What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andreas Peter
Google Scholar
ORCID:
0000-0003-2929-5001
33
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Revisiting the Attacker's Knowledge in Inference Attacks Against Searchable Symmetric Encryption.
Marc Damie
Jean-Benoist Leger
Florian Hahn
Andreas Peter
2025
conf/uss
Efficient Ranking, Order Statistics, and Sorting under CKKS.
Federico Mazzone
Maarten H. Everts
Florian Hahn
Andreas Peter
2025
conf/uss
SoK: Automated TTP Extraction from CTI Reports - Are We There Yet?
Marvin Büchel
Tommaso Paladini
Stefano Longari
Michele Carminati
Stefano Zanero
Hodaya Binyamini
Gal Engelberg
Dan Klein
Giancarlo Guizzardi
Marco Caselli
Andrea Continella
Maarten van Steen
Andreas Peter
Thijs van Ede
2024
conf/esorics
frameD: Toward Automated Identification of Embedded Frameworks in Firmware Images.
Jorik van Nielen
Andreas Peter
Andrea Continella
2024
conf/ndss
REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices.
Asbat El Khairi
Marco Caselli
Andreas Peter
Andrea Continella
2023
journals/popets
Private Sampling with Identifiable Cheaters.
César Sabater
Florian Hahn
Andreas Peter
Jan Ramon
2022
conf/ccs
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks.
Federico Mazzone
Leander van den Heuvel
Maximilian Huber
Cristian Verdecchia
Maarten H. Everts
Florian Hahn
Andreas Peter
2022
conf/sp
DEEPCASE: Semi-Supervised Contextual Analysis of Security Events.
Thijs van Ede
Hojjat Aghakhani
Noah Spahn
Riccardo Bortolameotti
Marco Cova
Andrea Continella
Maarten van Steen
Andreas Peter
Christopher Kruegel
Giovanni Vigna
2022
conf/ccsw-ws
Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection.
Asbat El Khairi
Marco Caselli
Christian Knierim
Andreas Peter
Andrea Continella
2022
conf/acns
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes.
Marco Dijkslag
Marc Damie
Florian Hahn
Andreas Peter
2022
conf/acns
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge.
Herson Esquivel-Vargas
John Henry Castellanos
Marco Caselli
Nils Ole Tippenhauer
Andreas Peter
2021
journals/tifs
Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries.
Amina Bassit
Florian Hahn
Joep Peeters
Tom Kevenaar
Raymond N. J. Veldhuis
Andreas Peter
2021
journals/popets
SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges.
Felix Engelmann
Lukas Müller
Andreas Peter
Frank Kargl
Christoph Bösch
2021
conf/uss
A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents.
Marc Damie
Florian Hahn
Andreas Peter
2021
conf/acns
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements.
Ruben Groot Roessink
Andreas Peter
Florian Hahn
2021
conf/ndss
Obfuscated Access and Search Patterns in Searchable Encryption.
Zhiwei Shang
Simon Oya
Andreas Peter
Florian Kerschbaum
2021
conf/dsn
BACGraph: Automatic Extraction of Object Relationships in the BACnet Protocol.
Herson Esquivel-Vargas
Marco Caselli
Andreas Peter
2020
conf/ndss
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Thijs van Ede
Riccardo Bortolameotti
Andrea Continella
Jingjing Ren
Daniel J. Dubois
Martina Lindorfer
David R. Choffnes
Maarten van Steen
Andreas Peter
2019
conf/acisp
Two-Client and Multi-client Functional Encryption for Set Intersection.
Tim van de Kamp
David Stritzl
Willem Jonker
Andreas Peter
2018
conf/icics
uMine: A Blockchain Based on Human Miners.
Henning Kopp
Frank Kargl
Christoph Bösch
Andreas Peter
2017
conf/ccs
Automatic Deployment of Specification-based Intrusion Detection in the BACnet Protocol.
Herson Esquivel-Vargas
Marco Caselli
Andreas Peter
2017
conf/esorics
Using Oblivious RAM in Genomic Studies.
Nikolaos P. Karvelas
Andreas Peter
Stefan Katzenbeisser
2017
conf/acsac
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Riccardo Bortolameotti
Thijs van Ede
Marco Caselli
Maarten H. Everts
Pieter H. Hartel
Rick Hofstede
Willem Jonker
Andreas Peter
2017
conf/cans
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests.
Tim van de Kamp
Andreas Peter
Maarten H. Everts
Willem Jonker
2016
conf/ccs
Private Sharing of IOCs and Sightings.
Tim van de Kamp
Andreas Peter
Maarten H. Everts
Willem Jonker
2016
conf/acsac
Reliably determining data leakage in the presence of strong attackers.
Riccardo Bortolameotti
Andreas Peter
Maarten H. Everts
Willem Jonker
Pieter H. Hartel
2014
conf/pkc
General Impossibility of Group Homomorphic Encryption in the Quantum World.
Frederik Armknecht
Tommaso Gagliardoni
Stefan Katzenbeisser
Andreas Peter
2014
conf/cans
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Felix Günther
Mark Manulis
Andreas Peter
2013
journals/tifs
Efficiently Outsourcing Multiparty Computation Under Multiple Keys.
Andreas Peter
Erik Tews
Stefan Katzenbeisser
2013
conf/esorics
Efficient Privacy-Enhanced Familiarity-Based Recommender System.
Arjan Jeckmans
Andreas Peter
Pieter H. Hartel
2012
conf/africacrypt
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Frederik Armknecht
Stefan Katzenbeisser
Andreas Peter
2011
conf/fc
Oblivious Outsourced Storage with Delegation.
Martin Franz
Peter Williams
Bogdan Carbunar
Stefan Katzenbeisser
Andreas Peter
Radu Sion
Miroslava Sotáková
2010
conf/acns
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Christina Brzuska
Heike Busch
Özgür Dagdelen
Marc Fischlin
Martin Franz
Stefan Katzenbeisser
Mark Manulis
Cristina Onete
Andreas Peter
Bertram Poettering
Dominique Schröder
Coauthors
Amina Bassit
(1)
Andrea Continella
(6)
Andreas Peter
(33)
Arjan Jeckmans
(1)
Asbat El Khairi
(2)
Bertram Poettering
(1)
Bogdan Carbunar
(1)
César Sabater
(1)
Christian Knierim
(1)
Christina Brzuska
(1)
Christoph Bösch
(2)
Christopher Kruegel
(1)
Cristian Verdecchia
(1)
Cristina Onete
(1)
Dan Klein
(1)
Daniel J. Dubois
(1)
David R. Choffnes
(1)
David Stritzl
(1)
Dominique Schröder
(1)
Erik Tews
(1)
Federico Mazzone
(2)
Felix Engelmann
(1)
Felix Günther
(1)
Florian Hahn
(8)
Florian Kerschbaum
(1)
Frank Kargl
(2)
Frederik Armknecht
(2)
Gal Engelberg
(1)
Giancarlo Guizzardi
(1)
Giovanni Vigna
(1)
Heike Busch
(1)
Henning Kopp
(1)
Herson Esquivel-Vargas
(3)
Hodaya Binyamini
(1)
Hojjat Aghakhani
(1)
Jan Ramon
(1)
Jean-Benoist Leger
(1)
Jingjing Ren
(1)
Joep Peeters
(1)
John Henry Castellanos
(1)
Jorik van Nielen
(1)
Leander van den Heuvel
(1)
Lukas Müller
(1)
Maarten H. Everts
(6)
Maarten van Steen
(3)
Marc Damie
(3)
Marc Fischlin
(1)
Marco Caselli
(7)
Marco Cova
(1)
Marco Dijkslag
(1)
Mark Manulis
(2)
Martin Franz
(2)
Martina Lindorfer
(1)
Marvin Büchel
(1)
Maximilian Huber
(1)
Michele Carminati
(1)
Miroslava Sotáková
(1)
Nikolaos P. Karvelas
(1)
Nils Ole Tippenhauer
(1)
Noah Spahn
(1)
Özgür Dagdelen
(1)
Peter Williams
(1)
Pieter H. Hartel
(3)
Radu Sion
(1)
Raymond N. J. Veldhuis
(1)
Riccardo Bortolameotti
(4)
Rick Hofstede
(1)
Ruben Groot Roessink
(1)
Simon Oya
(1)
Stefan Katzenbeisser
(6)
Stefano Longari
(1)
Stefano Zanero
(1)
Thijs van Ede
(4)
Tim van de Kamp
(3)
Tom Kevenaar
(1)
Tommaso Gagliardoni
(1)
Tommaso Paladini
(1)
Willem Jonker
(5)
Zhiwei Shang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to