Follow
Andreas Peter
Andreas Peter
Professor, Safety-Security-Interaction Group, University of Oldenburg, Germany
Verified email at uol.de - Homepage
Title
Cited by
Cited by
Year
A survey of provably secure searchable encryption
C Bösch, P Hartel, W Jonker, A Peter
ACM Computing Surveys (CSUR) 47 (2), 1-51, 2014
3992014
Efficiently outsourcing multiparty computation under multiple keys
A Peter, E Tews, S Katzenbeisser
IEEE transactions on information forensics and security 8 (12), 2046-2058, 2013
1802013
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1442010
Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic
T Van Ede, R Bortolameotti, A Continella, J Ren, DJ Dubois, M Lindorfer, ...
Network and distributed system security symposium (NDSS) 27, 2020
1402020
Group homomorphic encryption: characterizations, impossibility results, and applications
F Armknecht, S Katzenbeisser, A Peter
Designs, codes and cryptography 67, 209-232, 2013
662013
Oblivious outsourced storage with delegation
M Franz, P Williams, B Carbunar, S Katzenbeisser, A Peter, R Sion, ...
Financial Cryptography and Data Security: 15th International Conference, FC …, 2012
502012
Decanter: Detection of anomalous outbound http traffic by passive application fingerprinting
R Bortolameotti, T van Ede, M Caselli, MH Everts, P Hartel, R Hofstede, ...
Proceedings of the 33rd Annual computer security applications Conference …, 2017
492017
Privacy-preserving whole genome sequence processing through proxy-aided ORAM
N Karvelas, A Peter, S Katzenbeisser, E Tews, K Hamacher
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 1-10, 2014
49*2014
Efficient privacy-enhanced familiarity-based recommender system
A Jeckmans, A Peter, P Hartel
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
472013
Converse PUF-based authentication
Ü Kocabaş, A Peter, S Katzenbeisser, AR Sadeghi
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012 …, 2012
472012
Automated retrieval of att&ck tactics and techniques for cyber threat reports
V Legoy, M Caselli, C Seifert, A Peter
arXiv preprint arXiv:2004.14322, 2020
462020
Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics
VM Vilches, LA Kirschgens, AB Calvo, AH Cordero, RI Pisón, DM Vilches, ...
arXiv preprint arXiv:1806.04042, 2018
40*2018
Deepcase: Semi-supervised contextual analysis of security events
T Van Ede, H Aghakhani, N Spahn, R Bortolameotti, M Cova, A Continella, ...
2022 IEEE Symposium on Security and Privacy (SP), 522-539, 2022
382022
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
362014
Obfuscated access and search patterns in searchable encryption
Z Shang, S Oya, A Peter, F Kerschbaum
arXiv preprint arXiv:2102.09651, 2021
312021
Privacy-enhanced participatory sensing with collusion resistance and data aggregation
F Günther, M Manulis, A Peter
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
282014
General impossibility of group homomorphic encryption in the quantum world
F Armknecht, T Gagliardoni, S Katzenbeisser, A Peter
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
252014
Automatic deployment of specification-based intrusion detection in the BACnet protocol
H Esquivel-Vargas, M Caselli, A Peter
Proceedings of the 2017 workshop on cyber-physical systems security and …, 2017
232017
SOFIR: Securely outsourced Forensic image recognition
C Bösch, A Peter, P Hartel, W Jonker
2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014
192014
Fast and accurate likelihood ratio-based biometric verification secure against malicious adversaries
A Bassit, F Hahn, J Peeters, T Kevenaar, R Veldhuis, A Peter
IEEE transactions on information forensics and security 16, 5045-5060, 2021
17*2021
The system can't perform the operation now. Try again later.
Articles 1–20