The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Florian Kerschbaum: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip Robinson, Florian Kerschbaum, Andreas Schaad
    From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:297-309 [Conf]
  2. Florian Kerschbaum, Orestis Terzidis
    Filtering for Private Collaborative Benchmarking. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:409-422 [Conf]
  3. Florian Kerschbaum, Mikhail J. Atallah, David M'Raïhi, John R. Rice
    Private Fingerprint Verification without Local Storage. [Citation Graph (0, 0)][DBLP]
    ICBA, 2004, pp:387-394 [Conf]
  4. Mikhail J. Atallah, Victor Raskin, Michael Crogan, Christian Hempelmann, Florian Kerschbaum, Dina Mohamed, Sanket Naik
    Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:185-199 [Conf]
  5. Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson
    PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:193-205 [Conf]
  6. Florian Kerschbaum
    Practical Private Regular Expression Matching. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:461-470 [Conf]
  7. Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du
    Secure and private sequence comparisons. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:39-44 [Conf]
  8. Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy
    A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:3, pp:263-270 [Journal]
  9. Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen
    Analysis of vulnerabilities in Internet firewalls. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:3, pp:214-232 [Journal]
  10. Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni
    Using Internal Sensors and Embedded Detectors for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:23-70 [Journal]
  11. Florian Kerschbaum, Rafael Deitos, Philip Robinson
    Securing VO Management. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:14-23 [Conf]
  12. Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin
    Security and Trust in IT Business Outsourcing: a Manifesto. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:47-58 [Journal]

  13. Fostering the Uptake of Secure Multiparty Computation in E-Commerce. [Citation Graph (, )][DBLP]


  14. Improving Practical Performance on Secure and Private Collaborative Linear Programming. [Citation Graph (, )][DBLP]


  15. Performance Comparison of Secure Comparison Protocols. [Citation Graph (, )][DBLP]


  16. Building a Privacy-Preserving Benchmarking Enterprise System. [Citation Graph (, )][DBLP]


  17. Privacy-preserving logical vector clocks using secure computation techniques. [Citation Graph (, )][DBLP]


  18. Privacy-Preserving Multi-Objective Evolutionary Algorithms. [Citation Graph (, )][DBLP]


  19. On the practical importance of communication complexity for secure multi-party computation protocols. [Citation Graph (, )][DBLP]


  20. An access control model for mobile physical objects. [Citation Graph (, )][DBLP]


  21. Practical Privacy-Preserving Benchmarking. [Citation Graph (, )][DBLP]


  22. A New Way to Think About Secure Computation: Language-based Secure Computation. [Citation Graph (, )][DBLP]


  23. Distance-preserving pseudonymization for timestamps and spatial data. [Citation Graph (, )][DBLP]


  24. Privacy-preserving social network analysis for criminal investigations. [Citation Graph (, )][DBLP]


  25. RFID-based supply chain partner authentication and key agreement. [Citation Graph (, )][DBLP]


  26. Privacy-preserving computation of benchmarks on item-level data using RFID. [Citation Graph (, )][DBLP]


  27. A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. [Citation Graph (, )][DBLP]


  28. Privacy-preserving data analytics as an outsourced service. [Citation Graph (, )][DBLP]


  29. Security against the business partner. [Citation Graph (, )][DBLP]


  30. Adapting Privacy-Preserving Computation to the Service Provider Model. [Citation Graph (, )][DBLP]


  31. Parallelizing secure linear programming. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002