Andreas Peter
Andreas Peter
Professor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, Germany
Verified email at - Homepage
Cited by
Cited by
A survey of provably secure searchable encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and distributed system security symposium (NDSS) 27, 2020
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
Group homomorphic encryption: characterizations, impossibility results, and applications
F Armknecht, S Katzenbeisser, A Peter
Designs, codes and cryptography 67 (2), 209-232, 2013
Automated retrieval of att&ck tactics and techniques for cyber threat reports
V Legoy, M Caselli, C Seifert, A Peter
arXiv preprint arXiv:2004.14322, 2020
Deepcase: Semi-supervised contextual analysis of security events
T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
Oblivious outsourced storage with delegation
M Franz, P Williams, B Carbunar, S Katzenbeisser, A Peter, R Sion, ...
Financial Cryptography and Data Security: 15th International Conference, FC …, 2012
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
Converse PUF-based authentication
Ü Kocabaş, A Peter, S Katzenbeisser, AR Sadeghi
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
Privacy-preserving whole genome sequence processing through proxy-aided ORAM
N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics
VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ...
arXiv preprint arXiv:1806.04042, 2018
Obfuscated access and search patterns in searchable encryption
Z Shang, S Oya, A Peter, F Kerschbaum
arXiv preprint arXiv:2102.09651, 2021
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
A highly accurate {Query-Recovery} attack against searchable encryption using {Non-Indexed} documents
M Damie, F Hahn, A Peter
30th USENIX security symposium (USENIX Security 21), 143-160, 2021
Fast and accurate likelihood ratio-based biometric verification secure against malicious adversaries
A Bassit, F Hahn, J Peeters, T Kevenaar, R Veldhuis, A Peter
IEEE transactions on information forensics and security 16, 5045-5060, 2021
Automatic deployment of specification-based intrusion detection in the BACnet protocol
H Esquivel-Vargas, M Caselli, A Peter
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
General impossibility of group homomorphic encryption in the quantum world
F Armknecht, T Gagliardoni, S Katzenbeisser, A Peter
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20