Dr.-Ing. Martin Beck
Employee
NameMr Dr.-Ing. Martin Beck
Chair of privacy and security
Send encrypted email via the SecureMail portal (for TUD external users only).
Research interests
Design of Secure Distributed Applications
Cryptographic Protocols and Algorithms
Curiculum Vitae
2011-2018 | Ph.D. student at the faculty of computer science, TU Dresden |
2003-2011 | studies of computer science, TU Dresden |
2017-2019 | scientific assistant / postdoc at the chair for privacy and data security, TU Dresden, funded by the BMBF project EXPLOIDS |
2015-2017 | scientific assistant at the Hochschule RheinMain, funded by the BMWi project SEnCom |
2011-2014 | scientific assistant at the chair for privacy and data security, TU Dresden, funded by the BMWi project GeneCloud within the TrustedCloud program |
Publications
- C. Kuhn, M. Beck, S. Schiffner, E. Jorswieck, T. Strufe. On Privacy Notions in Anonymous Communication. PETs, 2019.
- K. Becher, M. Beck, T. Strufe. An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking. NetSys, 2019.
- D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, T. Strufe. Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies, 2018, doi: 10.1007/978-3-319-63962-8_152-1
- A. Senier, M. Beck, T. Strufe. PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. arXiv, 2017, [arXiv].
- D. L. Quoc, M. Beck, P. Bhatotia, R. Chen, C. Fetzer, T. Strufe. PrivApprox: Privacy-Preserving Stream Analytics. USENIX Annual Technical Conference (USENIX ATC 17), 2017, [usenix].
- S. Roos, M. Beck, T. Strufe. Anonymous Addresses for Efficient and Resilient Routing in F2F Overlays. INFOCOM, 2016, doi: 10.1109/INFOCOM.2016.7524553.
- J. Spillner, M. Beck, A. Schill, T. M. Bohnert. Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments. IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, doi: 10.1109/UCC.2015.44.
- M. Beck. Randomized Decryption (RD) Mode of Operation for Homomorphic Cryptography - Increasing Encryption, Communication and Storage Efficiency. The Third International Workshop on Security and Privacy in Big Data (BigSecurity 2015), April 27, HongKong, doi: 10.1109/INFCOMW.2015.7179388.
- M. Beck, V. J. Haupt, J. Roy, J. Moennich, R. Jäkel, M. Schroeder, Z. Isik. GeneCloud: Secure Cloud Computing for Biomedical Research. Trusted Cloud Computing, November 16, 2014, doi:10.1007/978-3-319-12718-7_1.
- F. Kerschbaum, M. Beck, D. Schönfeld. Inference Control for Privacy-Preserving Genome Matching. 1st PETS Workshop on Genome Privacy (GenoPri), July 15, 2014, Amsterdam, Netherlands, :full paper. [workshop]
- M. Beck, F. Kerschbaum. Approximate two-party privacy-preserving string matching with linear complexity. Proceedings of the 2013 IEEE International Congress on Big Data (BigData Congress 2013), June 27-July 02, 2013, Santa Clara, CA, USA, doi:10.1109/BigData.Congress.2013.14.
- J. Hasse, T. Gloe, M. Beck, Forensic Identification of GSM Mobile Phones. The 1st ACM Workshop on Information Hiding and Multimedia Security, June 17-19, 2013, Montpellier, France, pp. 131-140, doi: 10.1145/2482513.2482529. [pdf] [infos]
- M. Beck, M. Marhöfer. Privacy-preserving data mining demonstrator. 16th International Conference on Intelligence in Next Generation Networks(ICIN '12), October, 2012, Berlin, Germany, pp. 210-216, doi:10.1109/ICIN.2012.6376028.
- M. Beck, M. Marhöfer. Do-Not-Track Techniques for Browsers and Their Implications for Consumers. 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, September 5-9, 2011, Trento, Italy, pp. 187-196, doi:10.1007/978-3-642-31668-5_14.
- M. Beck. Enhanced TKIP Michael Attacks. Report. TU Dresden, 2010, February, [arxiv].
- E. Tews, M. Beck. Practical attacks against WEP and WPA. Proceedings of the second ACM conference on Wireless network security (WiSec'09), March 16-18, 2009, Zurich, Switzerland, pp. 187-196, doi:10.1145/1514274.1514286.