Dr. Elke Franz



Frau Dr.-Ing. Elke Franz

Praktikumsbeauftragte (INF-D-930)



  • Mehrseitige Sicherheit in und durch verteilte Systeme: Sichere Netzwerkkodierung, sichere und effiziente Kommunikation
  • Multimedia-Sicherheit: Steganographie und Steganalyse
  • Datenschutzfördernde Technologien: Sicherheitsaspekte im Smart Grid

Vergabe von Themen für Beleg-, Projekt- und Abschlussarbeiten insbesondere zu sicherer Netzwerkkodierung

Masterarbeit/SHK-Tätigkeit zum Thema Sicherheit in Software Defined Networks

Curriculum Vitae

1992-1997 Diplomstudium Informatik an der TU Dresden (Abschluss als Dipl.-Inform.)
1998-2002 Promotionsstudium an der TU Dresden (Abschluss als Dr.-Ing.)
seit 2001 Wissenschaftliche Mitarbeiterin am Lehrstuhl DuD
2001-2003 Mitarbeit im DFG-Projekt COMQUAD (Components with Quantitative Properties and Adaptivity)
2003-2007 Mitarbeit im EU-Projekt PRIME (Privacy and Identity Management for Europe)
2004-2007 Mitarbeit im EU NoE ECRYPT (European Network of Excellence in Cryptology)
seit 07/2011 Teilprojektleiterin (gemeinsam mit Prof. Jorswieck und Prof. Strufe) im DFG SFB HAEC (Highly Adaptive Energy-Efficient Computing)
2011-2014 Projektverantwortliche des DAAD-Projektes TruEGrid
2016 - Projektleiterin des Erasmus+/CBHE(KA2)-Projektes DAMOC


Kryptographie und Kryptoanalyse
Informatik I (für Verkehrsingenieure)
Hauptseminar Sichere Netzwerkkodierung


  • P. Walther, C. Janda, E. Franz, M. Pelka, H. Hellbrück, T. Strufe and E. Jorswieck: Improving Quantization for Channel Reciprocity based Key Generation. Accepted for IEEE 43rd Conf. on LCN, 2018.
  • S. Moriam, E. Franz, P. Walther, A. Kumar, T. Strufe, and G. P. Fettweis: Protecting Communication in Many-Core Systems against Active Attackers. Proceedings of ACM Great Lakes Symposium on VLSI (GLSVLSI, 2018.
  • B. Matthiesen, S. Pfennig, M. Bielert, T. Ilsche, A. Lonnstrom, T. Li, J. A. Cabrera, C. Scheunert, E. Franz, S. Santini, T. Strufe, E. Jorswieck, W. Nagel, G. T. Nguyen, and F. H.P. Fitzek: Secure and Energy-Efficient Interconnects for Board-to-Board Communication. Proc. Of IEEE International Conference on Ubiquitous Wireless Broadband ICUWB 2017, Workshop on AttoNets, 2017.

  • S. Pfennig, S. Engelmann, E. Franz, A. Wolf: Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys under Active Attacks. Proc. of Workshop on Communication Security (WCS), 2017.
  • S. Pfennig, E. Franz: Security Aspects of Confidential Network Coding. Proc. of IEEE ICC 2017 Communication and Information Systems Security Symposium, 2017.
  • S. Pfennig, E. Franz: eSPOC: enhanced Secure Practical Network Coding for Better Efficiency and Lower Latency. Proc. of GlobeCom NetCod, 2016.
  • C. Hofmann, E. Franz, and S. Santini: A Metric for Adaptive Routing on Trustworthy Paths. In J. Camemisch and D. Kesdogan: Open Problems in Network Security: IFIP WG 11.4 Int. Work-shop iNetSec 2015, Revised Selected Papers, Springer, 2016, 11-25.
  • S. Pfennig, K. Feldhoff, F. M. Ciorba, E. Franz, T. Reiher, M. Bielert, T. Ilsche, and W. E. Nagel: Simulation Models Verification for Resilient Communication on a Highly Adaptive Energy-Efficient Computer. Proc. of the 24th High Performance Computing Symposium (HPC 2016), part of the 2016 Spring Simulation Multi-Conference, SpringSim'16, 2016.
  • S. Pfennig, E. Franz, S. Engelmann, A. Wolf: End-to-End Key Establishment using Physical Layer Key Generation with Specific Attacker Models. Springer, LNEE 358, 93-110, 2016.
  • S. Moriam, Y. Yan, E. Fischer, E. Franz, and G. P. Fettweis: Resilient and Efficient Communication in Many-Core Systems using Network Coding. 34th IEEE International Performance Computing and Communications Conference (IPCCC), December 2015, Nanjing, China, 2015.
  • C. Hofmann, E. Franz, and S. Santini: A Metric for Adaptive Routing on Trustworthy Paths. IFIP WG 11.4 Workshop iNetSec 2015.
  • M. Bielert, K. Feldhoff, F. M. Ciorba, S. Pfennig, E. Franz, T. Ilsche, and W. E. Nagel: Verification of Resilient Communication Models for the Simulation of a Highly Adaptive Energy-Efficient Computer. International Conference for High Performance Computing, Networking, Storage and Analysis (SC 2015).
  • E. Franz, S. Pfennig, B. Matthiesen, C. Scheunert, E. A. Jorswieck: Energy Models for Communication of Future Computing Platforms. Proc. of Workshop on Broadband Wireless Communication between Computer Boards (Atto-Nets) at IEEE ICUWB, 2015.
  • S. Pfennig, E. Franz, J. Richter, C. Scheunert, E. A. Jorswieck: Confidential Network Coding: Physical Layer vs. Network Layer. Proc. of Workshop on Broadband Wireless Communication between Computer Boards (Atto-Nets) at IEEE ICUWB, 2015.
  • E. Franz, S. Pfennig, T. Reiher: Efficiency of Rateless Secure Network Coding. Procedia Technology, Elsevier, vol. 17, 162 - 169, 2014.
  • U. Baumann, E. Franz, A. Pfitzmann: Kryptographische Systeme. Springer, 2014.
  • S. Pfennig, E. Franz, S. Engelmann, A. Wolf: End-to-End Key Establishment using Physical Layer Key Generation with Specific Attacker Models. Proceedings of the Workshop on Communication Security, 2014.
  • F. M. Ciorba, T. Ilsche, E. Franz, S. Pfennig, C. Scheunert, U. Markwardt, J. Schuchart, D. Hackenberg, R. Schöne, A. Knüpfer, W. E. Nagel, E. A. Jorswieck, M. S. Müller: Analysis of Parallel Applications on a High Performance - Low Energy Computer. Proceedings of the Workshop on Unconventional High Performance Computing, 2014.
  • S. Pfennig, E. Franz, F. M. Ciorba, T. Ilsche, W. E. Nagel: Modeling Communication Delays for Network Coding and Routing for Error-Prone Transmission. Proceedings of the IEEE International Conference on Future Generation Communication Technologies, 2014.
  • S. Pfennig, E. Franz: Adjustable Redundancy for Secure Network Coding in a Unicast Scenario. Proceedings of the International Symposium on Network Coding, 2014.
  • A. Biselli, E. Franz, M. Coutinho: Protection of Consumer Data in the Smart Grid Compliant with the German Smart Metering Guideline. SEGS’13.
  • S. Pfennig, E. Franz: Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency. International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), pp. 18-22, 2013.
  • J. Richter, E. Franz, S. Engelmann, S. Pfennig, E. A. Jorswieck: Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel? International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), pp. 179-183, 2013.
  • S. Mburu, E. Franz, T. Springer: A Conceptual Framework for Designing mHealth Solutions for Developing Countries. MobileHealth '13, Proc. of the 3rd ACM MobiHoc workshop on Perva-sive wireless healthcare, pp. 31-36, 2013.
  • S. Pfennig, E. Franz: Secure Network Coding: Dependency of Efficiency on Network Topology. IEEE ICC / CISS, Budapest, Hungary, 693-698, 2013.
  • G. M. Minamizaki, K. V. O. Fonseca, S. Clauß, E. Franz, S. Köpsell, H. Lazarek: Data security issues on metering systems of energy consumption in Brazil. ESPAÇO ENERGIA, issue 18, April 2013, pp. 28-38, 2013.
  • E. Franz, T. Springer, N. Harder: Enhancing Privacy in Social Applications with the Notion of Group Context. Workshop on Ubiquitous Computing Security Issues (UCSI‘12); 2012.
  • M. P. Coutinho, G. Lambert-Torres, L. E. B. da Silva, H. Lazarek, E. Franz: Detecting Cyber Attacks on SCADA and Other Critical Infrastructures. In: C. Laing, A. Badii, P. Vickers: Se-curing Critical Infrastructure and Critical Control Systems: Approaches for Threat Protection. IGI Global, 17-53. Web. 17 Jul. 2013.
  • E. Franz, S. Pfennig, A. Fischer: Efficiency of Secure Network Coding Schemes. Proc. of 13th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS), LNCS 7394, 145 – 159, 2012.
  • E. Franz, S. Pfennig, A. Fischer: Communication Overhead of Network Coding Schemes Secure against Pollution Attacks. Technical Report TUD-FI12-07, TU Dresden, May 2012.
  • E. Franz, K. Borcea-Pfitzmann, A. Pfitzmann: Revisiting the Naming Problem from a Privacy Perspective. Journal of Communication in Information Science and Management Engineering (CISME), 2(3), World Academic Publishing, 29-35, 2012.
  • K. Liesebach, E. Franz, A. Stange, A. Juschka, K. Borcea-Pfitzmann, A. Böttcher, H. Wahrig: Collaborative E-Learning. In: J. Camemisch, R. Leenes, D. Sommer: Digital Privacy: PRIME – Privacy and Identity Management for Europe. Springer, LNCS 6545, 657-677, 2011.
  • E. Franz, S. Rönisch, R. Bartel: Improved Embedding Based on a Set of Cover Images. Proceedings of the 11th ACM Workshop on Multimedia and Security (Princeton, New Jersey, USA, September 07 - 08, 2009). MM&Sec '09. ACM, New York, NY, 141-150.
  • E. Franz, K. Liesebach: Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. In Proceedings of Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, 22-31.
  • S. Rönisch, E. Franz: Steganalysis Based on a Small Set of Images. In: A. Lang, J. Dittmann, C. Kraetzer (eds.): Final Report on Watermarking Benchmarking. ECRYPT Deliverable D.WVL.21, pp. 91-106, 2008.
  • M. Bergmann, C. Groba, E. Franz, T. Springer: Web 2.0 – Privacy 0.2? A few thoughts about new privacy challenges in the Web 2.0. In Proceedings W2Trust, First International Workshop on Web 2.0 Trust, Trondheim, Norway, June 16th 2008.
  • E. Franz, C. Groba, T. Springer, M. Bergmann: A Comprehensive Approach for Context-dependent Privacy Management. In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, March, 2008.
  • E. Kosta, J. Dumortier, P. Ribbers, A. Fairchild, J. Tseng, K. Liesbach, E. Franz, R. Leenes, M. Hoogwout, B. Priem, T. Kölsch, J. Zibuschka, G. Kramer, G. Schumacher: Requirements for Privacy Enhancing Tools. PRIME Deliverable D1.1.d, March, 2008.
  • E. Franz: Embedding Considering Dependencies between Pixels. In E. J. Delp, III, P. W.Wong, J. Dittmann, and N. D. Memon (Eds.): In Proceedings SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 68191D 1-12, January 2008.
  • T. Gloe, E. Franz, A. Winkler: Forensics for Flatbed Scanners. In Security, Steganography, and Watermarking of Multimedia Contents IX. Edited by Delp, Edward J., III; Wong, Ping Wah. Proceedings of the SPIE, Volume 6505, 2007, pp. 65051I.
  • E. Franz: Analysing Correlations Between Pixels. In: J. Dittmann, C. Kraetzer (Eds.): Report on Watermarking Benchmarking and Steganalysis, ECRYPT Deliverable D.WVL.16, pp. 8-21, 2007.
  • E. Franz, K. Liesebach, K. Borcea-Pfitzmann: Privacy-Aware User Interfaces within Collaborative Environments. Proceedings of the international workshop in conjunction with AVI 2006 on Context in Advanced Interfaces, Venice, Italy May 23 - 23, 2006, 45 – 48.
  • E. Franz, B. Engel: A Realization of Context Management Facilitating the Usage of Partial Identities. In: Proceedings of Workshop on Privacy-Enhanced Personalization (PEP 2006), Montréal, Canada, 2006.
  • E. Franz, K. Borcea-Pfitzmann: Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. In: Workshop on Security in eLearning at AReS 2006, Vienna, April 2006.
  • E. Franz, H. Wahrig, A. Boettcher, K. Borcea-Pfitzmann: Access Control in a Privacy-Aware eLearning Environment. In: Workshop on Security in eLearning at AReS 2006, Vienna, April 2006.
  • E. Franz, U. Wappler: Tailored Responsibility within Component-Based Systems. Proc. of CBSE 2005, 203-218.
  • K. Borcea, E. Franz, and A. Pfitzmann. Usable Presentation of Secure Pseudonyms. In Proceedings of Digital Identity Management (DIM 2005), Alexandria, Virginia, USA, November 2005.
  • K. Borcea, H. Donker, E. Franz, K. Liesebach, A. Pfitzmann, H. Wahrig. Intra-Application Partitioning of Personal Data. In Proc. Workshop on Privacy Enhanced Personalization (PEP 2005), Edinburgh, UK, 67–74, 2005.
  • K. Borcea, H. Donker, E. Franz, A. Pfitzmann, and H. Wahrig. Privacy-Aware eLearning: Why and How. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications (ED-MEDIA & EDTELECOM 2005), Montreal, Canada, pages 1466–1472, 2005.
  • K. Borcea, H. Donker, E. Franz, A. Pfitzmann, H. Wahrig: Towards Privacy-Aware eLearning. In: G. Danezis and D. Martin (Eds.): PET 2005, LNCS 3856, Springer-Verlag, Heidelberg 2006, 167-178.
  • E. Franz, A. Schneidewind: Pre-Processing for Adding Noise Steganography. In Proc. of the 7th Int. Workshop on Information Hiding, Barcelona, Spain, Springer, LNCS 3727, 189-203, 2005.
  • J. Dittmann, E. Franz, A. Schneidewind: Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen. Informatik Spektrum 28(6): 453-461 (2005).
  • E. Franz, A. Schneidewind: Adaptive Steganography Based on Dithering. In Proceedings of the 2004 Workshop on Multimedia and Security (Magdeburg, Germany, September 20 - 21, 2004). MM&Sec '04. ACM Press, New York, NY, 56-62.
  • H. Eichenhardt, E. Franz, S. Röttger, U. Wappler: Adapting Component Models to Support Responsibility. ISoLA (Preliminary proceedings), 1st Int. Symposium on Leveraging Applications of Formal Methods, 2004.
  • E. Franz: Steganography Preserving Statistical Properties. Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 2002, LNCS 2578, pp. 278-294, Springer 2003.
  • R. Aigner, H. Berthold, E. Franz, S. Göbel, H. Härtig, H. Hußmann, K. Meißner, K. Meyer-Wegener, M. Meyerhöfer, A. Pfitzmann, S. Röttger, A. Schill, T. Springer, F. Wehner: COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit. Inform., Forsch. Entwickl. 18(1): 39-40 (2003).
  • E. Franz: Steganographie durch Nachbildung plausibler Änderungen. Dissertation, Technische Universität Dresden, Institut für Systemarchitektur, 2002.
  • E. Franz: Steganographie unter Erhalt statistischer Merkmale. GI Fachtagung Verlässliche IT-Systeme (VIS ‘01), DuD Fachbeiträge, Vieweg 2001, 225-240.
  • E. Franz, A. Pfitzmann: Steganography Secure against Cover-Stego-Attacks. Proceedings of the Third International Workshop on Information Hiding, Dresden 1999, LNCS 1768, pp. 29-46, Springer 2000.
  • E. Franz, D. Schönfeld: Geschäftsmodelle für Watermarking. DuD 23(1999)12, 705-711, Vieweg 1999.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Einsatz von dummies im Mixnetz zum Schutz der Kommunikationsbeziehung. Sicherheit in Informationssystemen (SIS ’98), S. 65-94, vdf Hochschulverlag AG an der ETH Zürich, 1998.
  • E. Franz, A. Jerichow, G. Wicke: A Payment Scheme for Mixes Providing Anonymity. International IFIP Working Conference on Electronic Commerce ’98, 4-5th June 1998, LNCS 1402, pp. 94-108, Springer, Berlin 1998.
  • E. Franz, A. Jerichow: A Mix-Mediated Service and Its Payment. ESORICS ’98, LNCS 1485, pp. 313-328, Springer, Berlin,, 1998.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. 3rd Australasian Conference on Information Security and Privacy (ACISP ’98), LNCS 1438, pp. 111-222, Springer, Berlin, 1998.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Modelling mix-mediated anonymous com-munication and preventing pool-mode attacks. 14th IFIP International Conference on Infor-mation Security (IFIP/SEC ’98), London, Chapman & Hall 1998.
  • E. Franz, A. Pfitzmann: Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas. Informatik-Spektrum 21, S. 183-193, Springer 1998.
  • H. Federrath, E. Franz, G. Wicke, A. Westfeld: Steganographie zur vertraulichen Kommunikation. IT-Sicherheit 3/97, S. 10-13, Datakontext-Fachverlag 1997.
  • H. Federrath, E. Franz, A. Jerichow, J. Müller, A. Pfitzmann: Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren (Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen). GI Fachtagung Kommunikation in Verteilten Systemen (KiVS) ‘97, 17.-22.2.97 in Braunschweig, S. 77-93, Springer 1997.
  • E. Franz, A. Jerichow, A. Pfitzmann: Systematisierung und Modellierung von Mixen. GI Fachtagung Verläßliche IT-Syteme (VIS ‘97), DuD Fachbeiträge, S. 171-190, Vieweg 1997.
  • E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, I. Stierand: Computer Based Steganoraphy. Proceedings of the First International Workshop on Information Hiding, Cambridge 1996, LNCS 1174, pp. 7-21, Springer, Berlin 1996.

Zu dieser Seite

Stephan Escher
Letzte Änderung: 18.09.2018