Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

(übergangsweise) Christiane Großmann

A5 2-203

+49 (0) 441 - 798 2065

+49 (0) 441 - 798 4199

Publikationen

Publikationen

  • [inproceedings] bibtex
    M. Dijkslag, M. Damie, F. Hahn, und A. Peter, "Passive query-recovery attack against secure conjunctive keyword search schemes" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022), 2022, to appear.
    @inproceedings{dijkslag2022passive, title={Passive query-recovery attack against secure conjunctive keyword search schemes},
      author={Dijkslag, Marco and Damie, Marc and Hahn, Florian and Peter, Andreas},
      booktitle={of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022)},
      year={2022, to appear},
      organization={Springer, Cham} }
  • [inproceedings] bibtex
    H. Esquivel-Vargas, J. Castellanos, M. Caselli, N. Tippenhauer, und A. Peter, "Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022), 2022, to appear.
    @inproceedings{esquivel2022identifying, title={Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge},
      author={Esquivel-Vargas, Herson and Castellanos, John and Caselli, Marco and Tippenhauer, Nils and Peter, Andreas},
      booktitle={of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022)},
      year={2022, to appear},
      organization={Springer, Cham}
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    T. van Ede, H. Aghakhani, N. Spahn, R. Bortolameotti, M. Cova, A. Continella, M. van Steen, A. Peter, C. Kruegel, und G. Vigna, "DEEPCASE: Semi-Supervised Contextual Analysis of Security Events" in Proc. of the IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022.
    @inproceedings{van2022deepcase, title={DEEPCASE: Semi-Supervised Contextual Analysis of Security Events},
      author={van Ede, Thijs and Aghakhani, Hojjat and Spahn, Noah and Bortolameotti, Riccardo and Cova, Marco and Continella, Andrea and van Steen, Maarten and Peter, Andreas and Kruegel, Christopher and Vigna, Giovanni},
      booktitle={of the IEEE Symposium on Security and Privacy (S&P 2022). IEEE},
      url={https://vm-thijs.ewi.utwente.nl/static/homepage/papers/deepcase.pdf},
      year={2022} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    M. Damie, F. Hahn, und A. Peter, "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents" in Proc. of the 30th USENIX Security Symposium (USENIX Security 2021), 2021, pp. 143-160.
    @inproceedings{damie2021highly, title={A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents},
      author={Damie, Marc and Hahn, Florian and Peter, Andreas},
      booktitle={of the 30th USENIX Security Symposium (USENIX Security 2021)},
      pages={143--160},
      url={https://www.usenix.org/system/files/sec21-damie.pdf},
      year={2021} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption" in Proc. of the 4th International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2021), 2021, pp. 37-42.
    @inproceedings{stanciu2021privacy, title={Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption},
      author={Stanciu, Valeriu-Daniel and Steen, Maarten van and Dobre, Ciprian and Peter, Andreas},
      booktitle={of the 4th International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2021)},
      pages={37--42},
      url={https://dl.acm.org/doi/pdf/10.1145/3434770.3459735},
      year={2021} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    Z. Shang, S. Oya, A. Peter, und F. Kerschbaum, "Obfuscated Access and Search Patterns in Searchable Encryption" in Proc. of the 28th Annual Network and Distributed System Security Symposium (NDSS 2021), 2021.
    @inproceedings{Shang2021Obfuscated, title={Obfuscated Access and Search Patterns in Searchable Encryption},
      author={Shang, Zhiwei and Oya, Simon and Peter, Andreas and Kerschbaum, Florian},
      booktitle={of the 28th Annual Network and Distributed System Security Symposium (NDSS 2021)},
      volume={28},
      organization={The Internet Society},
      url={https://arxiv.org/pdf/2102.09651},
      year={2021} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    A. Bassit, F. Hahn, C. Zeinstra, R. Veldhuis, und A. Peter, "Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?" in Proc. of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021), 2021, pp. 1-6.
    @inproceedings{bassit2021bloom, title={Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?},
      author={Bassit, Amina and Hahn, Florian and Zeinstra, Chris and Veldhuis, Raymond and Peter, Andreas},
      booktitle={of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021)},
      pages={1--6},
      year={2021},
      url={https://dl.gi.de/bitstream/handle/20.500.12116/37445/biosig2021_proceedings_11.pdf?sequence=1&isAllowed=y},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, und A. Peter, "BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol" in Proc. of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S 2021), 2021, pp. 45-48.
    @inproceedings{esquivel2021bacgraph, title={BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol},
      author={Esquivel-Vargas, Herson and Caselli, Marco and Peter, Andreas},
      booktitle={of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S 2021)},
      pages={45--48},
      year={2021},
      url={https://ieeexplore.ieee.org/abstract/document/9525493/},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. G. Roessink, A. Peter, und F. Hahn, "Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements" in Proc. of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021), 2021, pp. 155-183.
    @inproceedings{roessink2021experimental, title={Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements},
      author={Roessink, Ruben Groot and Peter, Andreas and Hahn, Florian},
      booktitle={of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021)},
      pages={155--183},
      year={2021},
      url={https://link.springer.com/chapter/10.1007/978-3-030-78375-4_7},
      organization={Springer, Cham} }
  • A. Bassit, F. Hahn, J. Peeters, T. Kevenaar, R. Veldhuis, und A. Peter, "Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries" IEEE Transactions on Information Forensics and Security (TIFS), vol. 16, pp. 5045-5060, 2021.
    @article{bassit2021fast, title={Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries},
      author={Bassit, Amina and Hahn, Florian and Peeters, Joep and Kevenaar, Tom and Veldhuis, Raymond and Peter, Andreas},
      journal={IEEE Transactions on Information Forensics and Security (TIFS)},
      volume={16},
      pages={5045--5060},
      year={2021},
      url={https://ieeexplore.ieee.org/iel7/10206/9151439/09585508.pdf},
      publisher={IEEE} }
  • F. Engelmann, L. Müller, A. Peter, F. Kargl, und C. Bösch, "SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges" Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 2021, iss. 4, pp. 270-290, 2021.
    @article{engelmann2021swapct, title={SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges},
      author={Engelmann, Felix and M{\"u}ller, Lukas and Peter, Andreas and Kargl, Frank and B{\"o}sch, Christoph},
      journal={Proceedings on Privacy Enhancing Technologies (PoPETs)},
      volume={2021},
      number={4},
      pages={270--290},
      publisher={Sciendo (De Gruyter)},
      url={https://sciendo.com/pdf/10.2478/popets-2021-0070},
      year={2021} }
  • V. Legoy, M. Caselli, C. Seifert, und A. Peter, "Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports" arXiv preprint arXiv:2004.14322, 2020.
    @article{legoy2020automated, title={Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports},
      author={Legoy, Valentine and Caselli, Marco and Seifert, Christin and Peter, Andreas},
      journal={arXiv preprint arXiv:2004.14322},
      url={https://arxiv.org/pdf/2004.14322},
      year={2020} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. Bortolameotti, T. Van Ede, A. Continella, T. Hupperich, M. H. Everts, R. Rafati, W. Jonker, P. Hartel, und A. Peter, "HeadPrint: detecting anomalous communications through header-based application fingerprinting" in Proc. of the 35th Annual ACM Symposium on Applied Computing (SAC 2020), 2020, pp. 1696-1705.
    @inproceedings{bortolameotti2020headprint, title={HeadPrint: detecting anomalous communications through header-based application fingerprinting},
      author={Bortolameotti, Riccardo and Van Ede, Thijs and Continella, Andrea and Hupperich, Thomas and Everts, Maarten H and Rafati, Reza and Jonker, Willem and Hartel, Pieter and Peter, Andreas},
      booktitle={of the 35th Annual ACM Symposium on Applied Computing (SAC 2020)},
      pages={1696--1705},
      url={https://www.conand.me/publications/bortolameotti-headprint-2020.pdf},
      year={2020} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "K-Anonymous Crowd Flow Analytics" in Proc. of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2020), 2020.
    @inproceedings{stanciu2020k, title={k-Anonymous Crowd Flow Analytics},
      author={Stanciu, Valeriu-Daniel and van Steen, Maarten and Dobre, Ciprian and Peter, Andreas},
      booktitle={of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2020)},
      organization={ACM},
      url={https://www.distributed-systems.net/my-data/papers/2020.mobiquitous.pdf},
      year={2020} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, G. J. Laanstra, und A. Peter, "Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective" in Proc. of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020), 2020, pp. 44-64.
    @inproceedings{esquivel2020putting, title={Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective},
      author={Esquivel-Vargas, Herson and Caselli, Marco and Laanstra, Geert Jan and Peter, Andreas},
      booktitle={of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020)},
      pages={44--64},
      year={2020},
      url={https://link.springer.com/chapter/10.1007/978-3-030-52683-2_3},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. J. Dubois, M. Lindorfer, D. Choffnes, M. van Steen, und A. Peter, "FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic" in Proc. of the 27th Annual Network and Distributed System Security Symposium (NDSS 2020), 2020.
    @inproceedings{van2020flowprint, title={FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic},
      author={van Ede, Thijs and Bortolameotti, Riccardo and Continella, Andrea and Ren, Jingjing and Dubois, Daniel J and Lindorfer, Martina and Choffnes, David and van Steen, Maarten and Peter, Andreas},
      booktitle={of the 27th Annual Network and Distributed System Security Symposium (NDSS 2020)},
      volume={27},
      organization={The Internet Society},
      url={https://par.nsf.gov/servlets/purl/10192513},
      year={2020} }
  • T. van de Kamp, A. Peter, und W. Jonker, "A multi-authority approach to various predicate encryption types" Designs, Codes and Cryptography (DESI), vol. 88, iss. 2, pp. 363-390, 2020.
    @article{van2020multi, title={A multi-authority approach to various predicate encryption types},
      author={van de Kamp, Tim and Peter, Andreas and Jonker, Willem},
      journal={Designs, Codes and Cryptography (DESI)},
      volume={88},
      number={2},
      pages={363--390},
      year={2020},
      url={https://link.springer.com/article/10.1007/s10623-019-00686-x},
      publisher={Springer US} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. Bortolameotti, T. van Ede, A. Continella, M. Everts, W. Jonker, P. Hartel, und A. Peter, "Victim-Aware Adaptive Covert Channels" in Proc. of the 15th EAI International Conference on Security and Privacy in Communication Systems (SecureComm 2019), 2019, pp. 450-471.
    @inproceedings{bortolameotti2019victim, title={Victim-Aware Adaptive Covert Channels},
      author={Bortolameotti, Riccardo and van Ede, Thijs and Continella, Andrea and Everts, Maarten and Jonker, Willem and Hartel, Pieter and Peter, Andreas},
      booktitle={of the 15th EAI International Conference on Security and Privacy in Communication Systems (SecureComm 2019)},
      pages={450--471},
      year={2019},
      url={https://www.conand.me/publications/bortolameotti-chameleon-2019.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, E. Tews, D. Bucur, und A. Peter, "BACRank: ranking building automation and control system components by business continuity impact" in Proc. of the 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019), 2019, pp. 183-199.
    @inproceedings{esquivel2019bacrank, title={BACRank: ranking building automation and control system components by business continuity impact},
      author={Esquivel-Vargas, Herson and Caselli, Marco and Tews, Erik and Bucur, Doina and Peter, Andreas},
      booktitle={of the 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019)},
      pages={183--199},
      year={2019},
      url={http://doina.net/pubs/SafeComp19-EsquivelVargas.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    P. Jakubeit, A. Dercksen, und A. Peter, "SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities" in Proc. of the 13th International Conference on Information Security Theory and Practice (WISTP 2019), 2019, pp. 202-219.
    @inproceedings{jakubeit2019ssi, title={SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities},
      author={Jakubeit, Philipp and Dercksen, Albert and Peter, Andreas},
      booktitle={of the 13th International Conference on Information Security Theory and Practice (WISTP 2019)},
      pages={202--219},
      organization={Springer},
      url={https://books.google.com/books?hl=en&lr=&id=IsPTDwAAQBAJ&oi=fnd&pg=PA202&dq=info:qrmlqyf6UZgJ:scholar.google.com&ots=UvWo8D5KbA&sig=Q0frZ0x863DnYr8YzMk0fRbz13s},
      year={2019} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    T. van de Kamp, D. Stritzl, W. Jonker, und A. Peter, "Two-client and multi-client functional encryption for set intersection" in Proc. of the 24th Australasian Conference on Information Security and Privacy (ACISP 2019), 2019, pp. 97-115.
    @inproceedings{van2019two, title={Two-client and multi-client functional encryption for set intersection},
      author={van de Kamp, Tim and Stritzl, David and Jonker, Willem and Peter, Andreas},
      booktitle={of the 24th Australasian Conference on Information Security and Privacy (ACISP 2019)},
      pages={97--115},
      year={2019},
      url={https://timvandekamp.nl/paper/KSJ+19_acisp19.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    V. M. Vilches, L. A. Kirschgens, A. B. Calvo, A. H. Cordero, R. I. Pisón, D. M. Vilches, A. M. Rosas, G. O. Mendia, L. U. S. Juan, I. Z. Ugarte, und others, "Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics" in Proc. of the Symposium on Blockchain for Robotic Systems (BROS 2018), 2018.
    @inproceedings{vilches2018introducing, title={Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics},
      author={Vilches, V{\'\i}ctor Mayoral and Kirschgens, Laura Alzola and Calvo, Asier Bilbao and Cordero, Alejandro Hern{\'a}ndez and Pis{\'o}n, Rodrigo Izquierdo and Vilches, David Mayoral and Rosas, Aday Muniz and Mendia, Gorka Olalde and Juan, Lander Usategi San and Ugarte, Irati Zamalloa and others},
      booktitle={of the Symposium on Blockchain for Robotic Systems (BROS 2018)},
      url={https://arxiv.org/pdf/1806.04042},
      year={2018} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    H. Kopp, F. Kargl, C. Bösch, und A. Peter, "UMine: A Blockchain Based on Human Miners" in Proc. of the 20th International Conference on Information and Communications Security (ICICS 2018), 2018, pp. 20-38.
    @inproceedings{kopp2018umine, title={uMine: A Blockchain Based on Human Miners},
      author={Kopp, Henning and Kargl, Frank and B{\"o}sch, Christoph and Peter, Andreas},
      booktitle={of the 20th International Conference on Information and Communications Security (ICICS 2018)},
      pages={20--38},
      year={2018},
      url={https://eprint.iacr.org/2018/722.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. Bortolameotti, T. van Ede, M. Caselli, M. H. Everts, P. Hartel, R. Hofstede, W. Jonker, und A. Peter, "DECANTER: Detection of anomalous outbound http traffic by passive application fingerprinting" in Proc. of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), 2017, pp. 373-386.
    @inproceedings{bortolameotti2017decanter, title={DECANTER: Detection of anomalous outbound http traffic by passive application fingerprinting},
      author={Bortolameotti, Riccardo and van Ede, Thijs and Caselli, Marco and Everts, Maarten H and Hartel, Pieter and Hofstede, Rick and Jonker, Willem and Peter, Andreas},
      booktitle={of the 33rd Annual Computer Security Applications Conference (ACSAC 2017)},
      pages={373--386},
      organization={ACM},
      url={https://dl.acm.org/doi/pdf/10.1145/3134600.3134605},
      year={2017} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, und A. Peter, "Automatic deployment of specification-based intrusion detection in the BACnet protocol" in Proc. of the 3rd ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2017), 2017, pp. 25-36.
    @inproceedings{esquivel2017automatic, title={Automatic deployment of specification-based intrusion detection in the BACnet protocol},
      author={Esquivel-Vargas, Herson and Caselli, Marco and Peter, Andreas},
      booktitle={of the 3rd ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2017)},
      pages={25--36},
      organization={ACM},
      url={https://dl.acm.org/doi/abs/10.1145/3140241.3140244},
      year={2017} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    N. P. Karvelas, A. Peter, und S. Katzenbeisser, "Using oblivious RAM in genomic studies" in Proc. of the 12th International Workshop on Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2017), 2017, pp. 35-52.
    @inproceedings{karvelas2017using, title={Using oblivious RAM in genomic studies},
      author={Karvelas, Nikolaos P and Peter, Andreas and Katzenbeisser, Stefan},
      booktitle={of the 12th International Workshop on Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2017)},
      pages={35--52},
      year={2017},
      url={https://link.springer.com/chapter/10.1007/978-3-319-67816-0_3},
      publisher={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    T. van de Kamp, A. Peter, M. H. Everts, und W. Jonker, "Multi-client predicate-only encryption for conjunctive equality tests" in Proc. of the 16th International Conference on Cryptology and Network Security (CANS 2017), 2017, pp. 135-157.
    @inproceedings{van2017multi, title={Multi-client predicate-only encryption for conjunctive equality tests},
      author={van de Kamp, Tim and Peter, Andreas and Everts, Maarten H and Jonker, Willem},
      booktitle={of the 16th International Conference on Cryptology and Network Security (CANS 2017)},
      pages={135--157},
      year={2017},
      url={https://research.utwente.nl/files/28124881/KPE_17_cans17.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. Bortolameotti, A. Peter, M. H. Everts, W. Jonker, und P. Hartel, "Reliably determining data leakage in the presence of strong attackers" in Proc. of the 32nd Annual Conference on Computer Security Applications (ACSAC 2016), 2016, pp. 484-495.
    @inproceedings{bortolameotti2016reliably, title={Reliably determining data leakage in the presence of strong attackers},
      author={Bortolameotti, Riccardo and Peter, Andreas and Everts, Maarten H and Jonker, Willem and Hartel, Pieter},
      booktitle={of the 32nd Annual Conference on Computer Security Applications (ACSAC 2016)},
      pages={484--495},
      organization={ACM},
      url={https://dl.acm.org/doi/pdf/10.1145/2991079.2991095},
      year={2016} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    T. van de Kamp, A. Peter, M. H. Everts, und W. Jonker, "Private sharing of IOCs and sightings" in Proc. of the 3rd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2016), 2016, pp. 35-38.
    @inproceedings{van2016private, title={Private sharing of IOCs and sightings},
      author={van de Kamp, Tim and Peter, Andreas and Everts, Maarten H and Jonker, Willem},
      booktitle={of the 3rd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2016)},
      pages={35--38},
      organization={ACM},
      url={http://library.usc.edu.ph/ACM/SIGSAC%202017/wiscs/p35.pdf},
      year={2016} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    B. G. Bakondi, A. Peter, M. Everts, P. Hartel, und W. Jonker, "Publicly verifiable private aggregation of time-series data" in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), 2015, pp. 50-59.
    @inproceedings{bakondi2015publicly, title={Publicly verifiable private aggregation of time-series data},
      author={Bakondi, Bence G{\'a}bor and Peter, Andreas and Everts, Maarten and Hartel, Pieter and Jonker, Willem},
      booktitle={of the 10th International Conference on Availability, Reliability and Security (ARES 2015)},
      pages={50--59},
      year={2015},
      url={https://nn8.nl/publications/pdfs/Bakondi2015PVP.pdf},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    R. Bortolameotti, A. Peter, M. H. Everts, und D. Bolzoni, "Indicators of malicious SSL connections" in Proc. of the 9th International Conference on Network and System Security (NSS 2015), 2015, pp. 162-175.
    @inproceedings{bortolameotti2015indicators, title={Indicators of malicious SSL connections},
      author={Bortolameotti, Riccardo and Peter, Andreas and Everts, Maarten H and Bolzoni, Damiano},
      booktitle={of the 9th International Conference on Network and System Security (NSS 2015)},
      pages={162--175},
      year={2015},
      url={https://nn8.nl/publications/pdfs/Bortolameotti2015IMS.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    S. Dietzel, A. Peter, und F. Kargl, "Secure cluster-based in-network information aggregation for vehicular networks" in Proc. of the 81st IEEE Vehicular Technology Conference (VTC2015-Spring), 2015, pp. 1-5.
    @inproceedings{dietzel2015secure, title={Secure cluster-based in-network information aggregation for vehicular networks},
      author={Dietzel, Stefan and Peter, Andreas and Kargl, Frank},
      booktitle={of the 81st IEEE Vehicular Technology Conference (VTC2015-Spring)},
      pages={1--5},
      year={2015},
      url={https://ieeexplore.ieee.org/abstract/document/7146074/},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    F. Armknecht, T. Gagliardoni, S. Katzenbeisser, und A. Peter, "General impossibility of group homomorphic encryption in the quantum world" in Proc. of the 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2014), 2014, pp. 556-573.
    @inproceedings{armknecht2014general, title={General impossibility of group homomorphic encryption in the quantum world},
      author={Armknecht, Frederik and Gagliardoni, Tommaso and Katzenbeisser, Stefan and Peter, Andreas},
      booktitle={of the 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2014)},
      pages={556--573},
      year={2014},
      url={https://link.springer.com/content/pdf/10.1007/978-3-642-54631-0_32.pdf},
      organization={Springer, Berlin, Heidelberg} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    S. Biedermann, N. P. Karvelas, S. Katzenbeisser, T. Strufe, und A. Peter, "Proofbook: An online social network based on proof-of-work and friend-propagation" in Proc. of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 2014, pp. 114-125.
    @inproceedings{biedermann2014proofbook, title={Proofbook: An online social network based on proof-of-work and friend-propagation},
      author={Biedermann, Sebastian and Karvelas, Nikolaos P and Katzenbeisser, Stefan and Strufe, Thorsten and Peter, Andreas},
      booktitle={of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014)},
      pages={114--125},
      year={2014},
      url={https://link.springer.com/chapter/10.1007/978-3-319-04298-5_11},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    C. Bösch, A. Peter, B. Leenders, H. W. Lim, Q. Tang, H. Wang, P. Hartel, und W. Jonker, "Distributed searchable symmetric encryption" in Proc. of the 12th Annual International Conference on Privacy, Security and Trust (PST 2014), 2014, pp. 330-337.
    @inproceedings{bosch2014distributed, title={Distributed searchable symmetric encryption},
      author={B{\"o}sch, Christoph and Peter, Andreas and Leenders, Bram and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, Pieter and Jonker, Willem},
      booktitle={of the 12th Annual International Conference on Privacy, Security and Trust (PST 2014)},
      pages={330--337},
      year={2014},
      url={https://core.ac.uk/download/pdf/31146501.pdf},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    C. Bösch, A. Peter, P. Hartel, und W. Jonker, "SOFIR: Securely outsourced Forensic image recognition" in Proc. of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), 2014, pp. 2694-2698.
    @inproceedings{bosch2014sofir, title={SOFIR: Securely outsourced Forensic image recognition},
      author={B{\"o}sch, Christoph and Peter, Andreas and Hartel, Pieter and Jonker, Willem},
      booktitle={of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014)},
      pages={2694--2698},
      year={2014},
      url={https://ris.utwente.nl/ws/files/5494525/SOFIR.pdf},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    F. Günther, M. Manulis, und A. Peter, "Privacy-enhanced participatory sensing with collusion resistance and data aggregation" in Proc. of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014, pp. 321-336.
    @inproceedings{gunther2014privacy, title={Privacy-enhanced participatory sensing with collusion resistance and data aggregation},
      author={G{\"u}nther, Felix and Manulis, Mark and Peter, Andreas},
      booktitle={of the 13th International Conference on Cryptology and Network Security (CANS 2014)},
      pages={321--336},
      year={2014},
      url={https://eprint.iacr.org/2014/382.pdf},
      organization={Springer, Cham} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    N. Karvelas, A. Peter, S. Katzenbeisser, E. Tews, und K. Hamacher, "Privacy-preserving whole genome sequence processing through proxy-aided ORAM" in Proc. of the 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 2014, pp. 1-10.
    @inproceedings{karvelas2014privacy, title={Privacy-preserving whole genome sequence processing through proxy-aided ORAM},
      author={Karvelas, Nikolaos and Peter, Andreas and Katzenbeisser, Stefan and Tews, Erik and Hamacher, Kay},
      booktitle={of the 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014)},
      pages={1--10},
      organization={ACM},
      url={https://www.datenzone.de/blog/wp-content/uploads/2016/06/Privacy-Preserving-Whole-Genome-Sequence-Processing-through-Proxy-Aided-ORAM.pdf},
      year={2014} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    E. Makri, M. H. Everts, S. D. Hoogh, A. Peter, H. O. D. Akker, P. Hartel, und W. Jonker, "Privacy-preserving verification of clinical research" in Proc. of SICHERHEIT 2014--Sicherheit, Schutz und Zuverlässigkeit, 2014, pp. 481-500.
    @inproceedings{makri2014privacy, title={Privacy-preserving verification of clinical research},
      author={Makri, Eleftheria and Everts, Maarten H and Hoogh, Sebastiaan De and Peter, Andreas and Akker, Harm Op Den and Hartel, Pieter and Jonker, Willem},
      booktitle={of SICHERHEIT 2014--Sicherheit, Schutz und Zuverl{\"a}ssigkeit},
      pages={481--500},
      year={2014},
      url={https://dl.gi.de/bitstream/handle/20.500.12116/20065/481.pdf?sequence=1},
      publisher={Gesellschaft f{\"u}r Informatik eV} }
  • C. Bösch, P. Hartel, W. Jonker, und A. Peter, "A survey of provably secure searchable encryption" ACM Computing Surveys (CSUR), vol. 47, iss. 2, pp. 1-51, 2014.
    @article{bosch2014survey, title={A survey of provably secure searchable encryption},
      author={B{\"o}sch, Christoph and Hartel, Pieter and Jonker, Willem and Peter, Andreas},
      journal={ACM Computing Surveys (CSUR)},
      volume={47},
      number={2},
      pages={1--51},
      year={2014},
      url={https://research.utwente.nl/files/6420885/a18-bosch.pdf},
      publisher={ACM New York, NY, USA} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    A. Jeckmans, A. Peter, und P. Hartel, "Efficient privacy-enhanced familiarity-based recommender system" in Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013), 2013, pp. 400-417.
    @inproceedings{jeckmans2013efficient, title={Efficient privacy-enhanced familiarity-based recommender system},
      author={Jeckmans, Arjan and Peter, Andreas and Hartel, Pieter},
      booktitle={of the 18th European Symposium on Research in Computer Security (ESORICS 2013)},
      pages={400--417},
      year={2013},
      url={https://link.springer.com/content/pdf/10.1007/978-3-642-40203-6_23.pdf},
      organization={Springer, Berlin, Heidelberg} }
  • F. Armknecht, S. Katzenbeisser, und A. Peter, "Group homomorphic encryption: characterizations, impossibility results, and applications" Designs, Codes and Cryptography (DESI), vol. 67, iss. 2, pp. 209-232, 2013.
    @article{armknecht2013group, title={Group homomorphic encryption: characterizations, impossibility results, and applications},
      author={Armknecht, Frederik and Katzenbeisser, Stefan and Peter, Andreas},
      journal={Designs, Codes and Cryptography (DESI)},
      volume={67},
      number={2},
      pages={209--232},
      year={2013},
      url={https://link.springer.com/article/10.1007/s10623-011-9601-2},
      publisher={Springer US} }
  • A. Peter, E. Tews, und S. Katzenbeisser, "Efficiently outsourcing multiparty computation under multiple keys" IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, iss. 12, pp. 2046-2058, 2013.
    @article{peter2013efficiently, title={Efficiently outsourcing multiparty computation under multiple keys},
      author={Peter, Andreas and Tews, Erik and Katzenbeisser, Stefan},
      journal={IEEE Transactions on Information Forensics and Security (TIFS)},
      volume={8},
      number={12},
      pages={2046--2058},
      year={2013},
      url={https://ieeexplore.ieee.org/abstract/document/6651830/},
      publisher={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    F. Armknecht, S. Katzenbeisser, und A. Peter, "Shift-type homomorphic encryption and its application to fully homomorphic encryption" in Proc. of the 5th International Conference on Cryptology in Africa (AfricaCrypt 2012), 2012, pp. 234-251.
    @inproceedings{armknecht2012shift, title={Shift-type homomorphic encryption and its application to fully homomorphic encryption},
      author={Armknecht, Frederik and Katzenbeisser, Stefan and Peter, Andreas},
      booktitle={of the 5th International Conference on Cryptology in Africa (AfricaCrypt 2012)},
      pages={234--251},
      year={2012},
      url={https://link.springer.com/chapter/10.1007/978-3-642-31410-0_15},
      organization={Springer, Berlin, Heidelberg} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    Ü. Kocabacs, A. Peter, S. Katzenbeisser, und A. Sadeghi, "Converse PUF-based authentication" in Proc. of the 5th International Conference on Trust and Trustworthy Computing (TRUST 2012), 2012, pp. 142-158.
    @inproceedings{kocabacs2012converse, title={Converse PUF-based authentication},
      author={Kocaba{\c{s}},
      {\"U}nal and Peter, Andreas and Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
      booktitle={of the 5th International Conference on Trust and Trustworthy Computing (TRUST 2012)},
      pages={142--158},
      year={2012},
      url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.396.1400&rep=rep1&type=pdf},
      organization={Springer, Berlin, Heidelberg} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    A. Peter, M. Kronberg, W. Trei, und S. Katzenbeisser, "Additively homomorphic encryption with a double decryption mechanism, revisited" in Proc. of the 15th International Conference on Information Security (ISC 2012), 2012, pp. 242-257.
    @inproceedings{peter2012additively, title={Additively homomorphic encryption with a double decryption mechanism, revisited},
      author={Peter, Andreas and Kronberg, Max and Trei, Wilke and Katzenbeisser, Stefan},
      booktitle={of the 15th International Conference on Information Security (ISC 2012)},
      pages={242--257},
      year={2012},
      url={https://research.utwente.nl/files/5341328/andreas.pdf},
      organization={Springer, Berlin, Heidelberg} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    A. Peter, T. Hartmann, S. Müller, und S. Katzenbeisser, "Privacy-preserving architecture for forensic image recognition" in Proc. of the 4th IEEE International Workshop on Information Forensics and Security (WIFS 2012), 2012, pp. 79-84.
    @inproceedings{peter2012privacy, title={Privacy-preserving architecture for forensic image recognition},
      author={Peter, Andreas and Hartmann, Thomas and M{\"u}ller, Sascha and Katzenbeisser, Stefan},
      booktitle={of the 4th IEEE International Workshop on Information Forensics and Security (WIFS 2012)},
      pages={79--84},
      year={2012},
      url={https://ieeexplore.ieee.org/abstract/document/6412629/},
      organization={IEEE} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    M. Franz, P. Williams, B. Carbunar, S. Katzenbeisser, A. Peter, R. Sion, und M. Sotakova, "Oblivious outsourced storage with delegation" in Proc. of the 15th International Conference on Financial Cryptography and Data Security (FC 2011), 2011, pp. 127-140.
    @inproceedings{franz2011oblivious, title={Oblivious outsourced storage with delegation},
      author={Franz, Martin and Williams, Peter and Carbunar, Bogdan and Katzenbeisser, Stefan and Peter, Andreas and Sion, Radu and Sotakova, Miroslava},
      booktitle={of the 15th International Conference on Financial Cryptography and Data Security (FC 2011)},
      pages={127--140},
      year={2011},
      url={https://link.springer.com/chapter/10.1007/978-3-642-27576-0_11},
      organization={Springer, Berlin, Heidelberg} }
  • [inproceedings] bibtex | Dokument aufrufen Dokument aufrufen
    C. Brzuska, H. Busch, O. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, und others, "Redactable signatures for tree-structured data: Definitions and constructions" in Proc. of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), 2010, pp. 87-104.
    @inproceedings{brzuska2010redactable, title={Redactable signatures for tree-structured data: Definitions and constructions},
      author={Brzuska, Christina and Busch, Heike and Dagdelen, Oezguer and Fischlin, Marc and Franz, Martin and Katzenbeisser, Stefan and Manulis, Mark and Onete, Cristina and Peter, Andreas and Poettering, Bertram and others},
      booktitle={of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010)},
      pages={87--104},
      year={2010},
      url={https://link.springer.com/content/pdf/10.1007/978-3-642-13708-2_6.pdf},
      organization={Springer, Berlin, Heidelberg} }
(Stand: 13.01.2022)