Follow
Sebastian Meiser
Sebastian Meiser
University of Lübeck
Verified email at visa.com
Title
Cited by
Cited by
Year
The loopix anonymity system
AM Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th {USENIX} Security Symposium ({USENIX} Security 17), 1199-1216, 2017
2242017
AnoA: A Framework for Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
Computer Security Foundations Symposium (CSF), 2013 IEEE 26th, 163-178, 2013
1422013
Differentially Private Smart Metering with Battery Recharging
M Backes, S Meiser
Data Privacy Management and Autonomous Spontaneous Security. DPM 2013, SETOP …, 2014
1292014
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency-Choose Two
D Das, S Meiser, E Mohammadi, A Kate
2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018
1162018
Privacy loss classes: The central limit theorem in differential privacy
DM Sommer, S Meiser, E Mohammadi
Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019
812019
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection
M Backes, A Kate, S Meiser, E Mohammadi
Proc. of the 21st Conference on Computer and Communications Security (CCS’14), 2014
632014
Delegatable functional signatures
M Backes, S Meiser, D Schröder
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
572016
Approximate and Probabilistic Differential Privacy Definitions
S Meiser
Cryptology ePrint Archive, 2018
542018
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy
S Meiser, E Mohammadi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
532018
Your Choice MATor (s): large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks
M Backes, S Meiser, M Slowik
Proceedings on Privacy Enhancing Technologies 2016 (2), 40-60, 2015
232015
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
M Backes, A Kate, S Meiser, T Ruffing
Applied Cryptography and Network Security. ACNS 2015. Lecture Notes in …, 2015
21*2015
Comprehensive Anonymity Trilemma: User Coordination is not enough
D Das, S Meiser, E Mohammadi, A Kate
Proceedings on Privacy Enhancing Technologies 3, 356-383, 2020
192020
Operational Signature Schemes.
M Backes, Ö Dagdelen, M Fischlin, S Gajek, S Meiser, D Schröder
IACR Cryptology ePrint Archive 2014, 820, 2014
122014
Divide and funnel: a scaling technique for mix-networks
D Das, S Meiser, E Mohammadi, A Kate
Cryptology ePrint Archive, 2021
42021
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
M Backes, S Koch, S Meiser, E Mohammadi, C Rossow
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
42015
Quantitative anonymity guarantees for Tor
SWL Meiser
Saarland University, 2016
32016
Delegatable functional signatures
S Meiser, D Schröder
IET Information Security 12 (3), 194-206, 2017
12017
Computational soundness of passively secure encryption in presence of active adversaries
S Meiser
Saarland University, 2011
12011
Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale
M Kirschte, S Meiser, S Ardalan, E Mohammadi
arXiv preprint arXiv:2211.02003, 2022
2022
Not all is lost for anonymity–but quite a lot is.
D Das, S Meiser, E Mohammadi, A Kate
Hot Topics in Privacy Enhancing Technologies Workshop, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20