Privacy and Security Maintaining Services in the Cloud

Autores: Daniel Slamanig, Agi Karyda, Thomas Lorünser
Publicado en: ERCIM News, Edición Number 104, 2016, Página(s) 46, ISSN 0926-4981
Editor: ERCIM EEIG

Secure and Robust Multi-Cloud Storage for Public Sector

Autores: Thomas Lorünser, Eva Munoz, Marco Decandia Brocca
Publicado en: ERCIM News, 2018, ISSN 0926-4981
Editor: ERCIM EEIG

Engineering Cryptography for Security and Privacy in the Cloud

Autores: Stephan Krenn, Thomas Lorünser and Christoph Striecks
Publicado en: ERCIM News, Edición No. 113, 2018, ISSN 0926-4981
Editor: ERCIM EEIG

Practical witness encryption for algebraic languages or how to encrypt under Groth–Sahai proofs (se abrirá en una nueva ventana)

Autores: David Derler, Daniel Slamanig
Publicado en: Designs, Codes and Cryptography, 2018, ISSN 0925-1022
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10623-018-0460-y

Einsetzbare Kryptografie für die Cloud

Autores: Henrich C. Pöhls, Thomas Länger
Publicado en: Zeitschrift für Datenrecht und informationssicherheit, 2017, ISSN 1424-9944
Editor: Digma

A New Architecture for Developing Cryptographic Cloud Services

Autores: Thomas Lorünser (AIT Austrian Institute of Technology GmbH), Daniel Slamanig (TU Graz), Thomas Länger (University of Lausanne) and Henrich C. Pöhls (Universiy of Passau)
Publicado en: ERCIM News, Edición No. 106 July 2016, 2016, ISSN 0926-4981
Editor: ERCIM EEIG

Agile cryptographic solutions for the cloud (se abrirá en una nueva ventana)

Autores: Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger
Publicado en: e & i Elektrotechnik und Informationstechnik, 2017, ISSN 0932-383X
Editor: Springer Verlag
DOI: 10.1007/s00502-017-0519-x

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.

Autores: Georg Fuchsbauer, Christian Hanser, Daniel Slamanig
Publicado en: Journal of Cryptology, 2017, ISSN 0933-2790
Editor: Springer Verlag

A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions, and Novel Building Blocks

Autores: David Derler
Publicado en: 2018
Editor: Technischen Universitat Graz

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

Autores: Henrich C. Pöhls
Publicado en: 2018
Editor: University of Passau

The Wicket Problem of Privacy - Design Challenges for crypto-based solutions

Autores: Ala Alaqra
Publicado en: 2018
Editor: Karlstads Universitet

Verifiably Encrypted Signatures: Security Revisited and a New Construction (se abrirá en una nueva ventana)

Autores: Christian Hanser, Max Rabkin, Dominique Schröder
Publicado en: Computer Security -- ESORICS 2015, 2015, Página(s) 146-164, ISBN 978-3-319-24174-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-24174-6_8

Stronger Security for Sanitizable Signatures (se abrirá en una nueva ventana)

Autores: Stephan Krenn, Kai Samelin, Dieter Sommer
Publicado en: Data Privacy Management, and Security Assurance, 2016, Página(s) 100-117, ISBN 978-3-319-29883-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-29883-2_7

Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes (se abrirá en una nueva ventana)

Autores: David Derler, Daniel Slamanig
Publicado en: Provable Security, 2015, Página(s) 455-474, ISBN 978-3-319-26059-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-26059-4_25

Privacy-Aware Authentication in the Internet of Things (se abrirá en una nueva ventana)

Autores: Hannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
Publicado en: Cryptology and Network Security, 2015, Página(s) 32-39, ISBN 978-3-319-26823-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-26823-1_3

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials (se abrirá en una nueva ventana)

Autores: David Derler, Christian Hanser, Daniel Slamanig
Publicado en: Cryptography and Coding, 2015, Página(s) 57-74, ISBN 978-3-319-27239-9
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-27239-9_4

A General Framework for Redactable Signatures and New Constructions (se abrirá en una nueva ventana)

Autores: David Derler, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Publicado en: Information Security and Cryptology - ICISC 2015, 2016, Página(s) 3-19, ISBN 978-3-319-30840-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-30840-1_1

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability (se abrirá en una nueva ventana)

Autores: Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer
Publicado en: Topics in Cryptology - CT-RSA 2016, 2016, Página(s) 127-143, ISBN 978-3-319-29485-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-29485-8_8

Cloud Security and Privacy by Design (se abrirá en una nueva ventana)

Autores: Thomas Lorünser, Thomas Länger, Daniel Slamanig
Publicado en: E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015, Página(s) 202-206, ISBN 978-3-319-27164-4
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-27164-4_16

Towards a New Paradigm for Privacy and Security in Cloud Services (se abrirá en una nueva ventana)

Autores: Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig
Publicado en: Cyber Security and Privacy, 2015, Página(s) 14-25, ISBN 978-3-319-25360-2
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-25360-2_2

Signatures and Efficient Proofs on Committed Graphs and NP-Statements (se abrirá en una nueva ventana)

Autores: Thomas Groß
Publicado en: Financial Cryptography and Data Security, 2015, Página(s) 293-314, ISBN 978-3-662-47854-7
Editor: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-47854-7_18

Formal Treatment of Privacy-Enhancing Credential Systems (se abrirá en una nueva ventana)

Autores: Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen
Publicado en: Selected Areas in Cryptography - SAC 2015, 2016, Página(s) 3-24, ISBN 978-3-319-31301-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-31301-6_1

Securing the Internet of Things – Security and Privacy in a Hyperconnected World

Autores: Elias Z. Tragos, Henrich C. Pöhls, Ralf C. Staudemeyer, Daniel Slamanig, Adam Kapovits, Santiago Suppan, Alexandros Fragkiadakis, Gianmarco Baldini, Ricardo Neisse, Peter Langendörfer, Zoya Dyka, Christian Wittke
Publicado en: Building the Hyperconnected Society, Edición 29/06/2015, 2015, Página(s) 189-219, ISBN 978-87-93237-99-5
Editor: River Publishers

Homomorphic Signature Schemes (se abrirá en una nueva ventana)

Autores: Giulia Traverso, Denise Demirel, Johannes Buchmann
Publicado en: SpringerBriefs in Computer Science, 2016, ISBN 978-3-319-32115-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-32115-8

Privately and Publicly Verifiable Computing Techniques (se abrirá en una nueva ventana)

Autores: Denise Demirel, Lucas Schabhüser, Johannes Buchmann
Publicado en: SpringerBriefs in Computer Science, 2017, ISBN 978-3-319-53798-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-53798-6

Derechos de propiedad intelectual

Verfahren zu Prüfung der Verfügbarkeit und Integrität eines auf einer Anzahl von über ein Netzwerk miteinander verbundenen Servern

Número de solicitud/publicación: A50710 2016
Fecha: 2016-08-04
Solicitante(s): AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH

Verfahren zur Erstellung und Verteilung von kryptographischen Schlüsseln

Número de solicitud/publicación: AT 502802017
Fecha: 2017-04-05
Solicitante(s): AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0