Folgen
Sebastian Meiser
Sebastian Meiser
Visa Research
Bestätigte E-Mail-Adresse bei visa.com
Titel
Zitiert von
Zitiert von
Jahr
The loopix anonymity system
AM Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th {USENIX} Security Symposium ({USENIX} Security 17), 1199-1216, 2017
1652017
AnoA: A Framework for Analyzing Anonymous Communication Protocols
M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi
Computer Security Foundations Symposium (CSF), 2013 IEEE 26th, 163-178, 2013
1242013
Differentially Private Smart Metering with Battery Recharging
M Backes, S Meiser
Data Privacy Management and Autonomous Spontaneous Security. DPM 2013, SETOP …, 2014
1122014
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency-Choose Two
D Das, S Meiser, E Mohammadi, A Kate
2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018
812018
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection
M Backes, A Kate, S Meiser, E Mohammadi
Proc. of the 21st Conference on Computer and Communications Security (CCS’14), 2014
582014
Delegatable functional signatures
M Backes, S Meiser, D Schröder
Public-Key Cryptography–PKC 2016, 357-386, 2016
522016
Privacy loss classes: The central limit theorem in differential privacy
DM Sommer, S Meiser, E Mohammadi
Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019
502019
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy
S Meiser, E Mohammadi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
352018
Approximate and Probabilistic Differential Privacy Definitions
S Meiser
Cryptology ePrint Archive, 2018
322018
Your Choice MATor (s): large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks
M Backes, S Meiser, M Slowik
Proceedings on Privacy Enhancing Technologies 2016 (2), 40-60, 2015
21*2015
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
M Backes, A Kate, S Meiser, T Ruffing
Applied Cryptography and Network Security. ACNS 2015. Lecture Notes in …, 2015
19*2015
Operational Signature Schemes.
M Backes, Ö Dagdelen, M Fischlin, S Gajek, S Meiser, D Schröder
IACR Cryptology ePrint Archive 2014, 820, 2014
122014
Comprehensive Anonymity Trilemma: User Coordination is not enough
D Das, S Meiser, E Mohammadi, A Kate
Proceedings on Privacy Enhancing Technologies 3, 356-383, 2020
112020
Quantitative anonymity guarantees for Tor
SWL Meiser
Saarland University, 2016
32016
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
M Backes, S Koch, S Meiser, E Mohammadi, C Rossow
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
22015
Computational soundness of passively secure encryption in presence of active adversaries
S Meiser
Saarland University, 2011
12011
Not all is lost for anonymity–but quite a lot is.
D Das, S Meiser, E Mohammadi, A Kate
Hot Topics in Privacy Enhancing Technologies Workshop, 2019
2019
DEMO: PrivacyBuDe: Privacy Buckets Demo -- Tight Differential Privacy Guarantees made Simple
D Sommer, S Meiser, E Mohammadi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
Privacy Buckets: Upper and Lower Bounds for r-Fold Approximate Differential Privacy
S Meiser, E Mohammadi
2018
Delegatable functional signatures
S Meiser, D Schröder
IET Information Security 12 (3), 194-206, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20