Folgen
Christian Weinert
Christian Weinert
Bestätigte E-Mail-Adresse bei rhul.ac.uk - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
3532018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
1202018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
972017
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
642019
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
632015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
522018
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
352018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
332020
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
182019
All the numbers are us: Large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
142020
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021
112021
Trustworthy ai inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
92020
CryptoSPN: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
arXiv preprint arXiv:2002.00801, 2020
62020
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
International Conference on Cryptology and Network Security, 505-525, 2020
52020
Mops: a modular protection scheme for long-term storage
C Weinert, D Demirel, M Vigil, M Geihs, J Buchmann
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
52017
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
52014
A performance analysis of long-term archiving techniques
M Vigil, C Weinert, K Braden, D Demirel, J Buchmann
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
52014
Privacy-preserving speech processing via STPC and TEEs (Poster)
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
4*2019
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
22021
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
12021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20