EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Author: Peter, A.
Home Policy Brochure Browse Search User Area Contact Help

2016

van de Kamp, T.R. and Peter, A. and Everts, M.H. and Jonker, W. (2016) Private Sharing of IOCs and Sightings. In: 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. pp. 35-38. ACM. ISBN 978-1-4503-4565-1

2015

Bakondi, B.G. and Peter, A. and Everts, M.H. and Hartel, P.H. and Jonker, W. (2015) Publicly Verifiable Private Aggregation of Time-Series Data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 Aug 2015, Toulouse, France. pp. 50-59. IEEE. ISBN 978-1-4673-6590-1
Bortolameotti, R. and Peter, A. and Everts, M.H. and Bolzoni, D. (2015) Indicators of Malicious SSL Connections. In: 9th International Conference on Network and System Security, NSS 2015, 3-5 Nov 2015, New York, USA. pp. 162-175. Lecture Notes in Computer Science 9408. Springer Verlag. ISBN 978-3-319-25645-0
Dietzel, S. and Peter, A. and Kargl, F. (2015) Secure Cluster-Based In-Network Information Aggregation for Vehicular Networks. In: IEEE 81st Vehicular Technology Conference, VTC Spring 2015, 11-14 May 2015, Glasgow, UK. pp. 1-5. IEEE. ISBN 978-1-4799-8088-8

2014

Armknecht, F. and Gagliardoni, T. and Katzenbeisser, S. and Peter, A. (2014) General Impossibility of Group Homomorphic Encryption in the Quantum World. In: 17th International Conference on Practice and Theory in Public-Key Cryptography. PKC 2014, 26-28 Mar 2014, Buenos Aires, Argentina. pp. 556-573. Lecture Notes in Computer Science 8383. Springer Verlag. ISBN 978-3-642-54630-3
Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4
Biedermann, S. and Karvelas, N. and Katzenbeisser, S. and Strufe, T. and Peter, A. (2014) ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation. In: Proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), 26-29 Jan 2014, Nový Smokovec, Slovakia. pp. 114-125. Lecture Notes in Computer Science 8327. Springer Verlag. ISBN 978-3-319-04297-8
Günther, F. and Manulis, M. and Peter, A. (2014) Privacy-enhanced participatory sensing with collusion resistance and data aggregation. In: 13th International Conference on Cryptology and Network Security (CANS 2014), 22-24 Oct 2014, Heraklion, Crete, Greece. pp. 321-336. Lecture Notes in Computer Science 8813. Springer Verlag. ISBN 978-3-319-12279-3
Karvelas, N. and Peter, A. and Katzenbeisser, S. and Tews, E. and Hamacher, K. (2014) Privacy preserving whole genome sequence processing through proxy-aided ORAM. In: 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014), 3-7 Nov 2014, Scottsdale, AZ, USA. pp. 1-10. ACM. ISBN 978-1-4503-3148-7
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0

2013

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2013) Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, Codes and Cryptography, 67 (2). pp. 209-232. ISSN 0925-1022 *** ISI Impact 0,781 ***
Jeckmans, A.J.P. and Peter, A. and Hartel, P.H. (2013) Efficient privacy-enhanced familiarity-based recommender system. In: Proceedings of the 18th European Symposium on Research in Computer Security, ESORICS 2013, 9-13 Sep 2013, Egham, UK. pp. 400-417. Lecture Notes in Computer Science 8134. Springer. ISBN 978-3-642-40203-6
Peter, A. and Hartman, T. and Muller, S. and Katzenbeisser, S. (2013) Privacy-preserving architecture for forensic image recognition. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, 2-5 Dec 2012, Tenerife, Spain. pp. 79-84. Information Forensics and Security (WIFS), 2012 IEEE International Workshop (13249609). IEEE Computer Society. ISBN 978-1-4673-2285-0
Peter, A. and Tews, E. and Katzenbeisser, S. (2013) Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8 (12). pp. 2046-2058. ISSN 1556-6013 *** ISI Impact 2,441 ***

2012

Armknecht, F. and Katzenbeisser, S. and Peter, A. (2012) Shift-type homomorphic encryption and its application to fully homomorphic encryption. In: 5th International Conference on Cryptology in Africa, AFRICACRYPT 2012, 10-12 Jul 2012, Ifrane, Morocco. pp. 234-251. Lecture Notes in Computer Science 7374. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-31410-0
Kocabas, U. and Peter, A. and Katzenbeisser, S. and Sadeghi, A. (2012) Converse PUF-based authentication. In: 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, 13-15 Jun 2012, Vienna, Austria. pp. 142-158. Lecture Notes in Computer Science 7344. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-30920-5
Peter, A. and Kronberg, M. and Trei, W. and Katzenbeisser, S. (2012) Additively homomorphic encryption with a double decryption mechanism, revisited. In: 15th International Conference on Information Security, ISC 2012, 19-21 Sep 2012, Passau, Gemany. pp. 242-257. Lecture Notes in Computer Science 7483. Springer Verlag. ISSN 1611-3349 ISBN 978-3-642-33383-5

2011

Franz, M. and Williams, P. and Carbunar, B. and Katzenbeisser, S. and Peter, A. and Sion, R. and Sotakova, M. (2011) Oblivious outsourced storage with delegation. In: 15th International Conference on Financial Cryptography and Data Security, FC 2011, 28 Feb - 04 Mar 2011, Gros Islet, St. Lucia. pp. 127-140. Lecture Notes in Computer Science 7035. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-27575-3

2010

Brzuska, C. and Busch, H. and Dagdelen, O. and Fischlin, M. and Franz, M. and Katzenbeisser, S. and Manulis, M. and Onete, C. and Peter, A. and Poetering, B. and Schröder, D. (2010) Redactable signatures for tree-structured data: definitions and constructions. In: 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, 22-25 Jun 2010, Beijing, China. pp. 87-104. Lecture Notes in Computer Science 6123. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-13707-5