Skip to main content
European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Privacy-preserving Services On The Internet

Publications

Linear-Complexity Private Function Evaluation is Practical

Auteurs: Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
Publié dans: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Numéro 12309, 2020, Page(s) 401-420, ISBN 978-3-030-59012-3
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-59013-0_20

Griffin: Towards Mixed Multi-Key Homomorphic Encryption

Auteurs: Thomas Schneider, Hossein Yalame, Michael Yonli
Publié dans: 20. International Conference on Security and Cryptography (SECRYPT'23), 2023
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012090200003555

Engineering Privacy-Preserving Machine Learning Protocols

Auteurs: Thomas Schneider
Publié dans: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Page(s) 3-4, ISBN 9781450380881
Éditeur: ACM
DOI: 10.1145/3411501.3418607

Offline Model Guard: Secure and Private ML on Mobile Devices

Auteurs: Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert
Publié dans: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, Page(s) 460-465, ISBN 978-3-9819263-4-7
Éditeur: IEEE
DOI: 10.23919/date48585.2020.9116560

FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation

Auteurs: Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
Publié dans: 18. ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), 2023
Éditeur: ACM
DOI: 10.1145/3579856.3590340

Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies

Auteurs: Amos Treiber, Dirk Mullmann, Thomas Schneider, Indra Spiecker genannt Dohmann
Publié dans: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Éditeur: ACM

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation

Auteurs: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publié dans: 14. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), 2022, Page(s) 147-157, ISBN 978-1-6654-1357-2
Éditeur: IEEE
DOI: 10.1109/host49136.2021.9702293

GPU-accelerated PIR with client-independent preprocessing for large-scale applications

Auteurs: Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
Publié dans: USENIX Security Symposium (USENIX Security'22), Numéro 31, 2022
Éditeur: USENIX

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation

Auteurs: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publié dans: USENIX Security Symposium (USENIX Security'21), Numéro 30, 2021, Page(s) 2165-2182
Éditeur: USENIX

SafeFL: MPC-friendly framework for Private and Robust Federated Learning

Auteurs: Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Publié dans: 6. Deep Learning Security and Privacy Workshop (DLSP'23), 2023
Éditeur: IEEE

CryptoSPN: Privacy-preserving Sum-Product Network Inference

Auteurs: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Publié dans: 24. European Conference on Artificial Intelligence (ECAI'20), 2020, Page(s) 1946-1953
Éditeur: IOS Press
DOI: 10.3233/faia200313

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop

Auteurs: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Publié dans: USENIX Security Symposium (USENIX Security'21), Numéro 30, 2021, Page(s) 3577-3594
Éditeur: USENIX

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation

Auteurs: Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
Publié dans: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Page(s) 173-184, ISBN 978-989-758-524-1
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010547801730184

SAFE: A Secure and Efficient Long-Term Distributed Storage System

Auteurs: Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Agnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
Publié dans: 8. ACM International Workshop on Security in Blockchain and Cloud Computing (SBC@ASIACCS'20), 2020, Page(s) 8-13
Éditeur: ACM
DOI: 10.1145/3384942.3406868

FAPRIL: Towards faster privacy-preserving fingerprint-based localization

Auteurs: Christopher van der Beets, Raine Nieminen, Thomas Schneider
Publié dans: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Éditeur: SCITEPRESS - Science and Technology Publications

VASA: Vector AES Instructions for Security Applications

Auteurs: Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
Publié dans: Annual Computer Security Applications Conference (ACSAC'21), Numéro 37, 2021, Page(s) 131-145
Éditeur: ACM
DOI: 10.1145/3485832.3485897

FLAME: Taming backdoors in federated learning

Auteurs: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
Publié dans: USENIX Security Symposium (USENIX Security'22), Numéro 31, 2022
Éditeur: USENIX

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers

Auteurs: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Publié dans: Proceedings 2021 Network and Distributed System Security Symposium, 2021, ISBN 1-891562-66-5
Éditeur: Internet Society
DOI: 10.14722/ndss.2021.23159

SAFELearn: Secure Aggregation for private FEderated Learning

Auteurs: Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Mollering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
Publié dans: 2021 IEEE Security and Privacy Workshops (SPW), 2021, Page(s) 56-62, ISBN 978-1-6654-3732-5
Éditeur: IEEE
DOI: 10.1109/spw53761.2021.00017

ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships

Auteurs: Thomas Reinhold, Philipp Kuhn, Daniel Gunther, Thomas Schneider, Christian Reuter
Publié dans: IEEE Transactions on Technology and Society, 2023
Éditeur: IEEE
DOI: 10.1109/tts.2023.3280356

PEA: Practical Private Epistasis Analysis using MPC

Auteurs: Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
Publié dans: 27. European Symposium on Research in Computer Security (ESORICS'22), 2022
Éditeur: Springer

CryptoSPN - Expanding PPML beyond Neural Networks

Auteurs: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Publié dans: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Page(s) 9-14, ISBN 9781450380881
Éditeur: ACM
DOI: 10.1145/3411501.3419417

Secure Two-Party Computation in a Quantum World

Auteurs: Niklas Buscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Kramer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
Publié dans: 18. International Conference on Applied Cryptography and Network Security (ACNS'20), 2020, Page(s) 461-480, ISBN 978-3-030-57878-7
Éditeur: Springer
DOI: 10.1007/978-3-030-57808-4_23

Comparison-based MPC in star topology

Auteurs: Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
Publié dans: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Éditeur: SCITEPRESS - Science and Technology Publications

FLUTE: Fast and Secure Lookup Table Evaluations

Auteurs: Andreas Bruggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
Publié dans: 44. IEEE Symposium on Security and Privacy (S&P'23), 2023
Éditeur: IEEE
DOI: 10.1109/sp46215.2023.00157

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation

Auteurs: Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
Publié dans: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Page(s) 444-451, ISBN 978-989-758-524-1
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010540504440451

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation

Auteurs: Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel
Publié dans: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Numéro 12579, 2020, Page(s) 505-525, ISBN 978-3-030-65410-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-65411-5_25

Secure Maximum Weight Matching Approximation on General Graphs

Auteurs: Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
Publié dans: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Éditeur: ACM

SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data

Auteurs: Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
Publié dans: European Symposium on Security and Privacy (EuroS&P'22), Numéro 7, 2022
Éditeur: IEEE

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference

Auteurs: Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
Publié dans: 15. International Conference on Availability, Reliability and Security (ARES'20), 2020
Éditeur: ACM
DOI: 10.1145/3411501.3419425

Privacy-preserving Density-based Clustering

Auteurs: Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
Publié dans: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, Page(s) 658-671, ISBN 9781450382878
Éditeur: ACM
DOI: 10.1145/3433210.3453104

LLVM-Based Circuit Compilation for Practical Secure Computation

Auteurs: Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
Publié dans: Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II, Numéro 12727, 2021, Page(s) 99-121, ISBN 978-3-030-78374-7
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-78375-4_5

Privacy-preserving epidemiological modeling on mobile graphs

Auteurs: Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
Publié dans: 2020
Éditeur: Cryptology ePrint Archive

AirCollect - efficiently recovering hashed phone numbers leaked via Apple AirDrop

Auteurs: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Publié dans: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Page(s) 371-373, ISBN 9781450383493
Éditeur: ACM
DOI: 10.1145/3448300.3468252

Trustworthy AI Inference Systems: An Industry Research View

Auteurs: Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Agnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hoss
Publié dans: 2020
Éditeur: arXiv

HyFL: A Hybrid Approach For Private Federated Learning

Auteurs: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame
Publié dans: 2023
Éditeur: arXiv
DOI: 10.48550/arxiv.2302.09904

SPIKE: Secure and Private Investigation of the Kidney Exchange problem

Auteurs: Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider
Publié dans: 2022
Éditeur: arXiv
DOI: 10.48550/arxiv.2204.09937

Scaling Mobile Private Contact Discovery to Billions of Users

Auteurs: Laura Hetz, Thomas Schneider, Christian Weinert
Publié dans: 2023
Éditeur: Cryptology ePrint Archive

Improved Universal Circuits using Lookup Tables

Auteurs: Yann Disser, Daniel Gunther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
Publié dans: 2022
Éditeur: Cryptology ePrint Archive

Efficient and Scalable Universal Circuits

Auteurs: Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
Publié dans: Journal of Cryptology, Numéro 33/3, 2020, Page(s) 1216-1271, ISSN 0933-2790
Éditeur: Springer Verlag
DOI: 10.1007/s00145-020-09346-z

Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations

Auteurs: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Publié dans: ACM Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2566
Éditeur: ACM
DOI: 10.1145/3546191

Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires

Auteurs: Raine Nieminen, Thomas Schneider
Publié dans: Journal of Cryptology (JoC), 2023, ISSN 0933-2790
Éditeur: Springer Verlag

SoK: Efficient Privacy-preserving Clustering

Auteurs: Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
Publié dans: Proceedings on Privacy Enhancing Technologies, Numéro 2021/4, 2021, Page(s) 225-248, ISSN 2299-0984
Éditeur: De Gruyter Open
DOI: 10.2478/popets-2021-0068

Faster privacy‐preserving location proximity schemes for circles and polygons

Auteurs: Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
Publié dans: IET Information Security, Numéro 14/3, 2020, Page(s) 254-265, ISSN 1751-8709
Éditeur: Institution of Engineering and Technology
DOI: 10.1049/iet-ifs.2019.0125

MOTION - A Framework for Mixed-Protocol Multi-Party Computation

Auteurs: Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
Publié dans: Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2574
Éditeur: ACM
DOI: 10.1145/3490390

"Comments on ""Privacy-Enhanced Federated Learning Against Poisoning Adversaries"""

Auteurs: Thomas Schneider, Ajith Suresh, Hossein Yalame
Publié dans: IEEE Transactions on Information Forensics and Security (TIFS), 2023, ISSN 1556-6013
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3238544

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible