Publications
The list of publications below is provided by TU Dresden's Research Information System (FIS). It offers an overview of the publications of the Chair of Privacy and Security (formerly Datenschutz und Datensicherheit). For a list of publications by Florian Tschorsch and his team, please refer to the DBLP Computer Science Bibliography.
148 Entries
2018
-
Fastvpn-secure and flexible networking for industry 4.0 , Apr 2018, Breitbandversorgung in Deutschland - 12. ITG-Fachkonferenz. Berlin, Germany.: VDE Verlag, Berlin [u. a.], p. 28-35, 8 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations , Mar 2018, Vol. 2018Electronic (full-text) versionResearch output: Preprint/documentation/report > Working paper
-
Chains and Whips - An approach to lighweight MACs. , 2018Electronic (full-text) versionResearch output: Contribution to conferences > Paper
-
Protecting Communication in Many-Core Systems against Active Attackers. , 2018, ACM Great Lakes Symposium on VLSI. p. 45-50, 6 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Transparent Low-Latency Network Anonymisation for Mobile Devices. , 2018, p. 193-209Electronic (full-text) versionResearch output: Contribution to conferences > Paper
2017
-
Towards a Concurrent and Distributed Route Selection for Payment Channel Networks , Sep 2017, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. p. 411–419Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Analysis of Mozambican websites: How do they protect their users? , 1 Jul 2017, 2017 Information Security for South Africa - Proceedings of the 2017 ISSA Conference. Venter, H. S., Loock, M., Coetzee, M., Eloff, M. M. & Eloff, J. H. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 90-97, 8 p.Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Robust Secret Sharing for End-to-End Key Establishment with Physical Layer Keys Under Active Attacks , Jul 2017, Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security. Paris, France, p. 15–32Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
SecureCloud: Secure big data processing in untrusted clouds , 11 May 2017, Proceedings of the 2017 Design, Automation and Test in Europe, DATE 2017. Lausanne: Institute of Electrical and Electronics Engineers (IEEE), p. 282-285, 4 p., 7926999Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution
-
Speed Dating: A Performance-Enhanced Rendezvous Circuit for Tor , May 2017, Proceedings of the 20th IEEE Global Internet Symposium (GI~'17). p. 880-885Electronic (full-text) versionResearch output: Contribution to book/conference proceedings/anthology/report > Conference contribution