Publications
2023
- Published
WAHC'23 Chairs` Welcome Message
Brenner, M., Costache, A. & Rohloff, K., 26 Nov 2023, WAHC ’23: Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. p. III 1 p.Research output: Chapter in book/report/conference proceeding › Foreword/postscript › Research › peer review
- Published
WAHC'23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
Brenner, M., Costache, A. & Rohloff, K., 21 Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. p. 3651-3652 2 p.Research output: Chapter in book/report/conference proceeding › Conference abstract › Research › peer review
- Published
SeCCA: Towards Privacy-Preserving Biclustering Algorithm with Homomorphic Encryption
VahidianSadegh, S., Wiese, L. & Brenner, M., 2023, Privacy and Identity Management . Bieker, F., Meyer, J., Pape, S., Schiering, I. & Weich, A. (eds.). p. 198–213 16 p.Research output: Chapter in book/report/conference proceeding › Conference contribution › Research
2022
- Published
WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Brenner, M., Costache, A. & Rohloff, K., 7 Nov 2022, Association for Computing Machinery (ACM). 2 p. (Proceedings of the ACM Conference on Computer and Communications Security)Research output: Book/Report › Conference proceeding › Research › peer review
2021
- Published
Proceedings of the 9th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Brenner, M. (Editor), Player, R. (Editor) & Rohloff, K. (Editor), 2021, Association for Computing Machinery (ACM).Research output: Book/Report › Conference proceeding › Research › peer review
2020
- Published
Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Brenner, M. (Editor) & Lepoint, T. (Editor), 28 Dec 2020, 70 p.Research output: Book/Report › Conference proceeding › Research › peer review
- Published
CloudDBGuard: A Framework for encrypted data storage in NoSQL Wide Column Stores
Wiese, L., Waage, T. & Brenner, M., Mar 2020, In: Data and Knowledge Engineering. 126, 101732.Research output: Contribution to journal › Article › Research › peer review
- Published
Grundlagen homomorpher Verschlüsselung
Brenner, M., 20 Feb 2020, 30. ID:SMART Workshop. Waldmann, U. (ed.). Darmstadt, p. 22-29Research output: Chapter in book/report/conference proceeding › Conference contribution › Research
2019
- Published
WAHC'19: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography
Brenner, M. (Editor), Lepoint, T. (Editor) & Rohloff, K. (Editor), 11 Nov 2019, New York: Association for Computing Machinery (ACM).Research output: Book/Report › Conference proceeding › Research › peer review
2018
- Published
WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography
Brenner, M. (Editor) & Rohloff, K. (Editor), 15 Oct 2018, Association for Computing Machinery (ACM). 2 p. (Proceedings of the ACM Conference on Computer and Communications Security)Research output: Book/Report › Conference proceeding › Research › peer review
- Published
Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse
Wiese, L., Homann, D., Waage, T. & Brenner, M., 2018, SICHERHEIT 2018. Gesellschaft fur Informatik (GI), p. 221-234Research output: Chapter in book/report/conference proceeding › Conference contribution › Research › peer review
2017
- Published
21st International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2017 Workshops BITCOIN, TA, VOTING, WAHC and WTSC
Brenner, M. (Editor) & Rohloff, K. (Editor), 2017, Springer Verlag.Research output: Book/Report › Conference proceeding › Research › peer review
- Published
White Paper: Standardizing an API for RLWE-Based Homomorphic Encryption
Brenner, M., Dai, W., Halevi, S., Kyoohyung, H., Jalali, A., Kim, M., Malozemoff, A., Laine, K., Paillier, P., Polyakov, Y., Rohloff, K., Savas, E. & Sunar, B., 2017, 12 p.Research output: Working paper/Preprint › Technical report › Research
2016
- Published
20th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2016 Workshops BITCOIN, VOTING and WAHC
Brenner, M. (Editor) & Rohloff, K. (Editor), 2016, Springer Verlag.Research output: Book/Report › Conference proceeding › Research › peer review
- Published
Angriff der Krypto-Zombies - Warum Verschlüsselung mit Hintertüren unsere Sicherheit gefährdet
Brenner, M. & Schmidt, J., 2016, c't Magazin für Computertechnik, 11/2016, p. 64-67.Research output: Contribution to specialist publication › Contribution in non-scientific journal › Communication
- Published
Microsoft entrauscht homomorphe Krypto-Library SEAL
Brenner, M., 2016, c't Magazin für Computertechnik, Heise Security Online.Research output: Contribution to specialist publication › Contribution in non-scientific journal › Communication
- Published
Rechnen mit sieben Siegeln - Verschlüsselt rechnen mit homomorpher Verschlüsselung
Brenner, M., 2016, c't Magazin für Computertechnik, 6/2016, p. 176-178.Research output: Contribution to specialist publication › Contribution in non-scientific journal › Communication
- Published
Who are you now? Fading to multiple personas
Dietrich, S., Brenner, M. & Krombholz, K., 2016, Proceedings of the 12th Symposium On Usable Privacy and Security: Who are you?! Adventures in Authentication Workshop.Research output: Chapter in book/report/conference proceeding › Conference contribution › Research › peer review
2015
- Published
19th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2015 Workshops BITCOIN, WAHC and Wearables
Brenner, M. (Editor) & Rohloff, K. (Editor), 2015, Springer Verlag.Research output: Book/Report › Conference proceeding › Research › peer review
- Published
METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points
Szongott, C., Brenner, M. & Smith, M., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, Vol. LNCS 8975. p. 370-386 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).Research output: Chapter in book/report/conference proceeding › Conference contribution › Research › peer review