A guide to fully homomorphic encryption F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ... Cryptology ePrint Archive, 2015 | 369 | 2015 |
Outsourced proofs of retrievability F Armknecht, JM Bohli, GO Karame, Z Liu, CA Reuter Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 194 | 2014 |
Differential fault analysis on Grøstl W Fischer, CA Reuter 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 44-54, 2012 | 31 | 2012 |
Private information retrieval and searchable encryption for privacy-preserving multi-client cloud auditing L Tajan, D Westhoff, CA Reuter, F Armknecht 2016 11th International Conference for Internet Technology and Secured …, 2016 | 12 | 2016 |
Cloud storage file recoverability CA Gorke, C Janson, F Armknecht, C Cid Proceedings of the Fifth ACM International Workshop on Security in Cloud …, 2017 | 3 | 2017 |
Method for proving retrievability of information F Armknecht, JM Bohli, G Karame, C Gorke US Patent 10,447,696, 2019 | 1 | 2019 |
Method for proving retrievability of information F Armknecht, JM Bohli, G Karame, C Gorke US Patent 10,880,310, 2020 | | 2020 |
Reverse Fingerprinting CA Gorke, F Armknecht arXiv preprint arXiv:1912.09734, 2019 | | 2019 |
Einführung und Grundlagen der Cloud-Sicherheit CA Gorke, F Armknecht Cybersicherheit: für vernetzte Anwendungen in der Industrie 4.0, 245-274, 2019 | | 2019 |
SMAUG: Secure Mobile Authentication Using Gestures CA Gorke, F Armknecht arXiv preprint arXiv:1708.04871, 2017 | | 2017 |
Session 3: Cloud security L Tajan, D Westhoff, CA Reuter, F Armknecht, F Buccafurri, G Lax, ... | | |