Henning Perl
Henning Perl
Bestätigte E-Mail-Adresse bei fkie.fraunhofer.de
Titel
Zitiert von
Zitiert von
Jahr
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1472013
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
1442015
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
902015
Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system
H Perl, M Brenner, M Smith
Proceedings of the 18th ACM conference on Computer and communications …, 2011
442011
Hey, nsa: Stay away from my market! future proofing app markets against powerful attackers
S Fahl, S Dechand, H Perl, F Fischer, J Smrcek, M Smith
proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
322014
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations
S Fahl, Y Acar, H Perl, M Smith
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
322014
You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores
H Perl, S Fahl, M Smith
Financial Cryptography, 2014
272014
How practical is homomorphically encrypted program execution? an implementation and performance evaluation
M Brenner, H Perl, M Smith
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
222012
Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography
H Perl, Y Mohammed, M Brenner, M Smith
2012 IEEE 8th International Conference on E-Science, 1-8, 2012
212012
Practical Applications of Homomorphic Encryption.
M Brenner, H Perl, M Smith
SECRYPT, 5-14, 2012
172012
Privacy/performance trade-off in private search on bio-medical data
H Perl, Y Mohammed, M Brenner, M Smith
Future Generation Computer Systems 36, 441-452, 2014
132014
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
82019
Security and Data Analysis: Three Case Studies
H Perl
Universitäts-und Landesbibliothek Bonn, 2017
2017
Security and Data Analysis
H Perl
2017
An Evaluation System For SSL Validation Schemes
H Perl, S Fahl, M Smith
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–15