Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Jeremias Mechler"'
Autor:
Tobias Müller, Jeremias Mechler, Brandon Broadnax, Matthias Nagel, Jörn Müller-Quade, Alexander Koch
Publikováno v:
Proceedings on privacy enhancing technologies, 2021 (4), 312–338
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 4, Pp 312-338 (2021)
Proceedings on Privacy Enhancing Technologies, Vol 2021, Iss 4, Pp 312-338 (2021)
In practice, there are numerous settings where mutually distrusting parties need to perform distributed computations on their private inputs. For instance, participants in a first-price sealed-bid online auction do not want their bids to be disclosed
Publikováno v:
Theory of Cryptography ISBN: 9783030904586
TCC (1)
TCC (1)
Starting with the work of Rivest et al. in 1996, timed assumptions have found many applications in cryptography, building e.g. the foundation of the blockchain technology. They also have been used in the context of classical MPC, e.g. to enable fairn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65a49c505bbf71aac05f70c1e5b6bc9a
https://doi.org/10.1007/978-3-030-90459-3_25
https://doi.org/10.1007/978-3-030-90459-3_25
Publikováno v:
Datenschutz und Datensicherheit - DuD. 42:286-290
Die IT-Sicherheit, eine Grundvoraussetzung fur Digitale Souveranitat, ist in einem kritischen Zustand. Hersteller von IT-Produkten sind haufig nicht bereit, das Problem eigenverantwortlich anzugehen, und es fehlen wirksame, fur alle geltende gesetzli
Publikováno v:
Datenschutz und Datensicherheit - DuD. 42:74-78
Mochte man sichere IT-Systeme konstruieren, so kann man sich nicht auf Software alleine verlassen. Vertrauenswurdige Hardware ist ein unverzichtbarer Vertrauensanker fur sichere IT-Losungen, wie in diesem Beitrag anhand von je zwei Anwendungsbeispiel
Publikováno v:
Datenschutz und Datensicherheit - DuD. 41:24-28
In der modernen Kryptographie wird „Sicherheit“ mathematisch definiert. Einer der etablierten Ansatze, Sicherheit zu definieren, ist die „Simulationsbasierte Sicherheit“, bei der Sicherheit keine absolute Grose ist, sondern durch Vergleich mi
Autor:
Dirk Achenbach, Jochen Rill, Jörn Müller-Quade, Roland Groll, Bernhard Löwe, Jeremias Mechler, Timon Hackenjos, Alexander Koch
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783030321000
Financial Cryptography
Financial Cryptography
EMV, also known as Chip and PIN, is the world-wide standard for card-based electronic payment. Its security wavers: over the past years, researchers have demonstrated various practical attacks, ranging from using stolen cards by disabling PIN verific
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::28a564e5b51b567f7b91331a694ccebe
https://doi.org/10.1007/978-3-030-32101-7_16
https://doi.org/10.1007/978-3-030-32101-7_16
Autor:
Matthias Gabel, Jeremias Mechler
Publikováno v:
CBMS
2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)
2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)
Outsourcing data processing and storage to the cloud is a persistent trend in the last years. Cloud computing offers many advantages like flexibility in resource allocation, cost reduction and high availability. However, when sensitive information is
Publikováno v:
2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS)
CBMS
CBMS
Cloud computing offers many advantages as flexibility or resource efficiency and can significantly reduce costs. However, when sensitive data is outsourced to a cloud provider, classified records can leak. To protect data owners and application provi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41da016b271f62eab8f42fcb022badba
Autor:
Mohamed Ahmed Abdelraheem, Spyros Mantzouratos, Jeremias Mechler, Sebastian Thomas Schork, Efi Papatheocharous, Thomas Carnehult, Kateryna Yurchenko, Gunther Schiefer, Panagiotis Gouvas, George Moldovan, Matthias Gabel
Most industries worldwide have entered a period of reaping the benefits and opportunities cloud offers. At the same time, many efforts are made to address engineering challenges for the secure development of cloud systems and software.With the majori
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18752393e04e7cac5b47cbecb3c21e05
https://publikationen.bibliothek.kit.edu/1000105415
https://publikationen.bibliothek.kit.edu/1000105415
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2018
Public-Key Cryptography – PKC 2018 ISBN: 9783319765778
Public Key Cryptography (1)
Public-Key Cryptography – PKC 2018
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2018
Public-Key Cryptography – PKC 2018 ISBN: 9783319765778
Public Key Cryptography (1)
Public-Key Cryptography – PKC 2018
Universally composable protocols provide security even in highly complex environments like the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic tasks are impossible. Tamper-proof hardware tokens, e.g. smart cards
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fb2083aa0c688e0b95e96bf6a4b12e27