Seguir
Christian Weinert
Christian Weinert
Dirección de correo verificada de rhul.ac.uk - Página principal
Título
Citado por
Citado por
Año
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5312018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
1822018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1322017
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
1202019
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
772015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
662018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
472020
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
372018
All the numbers are US: large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
342020
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
342019
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021
222021
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
122021
Trustworthy AI inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
112020
Cryptospn: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
arXiv preprint arXiv:2002.00801, 2020
92020
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
82014
Contact discovery in mobile messengers: Low-cost attacks, quantitative analyses, and efficient mitigations
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
ACM Transactions on Privacy and Security 26 (1), 1-44, 2022
72022
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
72022
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
72020
Mops: a modular protection scheme for long-term storage
C Weinert, D Demirel, M Vigil, M Geihs, J Buchmann
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
72017
A performance analysis of long-term archiving techniques
M Vigil, C Weinert, K Braden, D Demirel, J Buchmann
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
72014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20