Skip to main content
European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Privacy-preserving Services On The Internet

Publikacje

Linear-Complexity Private Function Evaluation is Practical

Autorzy: Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider
Opublikowane w: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Numer 12309, 2020, Strona(/y) 401-420, ISBN 978-3-030-59012-3
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-59013-0_20

Griffin: Towards Mixed Multi-Key Homomorphic Encryption

Autorzy: Thomas Schneider, Hossein Yalame, Michael Yonli
Opublikowane w: 20. International Conference on Security and Cryptography (SECRYPT'23), 2023
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012090200003555

Engineering Privacy-Preserving Machine Learning Protocols

Autorzy: Thomas Schneider
Opublikowane w: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Strona(/y) 3-4, ISBN 9781450380881
Wydawca: ACM
DOI: 10.1145/3411501.3418607

Offline Model Guard: Secure and Private ML on Mobile Devices

Autorzy: Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert
Opublikowane w: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, Strona(/y) 460-465, ISBN 978-3-9819263-4-7
Wydawca: IEEE
DOI: 10.23919/date48585.2020.9116560

FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation

Autorzy: Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
Opublikowane w: 18. ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), 2023
Wydawca: ACM
DOI: 10.1145/3579856.3590340

Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies

Autorzy: Amos Treiber, Dirk Mullmann, Thomas Schneider, Indra Spiecker genannt Dohmann
Opublikowane w: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Wydawca: ACM

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation

Autorzy: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Opublikowane w: 14. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), 2022, Strona(/y) 147-157, ISBN 978-1-6654-1357-2
Wydawca: IEEE
DOI: 10.1109/host49136.2021.9702293

GPU-accelerated PIR with client-independent preprocessing for large-scale applications

Autorzy: Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider
Opublikowane w: USENIX Security Symposium (USENIX Security'22), Numer 31, 2022
Wydawca: USENIX

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation

Autorzy: Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame
Opublikowane w: USENIX Security Symposium (USENIX Security'21), Numer 30, 2021, Strona(/y) 2165-2182
Wydawca: USENIX

SafeFL: MPC-friendly framework for Private and Robust Federated Learning

Autorzy: Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame
Opublikowane w: 6. Deep Learning Security and Privacy Workshop (DLSP'23), 2023
Wydawca: IEEE

CryptoSPN: Privacy-preserving Sum-Product Network Inference

Autorzy: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Opublikowane w: 24. European Conference on Artificial Intelligence (ECAI'20), 2020, Strona(/y) 1946-1953
Wydawca: IOS Press
DOI: 10.3233/faia200313

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop

Autorzy: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Opublikowane w: USENIX Security Symposium (USENIX Security'21), Numer 30, 2021, Strona(/y) 3577-3594
Wydawca: USENIX

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation

Autorzy: Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame
Opublikowane w: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Strona(/y) 173-184, ISBN 978-989-758-524-1
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010547801730184

SAFE: A Secure and Efficient Long-Term Distributed Storage System

Autorzy: Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Agnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni
Opublikowane w: 8. ACM International Workshop on Security in Blockchain and Cloud Computing (SBC@ASIACCS'20), 2020, Strona(/y) 8-13
Wydawca: ACM
DOI: 10.1145/3384942.3406868

FAPRIL: Towards faster privacy-preserving fingerprint-based localization

Autorzy: Christopher van der Beets, Raine Nieminen, Thomas Schneider
Opublikowane w: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Wydawca: SCITEPRESS - Science and Technology Publications

VASA: Vector AES Instructions for Security Applications

Autorzy: Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
Opublikowane w: Annual Computer Security Applications Conference (ACSAC'21), Numer 37, 2021, Strona(/y) 131-145
Wydawca: ACM
DOI: 10.1145/3485832.3485897

FLAME: Taming backdoors in federated learning

Autorzy: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider
Opublikowane w: USENIX Security Symposium (USENIX Security'22), Numer 31, 2022
Wydawca: USENIX

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers

Autorzy: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Opublikowane w: Proceedings 2021 Network and Distributed System Security Symposium, 2021, ISBN 1-891562-66-5
Wydawca: Internet Society
DOI: 10.14722/ndss.2021.23159

SAFELearn: Secure Aggregation for private FEderated Learning

Autorzy: Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Mollering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni
Opublikowane w: 2021 IEEE Security and Privacy Workshops (SPW), 2021, Strona(/y) 56-62, ISBN 978-1-6654-3732-5
Wydawca: IEEE
DOI: 10.1109/spw53761.2021.00017

ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships

Autorzy: Thomas Reinhold, Philipp Kuhn, Daniel Gunther, Thomas Schneider, Christian Reuter
Opublikowane w: IEEE Transactions on Technology and Society, 2023
Wydawca: IEEE
DOI: 10.1109/tts.2023.3280356

PEA: Practical Private Epistasis Analysis using MPC

Autorzy: Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko
Opublikowane w: 27. European Symposium on Research in Computer Security (ESORICS'22), 2022
Wydawca: Springer

CryptoSPN - Expanding PPML beyond Neural Networks

Autorzy: Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting
Opublikowane w: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020, Strona(/y) 9-14, ISBN 9781450380881
Wydawca: ACM
DOI: 10.1145/3411501.3419417

Secure Two-Party Computation in a Quantum World

Autorzy: Niklas Buscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Kramer, Deevashwer Rathee, Thomas Schneider, Patrick Struck
Opublikowane w: 18. International Conference on Applied Cryptography and Network Security (ACNS'20), 2020, Strona(/y) 461-480, ISBN 978-3-030-57878-7
Wydawca: Springer
DOI: 10.1007/978-3-030-57808-4_23

Comparison-based MPC in star topology

Autorzy: Gowri R Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider
Opublikowane w: Proceedings of the 19th International Conference on Security and Cryptography, 2022
Wydawca: SCITEPRESS - Science and Technology Publications

FLUTE: Fast and Secure Lookup Table Evaluations

Autorzy: Andreas Bruggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame
Opublikowane w: 44. IEEE Symposium on Security and Privacy (S&P'23), 2023
Wydawca: IEEE
DOI: 10.1109/sp46215.2023.00157

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation

Autorzy: Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert
Opublikowane w: Proceedings of the 18th International Conference on Security and Cryptography, 2021, Strona(/y) 444-451, ISBN 978-989-758-524-1
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0010540504440451

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation

Autorzy: Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel
Opublikowane w: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Numer 12579, 2020, Strona(/y) 505-525, ISBN 978-3-030-65410-8
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-65411-5_25

Secure Maximum Weight Matching Approximation on General Graphs

Autorzy: Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer
Opublikowane w: 21. Workshop on Privacy in the Electronic Society (WPES'22), 2022
Wydawca: ACM

SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data

Autorzy: Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
Opublikowane w: European Symposium on Security and Privacy (EuroS&P'22), Numer 7, 2022
Wydawca: IEEE

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference

Autorzy: Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
Opublikowane w: 15. International Conference on Availability, Reliability and Security (ARES'20), 2020
Wydawca: ACM
DOI: 10.1145/3411501.3419425

Privacy-preserving Density-based Clustering

Autorzy: Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
Opublikowane w: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, Strona(/y) 658-671, ISBN 9781450382878
Wydawca: ACM
DOI: 10.1145/3433210.3453104

LLVM-Based Circuit Compilation for Practical Secure Computation

Autorzy: Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame
Opublikowane w: Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II, Numer 12727, 2021, Strona(/y) 99-121, ISBN 978-3-030-78374-7
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-030-78375-4_5

Privacy-preserving epidemiological modeling on mobile graphs

Autorzy: Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh
Opublikowane w: 2020
Wydawca: Cryptology ePrint Archive

AirCollect - efficiently recovering hashed phone numbers leaked via Apple AirDrop

Autorzy: Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert
Opublikowane w: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2021, Strona(/y) 371-373, ISBN 9781450383493
Wydawca: ACM
DOI: 10.1145/3448300.3468252

Trustworthy AI Inference Systems: An Industry Research View

Autorzy: Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Agnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hoss
Opublikowane w: 2020
Wydawca: arXiv

HyFL: A Hybrid Approach For Private Federated Learning

Autorzy: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame
Opublikowane w: 2023
Wydawca: arXiv
DOI: 10.48550/arxiv.2302.09904

SPIKE: Secure and Private Investigation of the Kidney Exchange problem

Autorzy: Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider
Opublikowane w: 2022
Wydawca: arXiv
DOI: 10.48550/arxiv.2204.09937

Scaling Mobile Private Contact Discovery to Billions of Users

Autorzy: Laura Hetz, Thomas Schneider, Christian Weinert
Opublikowane w: 2023
Wydawca: Cryptology ePrint Archive

Improved Universal Circuits using Lookup Tables

Autorzy: Yann Disser, Daniel Gunther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
Opublikowane w: 2022
Wydawca: Cryptology ePrint Archive

Efficient and Scalable Universal Circuits

Autorzy: Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
Opublikowane w: Journal of Cryptology, Numer 33/3, 2020, Strona(/y) 1216-1271, ISSN 0933-2790
Wydawca: Springer Verlag
DOI: 10.1007/s00145-020-09346-z

Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations

Autorzy: Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
Opublikowane w: ACM Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2566
Wydawca: ACM
DOI: 10.1145/3546191

Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires

Autorzy: Raine Nieminen, Thomas Schneider
Opublikowane w: Journal of Cryptology (JoC), 2023, ISSN 0933-2790
Wydawca: Springer Verlag

SoK: Efficient Privacy-preserving Clustering

Autorzy: Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame
Opublikowane w: Proceedings on Privacy Enhancing Technologies, Numer 2021/4, 2021, Strona(/y) 225-248, ISSN 2299-0984
Wydawca: De Gruyter Open
DOI: 10.2478/popets-2021-0068

Faster privacy‐preserving location proximity schemes for circles and polygons

Autorzy: Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang
Opublikowane w: IET Information Security, Numer 14/3, 2020, Strona(/y) 254-265, ISSN 1751-8709
Wydawca: Institution of Engineering and Technology
DOI: 10.1049/iet-ifs.2019.0125

MOTION - A Framework for Mixed-Protocol Multi-Party Computation

Autorzy: Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko
Opublikowane w: Transactions on Privacy and Security (TOPS), 2022, ISSN 2471-2574
Wydawca: ACM
DOI: 10.1145/3490390

"Comments on ""Privacy-Enhanced Federated Learning Against Poisoning Adversaries"""

Autorzy: Thomas Schneider, Ajith Suresh, Hossein Yalame
Opublikowane w: IEEE Transactions on Information Forensics and Security (TIFS), 2023, ISSN 1556-6013
Wydawca: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3238544

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników