Dr.-Ing. Martin Beck
Mitarbeiter
NameHerr Dr.-Ing. Martin Beck
Eine verschlüsselte E-Mail über das SecureMail-Portal versenden (nur für TUD-externe Personen).
Forschungsinteressen
Entwurf sicherer verteilter Anwendungen
Kryptographische Protokolle und Algorithmen
Curiculum Vitae
2011-2018 | Promotionsstudium, Fakultät Informatik, TU Dresden |
2003-2011 | Diplomstudium Informatik, TU Dresden |
2017-2019 | Wissenschaftlicher Mitarbeiter im BMBF-Projekt EXPLOIDS |
2015-2017 | Wissenschaftlicher Mitarbeiter der Hochschule RheinMain im BMWi-Projekt SEnCom |
2011-2014 | Wissenschaftlicher Mitarbeiter im BMWi-Projekt GeneCloud des Programms TrustedCloud |
Veröffentlichungen
- C. Kuhn, M. Beck, S. Schiffner, E. Jorswieck, T. Strufe. On Privacy Notions in Anonymous Communication. PETs, 2019.
- K. Becher, M. Beck, T. Strufe. An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking. NetSys, 2019.
- D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, T. Strufe. Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies, 2018, doi: 10.1007/978-3-319-63962-8_152-1
- A. Senier, M. Beck, T. Strufe. PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. arXiv, 2017, [arXiv].
- D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, T. Strufe. PrivApprox: Privacy-Preserving Stream Analytics. USENIX Annual Technical Conference (USENIX ATC 17), 2017, [usenix].
- S. Roos, M. Beck, T. Strufe. Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays. INFOCOM, 2016, doi: 10.1109/INFOCOM.2016.7524553.
- J. Spillner, M. Beck, A. Schill, T. M. Bohnert. Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments. IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, doi: 10.1109/UCC.2015.44.
- M. Beck. Randomized Decryption (RD) Mode of Operation for Homomorphic Cryptography - Increasing Encryption, Communication and Storage Efficiency. The Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015), April 27, HongKong, doi: 10.1109/INFCOMW.2015.7179388.
- Martin Beck, V. Joachim Haupt, Janine Roy, Jan Moennich, René Jäkel, Michael Schroeder, Zerrin Isik. GeneCloud: Secure Cloud Computing for Biomedical Research. Trusted Cloud Computing, November 16, 2014, doi:10.1007/978-3-319-12718-7_1.
- Florian Kerschbaum, Martin Beck, Dagmar Schönfeld. Inference Control for Privacy-Preserving Genome Matching. 1st PETS Workshop on Genome Privacy (GenoPri), July 15, 2014, Amsterdam, Netherlands, :full paper. [workshop]
- Martin Beck, V. Joachim Haupt, Janine Roy, Jan Moennich, René Jäkel, Michael Schroeder, Zerrin Isik. Secure Algorithms for Biomedical Research in Public Clouds. 5. Workshop „Grid-, Cloud- und Big-Data-Technologien für Systementwurf und -analyse“, November, 2013, Dresden, Germany.
- Martin Beck, Florian Kerschbaum. Approximate two-party privacy-preserving string matching with linear complexity. Proceedings of the 2013 IEEE International Congress on Big Data (BigData Congress 2013), June 27-July 02, 2013, Santa Clara, CA, USA, doi:10.1109/BigData.Congress.2013.14.
- Jakob Hasse, Thomas Gloe, Martin Beck, Forensic Identification of GSM Mobile Phones. The 1st ACM Workshop on Information Hiding and Multimedia Security, June 17-19, 2013, Montpellier, France, pp. 131-140, doi: 10.1145/2482513.2482529. [pdf] [infos]
- Martin Beck, Michael Marhöfer. Privacy-preserving data mining demonstrator. 16th International Conference on Intelligence in Next Generation Networks(ICIN '12), October, 2012, Berlin, Germany, pp. 210-216, doi:10.1109/ICIN.2012.6376028.
- Martin Beck, Michael Marhöfer. Do-Not-Track Techniques for Browsers and Their Implications for Consumers. 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, September 5-9, 2011, Trento, Italy, pp. 187-196, doi:10.1007/978-3-642-31668-5_14.
- Martin Beck. Enhanced TKIP Michael Attacks. Report. TU Dresden, 2010, February, [arxiv].
- Erik Tews, Martin Beck. Practical attacks against WEP and WPA. Proceedings of the second ACM conference on Wireless network security (WiSec'09), March 16-18, 2009, Zurich, Switzerland, pp. 187-196, doi:10.1145/1514274.1514286.