Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

Ingrid Ahlhorn

+49 (0) 441 - 798 2426

I 11 0-014

Industriestrasse 11, 26121 Oldenburg

Publikationen

Publikationen

  1. [inproceedings] bibtex | Dokument aufrufen
    C. Brzuska, H. Busch, O. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, und others, "Redactable signatures for tree-structured data: Definitions and constructions" in Proc. of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), 2010.
  2. [inproceedings] bibtex | Dokument aufrufen
    M. Franz, P. Williams, B. Carbunar, S. Katzenbeisser, A. Peter, R. Sion, und M. Sotakova, "Oblivious outsourced storage with delegation" in Proc. of the 15th International Conference on Financial Cryptography and Data Security (FC 2011), 2011.
  3. F. Armknecht, S. Katzenbeisser, und A. Peter, "Group homomorphic encryption: characterizations, impossibility results, and applications" Designs, Codes and Cryptography (DESI), vol. 67, iss. 2. 2013.
  4. [inproceedings] bibtex | Dokument aufrufen
    Ü. Kocabacs, A. Peter, S. Katzenbeisser, und A. Sadeghi, "Converse PUF-based authentication" in Proc. of the 5th International Conference on Trust and Trustworthy Computing (TRUST 2012), 2012.
  5. [inproceedings] bibtex | Dokument aufrufen
    A. Peter, T. Hartmann, S. Müller, und S. Katzenbeisser, "Privacy-preserving architecture for forensic image recognition" in Proc. of the 4th IEEE International Workshop on Information Forensics and Security (WIFS 2012), 2012.
  6. A. Peter, E. Tews, und S. Katzenbeisser, "Efficiently outsourcing multiparty computation under multiple keys" IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, iss. 12. 2013.
  7. [inproceedings] bibtex | Dokument aufrufen
    F. Armknecht, S. Katzenbeisser, und A. Peter, "Shift-type homomorphic encryption and its application to fully homomorphic encryption" in Proc. of the 5th International Conference on Cryptology in Africa (AfricaCrypt 2012), 2012.
  8. [inproceedings] bibtex | Dokument aufrufen
    A. Peter, M. Kronberg, W. Trei, und S. Katzenbeisser, "Additively homomorphic encryption with a double decryption mechanism, revisited" in Proc. of the 15th International Conference on Information Security (ISC 2012), 2012.
  9. [inproceedings] bibtex | Dokument aufrufen
    A. Jeckmans, A. Peter, und P. Hartel, "Efficient privacy-enhanced familiarity-based recommender system" in Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013), 2013.
  10. [inproceedings] bibtex | Dokument aufrufen
    E. Makri, M. H. Everts, S. D. Hoogh, A. Peter, H. O. D. Akker, P. Hartel, und W. Jonker, "Privacy-preserving verification of clinical research" in Proc. of SICHERHEIT 2014--Sicherheit, Schutz und Zuverlässigkeit, 2014.
  11. [inproceedings] bibtex | Dokument aufrufen
    F. Armknecht, T. Gagliardoni, S. Katzenbeisser, und A. Peter, "General impossibility of group homomorphic encryption in the quantum world" in Proc. of the 17th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2014), 2014.
  12. [inproceedings] bibtex | Dokument aufrufen
    S. Biedermann, N. P. Karvelas, S. Katzenbeisser, T. Strufe, und A. Peter, "Proofbook: An online social network based on proof-of-work and friend-propagation" in Proc. of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 2014.
  13. [inproceedings] bibtex | Dokument aufrufen
    C. Bösch, A. Peter, P. Hartel, und W. Jonker, "SOFIR: Securely outsourced Forensic image recognition" in Proc. of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), 2014.
  14. [inproceedings] bibtex | Dokument aufrufen
    C. Bösch, A. Peter, B. Leenders, H. W. Lim, Q. Tang, H. Wang, P. Hartel, und W. Jonker, "Distributed searchable symmetric encryption" in Proc. of the 12th Annual International Conference on Privacy, Security and Trust (PST 2014), 2014.
  15. [inproceedings] bibtex | Dokument aufrufen
    F. Günther, M. Manulis, und A. Peter, "Privacy-enhanced participatory sensing with collusion resistance and data aggregation" in Proc. of the 13th International Conference on Cryptology and Network Security (CANS 2014), 2014.
  16. C. Bösch, P. Hartel, W. Jonker, und A. Peter, "A survey of provably secure searchable encryption" ACM Computing Surveys (CSUR), vol. 47, iss. 2. 2014.
  17. [inproceedings] bibtex | Dokument aufrufen
    N. Karvelas, A. Peter, S. Katzenbeisser, E. Tews, und K. Hamacher, "Privacy-preserving whole genome sequence processing through proxy-aided ORAM" in Proc. of the 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 2014.
  18. [inproceedings] bibtex | Dokument aufrufen
    S. Dietzel, A. Peter, und F. Kargl, "Secure cluster-based in-network information aggregation for vehicular networks" in Proc. of the 81st IEEE Vehicular Technology Conference (VTC2015-Spring), 2015.
  19. [inproceedings] bibtex | Dokument aufrufen
    B. G. Bakondi, A. Peter, M. Everts, P. Hartel, und W. Jonker, "Publicly verifiable private aggregation of time-series data" in Proc. of the 10th International Conference on Availability, Reliability and Security (ARES 2015), 2015.
  20. [inproceedings] bibtex | Dokument aufrufen
    R. Bortolameotti, A. Peter, M. H. Everts, und D. Bolzoni, "Indicators of malicious SSL connections" in Proc. of the 9th International Conference on Network and System Security (NSS 2015), 2015.
  21. [inproceedings] bibtex | Dokument aufrufen
    T. van de Kamp, A. Peter, M. H. Everts, und W. Jonker, "Private sharing of IOCs and sightings" in Proc. of the 3rd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2016), 2016.
  22. [inproceedings] bibtex | Dokument aufrufen
    R. Bortolameotti, A. Peter, M. H. Everts, W. Jonker, und P. Hartel, "Reliably determining data leakage in the presence of strong attackers" in Proc. of the 32nd Annual Conference on Computer Security Applications (ACSAC 2016), 2016.
  23. [inproceedings] bibtex | Dokument aufrufen
    N. P. Karvelas, A. Peter, und S. Katzenbeisser, "Using oblivious RAM in genomic studies" in Proc. of the 12th International Workshop on Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2017), 2017.
  24. [inproceedings] bibtex | Dokument aufrufen
    R. Bortolameotti, T. van Ede, M. Caselli, M. H. Everts, P. Hartel, R. Hofstede, W. Jonker, und A. Peter, "DECANTER: Detection of anomalous outbound http traffic by passive application fingerprinting" in Proc. of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), 2017.
  25. [inproceedings] bibtex | Dokument aufrufen
    T. van de Kamp, A. Peter, M. H. Everts, und W. Jonker, "Multi-client predicate-only encryption for conjunctive equality tests" in Proc. of the 16th International Conference on Cryptology and Network Security (CANS 2017), 2017.
  26. [inproceedings] bibtex | Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, und A. Peter, "Automatic deployment of specification-based intrusion detection in the BACnet protocol" in Proc. of the 3rd ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC 2017), 2017.
  27. [inproceedings] bibtex | Dokument aufrufen
    H. Kopp, F. Kargl, C. Bösch, und A. Peter, "UMine: A Blockchain Based on Human Miners" in Proc. of the 20th International Conference on Information and Communications Security (ICICS 2018), 2018.
  28. [inproceedings] bibtex | Dokument aufrufen
    V. M. Vilches, L. A. Kirschgens, A. B. Calvo, A. H. Cordero, R. I. Pisón, D. M. Vilches, A. M. Rosas, G. O. Mendia, L. U. S. Juan, I. Z. Ugarte, und others, "Introducing the robot security framework (rsf), a standardized methodology to perform security assessments in robotics" in Proc. of the Symposium on Blockchain for Robotic Systems (BROS 2018), 2018.
  29. [inproceedings] bibtex | Dokument aufrufen
    T. van de Kamp, D. Stritzl, W. Jonker, und A. Peter, "Two-client and multi-client functional encryption for set intersection" in Proc. of the 24th Australasian Conference on Information Security and Privacy (ACISP 2019), 2019.
  30. [inproceedings] bibtex | Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, E. Tews, D. Bucur, und A. Peter, "BACRank: ranking building automation and control system components by business continuity impact" in Proc. of the 38th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019), 2019.
  31. [inproceedings] bibtex | Dokument aufrufen
    R. Bortolameotti, T. van Ede, A. Continella, M. Everts, W. Jonker, P. Hartel, und A. Peter, "Victim-Aware Adaptive Covert Channels" in Proc. of the 15th EAI International Conference on Security and Privacy in Communication Systems (SecureComm 2019), 2019.
  32. T. van de Kamp, A. Peter, und W. Jonker, "A multi-authority approach to various predicate encryption types" Designs, Codes and Cryptography (DESI), vol. 88, iss. 2. 2020.
  33. [inproceedings] bibtex | Dokument aufrufen
    R. Bortolameotti, T. Van Ede, A. Continella, T. Hupperich, M. H. Everts, R. Rafati, W. Jonker, P. Hartel, und A. Peter, "HeadPrint: detecting anomalous communications through header-based application fingerprinting" in Proc. of the 35th Annual ACM Symposium on Applied Computing (SAC 2020), 2020.
  34. [inproceedings] bibtex | Dokument aufrufen
    P. Jakubeit, A. Dercksen, und A. Peter, "SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities" in Proc. of the 13th International Conference on Information Security Theory and Practice (WISTP 2019), 2019.
  35. [inproceedings] bibtex | Dokument aufrufen
    T. van Ede, R. Bortolameotti, A. Continella, J. Ren, D. J. Dubois, M. Lindorfer, D. Choffnes, M. van Steen, und A. Peter, "FlowPrint: Semi-supervised mobile-app fingerprinting on encrypted network traffic" in Proc. of the 27th Annual Network and Distributed System Security Symposium (NDSS 2020), 2020.
  36. V. Legoy, M. Caselli, C. Seifert, und A. Peter, "Automated Retrieval of ATT&CK Tactics and Techniques for Cyber Threat Reports" arXiv preprint arXiv:2004.14322. 2020.
  37. [inproceedings] bibtex | Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, G. J. Laanstra, und A. Peter, "Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective" in Proc. of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2020), 2020.
  38. [inproceedings] bibtex | Dokument aufrufen
    Z. Shang, S. Oya, A. Peter, und F. Kerschbaum, "Obfuscated Access and Search Patterns in Searchable Encryption" in Proc. of the 28th Annual Network and Distributed System Security Symposium (NDSS 2021), 2021.
  39. [inproceedings] bibtex | Dokument aufrufen
    V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "K-Anonymous Crowd Flow Analytics" in Proc. of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2020), 2020.
  40. [inproceedings] bibtex | Dokument aufrufen
    V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Privacy-Preserving Crowd-Monitoring Using Bloom Filters and Homomorphic Encryption" in Proc. of the 4th International Workshop on Edge Systems, Analytics and Networking (EdgeSys 2021), 2021.
  41. F. Engelmann, L. Müller, A. Peter, F. Kargl, und C. Bösch, "SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges" Proceedings on Privacy Enhancing Technologies (PoPETs), vol. 2021, iss. 4. 2021.
  42. [inproceedings] bibtex | Dokument aufrufen
    R. G. Roessink, A. Peter, und F. Hahn, "Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements" in Proc. of the 19th International Conference on Applied Cryptography and Network Security (ACNS 2021), 2021.
  43. [inproceedings] bibtex | Dokument aufrufen
    T. van Ede, H. Aghakhani, N. Spahn, R. Bortolameotti, M. Cova, A. Continella, M. van Steen, A. Peter, C. Kruegel, und G. Vigna, "DEEPCASE: Semi-Supervised Contextual Analysis of Security Events" in Proc. of the IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022.
  44. [inproceedings] bibtex | Dokument aufrufen
    M. Damie, F. Hahn, und A. Peter, "A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents" in Proc. of the 30th USENIX Security Symposium (USENIX Security 2021), 2021.
  45. [inproceedings] bibtex | Dokument aufrufen
    H. Esquivel-Vargas, M. Caselli, und A. Peter, "BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol" in Proc. of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S 2021), 2021.
  46. [inproceedings] bibtex | Dokument aufrufen
    A. Bassit, F. Hahn, C. Zeinstra, R. Veldhuis, und A. Peter, "Bloom Filter vs Homomorphic Encryption: Which approach protects the biometric data and satisfies ISO/IEC 24745?" in Proc. of the 20th International Conference of the Biometrics Special Interest Group (BIOSIG 2021), 2021.
  47. A. Bassit, F. Hahn, J. Peeters, T. Kevenaar, R. Veldhuis, und A. Peter, "Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries" IEEE Transactions on Information Forensics and Security (TIFS), vol. 16. 2021.
  48. [inproceedings] bibtex | Dokument aufrufen
    M. Dijkslag, M. Damie, F. Hahn, und A. Peter, "Passive query-recovery attack against secure conjunctive keyword search schemes" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022), 2022.
  49. [inproceedings] bibtex | Dokument aufrufen
    H. Esquivel-Vargas, J. Castellanos, M. Caselli, N. Tippenhauer, und A. Peter, "Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge" in Proc. of the 20th International Conference on Applied Cryptography and Network Security (ACNS 2022), 2022.
  50. [inproceedings] bibtex | Dokument aufrufen
    J. Weener, F. Hahn, und A. Peter, "Libertas: Backward Private Dynamic Searchable Symmetric Encryption Supporting Wildcards" in Proc. of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2022), 2022.
  51. A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Hybrid Biometric Template Protection: Resolving the Agony of Choice between Bloom Filters and Homomorphic Encryption" IET Biometrics. 2022.
  52. [inproceedings] bibtex | Dokument aufrufen
    T. Bontekoe, M. Everts, und A. Peter, "Balancing privacy and accountability in digital payment methods using zk-SNARKs" in Proc. of the 19th Annual International Conference on Privacy, Security, and Trust (PST 2022), 2022.
  53. [inproceedings] bibtex | Dokument aufrufen
    A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Multiplication-Free Biometric Recognition for Faster Processing under Encryption" in Proc. of the 2022 International Joint Conference on Biometrics (IJCB 2022), 2022.
  54. [inproceedings] bibtex | Dokument aufrufen
    V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Anonymized Counting of Nonstationary Wi-Fi Devices When Monitoring Crowds" in Proc. of the 25th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2022), 2022.
  55. [inproceedings] bibtex | Dokument aufrufen
    P. Jakubeit, A. Peter, und M. van Steen, "The Measurable Environment as Nonintrusive Authentication Factor on the Example of WiFi Beacon Frames" in Proc. of the 5th International Workshop on Emerging Technologies for Authorization and Authentication (ETAA 2022), 2023.
  56. [inproceedings] bibtex | Dokument aufrufen
    A. El Khairi, M. Caselli, C. Knierim, A. Peter, und A. Continella, "Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection" in Proc. of the 13th ACM Cloud Computing Security Workshop (CCSW 2022), 2022.
  57. [inproceedings] bibtex | Dokument aufrufen
    M. van Steen, V. Stanciu, N. Shafaeipour, C. Chilipirea, C. Dobre, A. Peter, und M. Wang, "Challenges in Automated Measurement of Pedestrian Dynamics" in Proc. of the 22nd IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS 2022), 2022.
  58. [inproceedings] bibtex | Dokument aufrufen
    F. Mazzone, L. van den Heuvel, M. Huber, C. Verdecchia, M. Everts, F. Hahn, und A. Peter, "Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks" in Proc. of the 15th ACM Workshop on Artificial Intelligence and Security (AISec 2022), 2022.
  59. C. Sabater, F. Hahn, A. Peter, und J. Ramon, "Private Sampling with Identifiable Cheaters" Proceedings on Privacy Enhancing Technologies (PoPETs). 2023.
  60. [inproceedings] bibtex | Dokument aufrufen
    P. Jakubeit, A. Peter, und M. van Steen, "LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity" in Proc. of the 18th International Conference on Information Security Practice and Experience (ISPEC 2023), 2023.
  61. [inproceedings] bibtex | Dokument aufrufen
    A. Bassit, F. Hahn, Z. Rezgui, U. Kelly, R. Veldhuis, und A. Peter, "Template Recovery Attack on Homomorphically Encrypted Biometric Recognition Systems with Unprotected Threshold Comparison" in Proc. of the 2023 International Joint Conference on Biometrics (IJCB 2023), 2023.
  62. [inproceedings] bibtex | Dokument aufrufen
    J. Starink, M. Huisman, A. Peter, und A. Continella, "Understanding and Measuring Inter-Process Code Injection in Windows Malware" in Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), 2023.
  63. V. Stanciu, M. van Steen, C. Dobre, und A. Peter, "Privacy-friendly statistical counting for pedestrian dynamics" Computer Communications, vol. 211. 2023.
  64. A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Improved Multiplication-Free Biometric Recognition Under Encryption" IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM). 2023.
  65. [inproceedings] bibtex | Dokument aufrufen
    A. El Khairi, M. Caselli, A. Peter, und A. Continella, "ReplicaWatcher: Training-less Anomaly Detection in Containerized Microservices" in Proc. of the 31th Annual Network and Distributed System Security Symposium (NDSS 2024), 2024.
  66. [inproceedings] bibtex | Dokument aufrufen
    P. Jakubeit, A. Peter, und M. van Steen, "RoomKey: Extracting a Volatile Key with Information from the Local WiFi Environment Reconstructable within a Designated Area" in Proc. of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 2024.
  67. [inproceedings] bibtex | Dokument aufrufen
    P. Jakubeit, A. Peter, und M. van Steen, "SPAWN: Seamless Proximity-based Authentication by Utilizing the Existent WiFi Environment" in Proc. of the 14th International Conference on Information Security Theory and Practice (WISTP 2024), 2024.
  68. [inproceedings] bibtex | Dokument aufrufen
    Z. Kucsvan, M. Caselli, A. Peter, und A. Continella, "Inferring Recovery Steps from Cyber Threat Intelligence Reports" in Proc. of the 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2024), 2024.
  69. [inproceedings] bibtex | Dokument aufrufen
    J. van Nielen, A. Peter, und A. Continella, "frameD: Toward Automated Identification of Embedded Frameworks in Firmware Images" in Proc. of the 10th International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS 2024), 2025.
  70. A. Bassit, F. Hahn, R. Veldhuis, und A. Peter, "Practical Biometric Search under Encryption: Meeting the NIST Runtime Requirement without Loss of Accuracy" IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM). 2025.
  71. J. Starink, M. Huisman, A. Peter, und A. Continella, "Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware" ACM Transactions on Privacy and Security (TOPS), vol. 28, iss. 3. 2025.
  72. A. Bassit, F. Hahn, Z. Rezgui, H. O. Shahreza, R. Veldhuis, und A. Peter, "Template recovery attack on encrypted face recognition systems with unprotected decision using synthetic faces" Frontiers in Imaging. 2025.
  73. [inproceedings] bibtex | Dokument aufrufen
    K. Hobbensiefken, B. Balk, A. Peter, und P. Staudt, "An Organizational Field Experiment on Phishing and Cybersecurity Risk Homeostasis Theory" in Proc. of the 31st Americas Conference on Information Systems (AMCIS 2025), 2025.
  74. [inproceedings] bibtex
    M. Damie, F. Hahn, A. Peter, und J. Ramon, "Eliminating Exponential Key Growth in PRG-Based Distributed Point Functions" in Proc. of the 20th International Workshop on Data Privacy Management (DPM 2025), 2025.
  75. [inproceedings] bibtex | Dokument aufrufen
    M. Damie, J. Leger, F. Hahn, und A. Peter, "Revisiting the Attacker's Knowledge in Inference Attacks Against Searchable Symmetric Encryption" in Proc. of the 23rd Internationl Conference on Applied Cryptography and Network Security (ACNS 2025), 2025.
  76. [inproceedings] bibtex | Dokument aufrufen
    F. Mazzone, A. Al Badawi, Y. Polyakov, M. Everts, F. Hahn, und A. Peter, "Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning" in Proc. of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy (DBSec 2025), 2025.
  77. [inproceedings] bibtex
    F. Mazzone, M. Everts, F. Hahn, und A. Peter, "Efficient Ranking, Order Statistics, and Sorting under CKKS" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  78. [inproceedings] bibtex
    M. Buechel, T. Paladini, S. Longari, M. Carminati, S. Zanero, H. Binyamini, G. Engelberg, D. Klein, G. Guizzardi, M. Caselli, A. Continella, M. van Steen, A. Peter, und T. van Ede, "SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?" in Proc. of the 34th USENIX Security Symposium (USENIX Security 2025), 2025.
  79. [inproceedings] bibtex
    A. El Khairi, A. Peter, und A. Continella, "Procatch: Detecting Execution-based Anomalies in Single-Instance Microservices" in Proc. of the 13th Conference on Communications and Network Security (CNS 2025), 2025.
  80. [inproceedings] bibtex
    A. El Khairi, A. Peter, und A. Continella, "ConLock: Reducing Runtime Attack Surface in Containerized Microservices" in Proc. of the 4th International Workshop on System Security Assurance (SecAssure 2025), 2025.
  81. [article] bibtex
    P. C. Arnold, P. Jakubeit, und A. Peter, "WiPhi: Using Location-Specific WiFi Signals for Password Hardening and Improvement" EURASIP Journal on Information Security. 2025.
  82. [inproceedings] bibtex
    M. Damie, F. Hahn, A. Peter, und J. Ramon, "DDH-based schemes for multi-party Function Secret Sharing" in Proc. of the 30th Nordic Conference on Secure IT Systems (NordSec 2025), 2025.
Webmaster (Stand: 29.09.2025)  Kurz-URL:Shortlink: https://uole.de/p87734
Zum Seitananfang scrollen Scroll to the top of the page