|
Search the dblp DataBase
Florian Kerschbaum:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Philip Robinson, Florian Kerschbaum, Andreas Schaad
From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:297-309 [Conf]
- Florian Kerschbaum, Orestis Terzidis
Filtering for Private Collaborative Benchmarking. [Citation Graph (0, 0)][DBLP] ETRICS, 2006, pp:409-422 [Conf]
- Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice
Private Fingerprint Verification without Local Storage. [Citation Graph (0, 0)][DBLP] ICBA, 2004, pp:387-394 [Conf]
- Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. [Citation Graph (0, 0)][DBLP] Information Hiding, 2001, pp:185-199 [Conf]
- Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. [Citation Graph (0, 0)][DBLP] iTrust, 2006, pp:193-205 [Conf]
- Florian Kerschbaum
Practical Private Regular Expression Matching. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:461-470 [Conf]
- Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du
Secure and private sequence comparisons. [Citation Graph (0, 0)][DBLP] WPES, 2003, pp:39-44 [Conf]
- Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy
A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. [Citation Graph (0, 0)][DBLP] Computers & Security, 2001, v:20, n:3, pp:263-270 [Journal]
- Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
- Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni
Using Internal Sensors and Embedded Detectors for Intrusion Detection. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:1/2, pp:23-70 [Journal]
- Florian Kerschbaum, Rafael Deitos, Philip Robinson
Securing VO Management. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:14-23 [Conf]
- Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin
Security and Trust in IT Business Outsourcing: a Manifesto. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:47-58 [Journal]
Fostering the Uptake of Secure Multiparty Computation in E-Commerce. [Citation Graph (, )][DBLP]
Improving Practical Performance on Secure and Private Collaborative Linear Programming. [Citation Graph (, )][DBLP]
Performance Comparison of Secure Comparison Protocols. [Citation Graph (, )][DBLP]
Building a Privacy-Preserving Benchmarking Enterprise System. [Citation Graph (, )][DBLP]
Privacy-preserving logical vector clocks using secure computation techniques. [Citation Graph (, )][DBLP]
Privacy-Preserving Multi-Objective Evolutionary Algorithms. [Citation Graph (, )][DBLP]
On the practical importance of communication complexity for secure multi-party computation protocols. [Citation Graph (, )][DBLP]
An access control model for mobile physical objects. [Citation Graph (, )][DBLP]
Practical Privacy-Preserving Benchmarking. [Citation Graph (, )][DBLP]
A New Way to Think About Secure Computation: Language-based Secure Computation. [Citation Graph (, )][DBLP]
Distance-preserving pseudonymization for timestamps and spatial data. [Citation Graph (, )][DBLP]
Privacy-preserving social network analysis for criminal investigations. [Citation Graph (, )][DBLP]
RFID-based supply chain partner authentication and key agreement. [Citation Graph (, )][DBLP]
Privacy-preserving computation of benchmarks on item-level data using RFID. [Citation Graph (, )][DBLP]
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. [Citation Graph (, )][DBLP]
Privacy-preserving data analytics as an outsourced service. [Citation Graph (, )][DBLP]
Security against the business partner. [Citation Graph (, )][DBLP]
Adapting Privacy-Preserving Computation to the Service Provider Model. [Citation Graph (, )][DBLP]
Parallelizing secure linear programming. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.303secs
|