Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
  • Zielgruppen
  • Suche
 

Dr. Michael Brenner

Konferenzen

2018

Lena Wiese, Daniel Homann, Tim Waage, Michael Brenner(2018): Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse,Langweg, H., Meier, M., Witt, B. C. & Reinhardt, D. (Hrsg.), SICHERHEIT 2018. Bonn: Gesellschaft für Informatik e.V.. (S. 221-234).

2016

Sven Dietrich, Michael Brenner, Katharina Krombholz(2016): Who are you now? Fading to multiple personas,Who are you?! Adventures in Authentication Workshop, 12th Symposium On Usable Privacy and Security (SOUPS) 2016, on the web: https://www.usenix.org/conference/soups2016

2015

Christian Szongott, Michael Brenner, Matthew Smith(2015): METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points,Financial Cryptography and Data Security 2015 (FC'15), Springer Lecture Notes in Computer Science, LNCS Volume 8975, ISBN 978-3-662-47853-0, pp. 370-386

2013

Michael Brenner and Matthew Smith(2013): Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ISBN 978-1-4503-2477-9/13/11, pp. 1363-1365 Datei

Benjamin Henne, Christian Kater, Matthew Smith, and Michael Brenner(2013): Selective Cloaking: Need-to-know for Location-based Apps,Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. Datei

2012

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2012): Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography,Proceedings of the 8th IEEE International Conference on eScience (eScience 2012), ISBN 978-1-4673-4467-8, pp. 1-8

Michael Brenner, Henning Perl, Matthew Smith(2012): Practical Applications of Homomorphic Encryption,Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT 2012), ISBN 978-989-8565-24-2, pp. 5-14 Datei

Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders and Matthew Smith (2012): Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions, Proceedings of Tenth Annual Conference on Privacy, Security and Trust (PST 2012) Datei

Michael Brenner, Henning Perl, Matthew Smith(2012): How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), ISBN 978-0-7695-4745-9/12, pp. 375-382 Datei

2011

Henning Perl, Michael Brenner, Matthew Smith(2011): Poster: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System,Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ISBN 978-1-4503-0948-6, pp. 837-840 Datei

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): A Smart-Gentry based Software System for Secret Program Execution,Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT 2011), ISBN 978-989-8425-71-3, pp. 238-244 Datei

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): Secret Program Execution in the Cloud applying Homomorphic Encryption,Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), ISBN:978-1-4577-0871-8, pp. 114-119 Datei

2010

Michael Brenner, Jan Wiebelitz, Matthew Smith(2010): A JEE-based Architecture for Distributed Multi-Domain Resource Accounting,2010 Sixth IEEE International Conference on eScience Workshops, ISBN:978-0-7695-4295-9/10, pp. 31-38 Datei

Wiebelitz, J., Brenner, M., Kunz, C., Smith, M.(2010): Early Defense - Enabling Attribute-Based Authorization in Grid Firewalls,Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, ISBN:978-1-60558-942-8, pp. 336-339 HPDC 2010 22.06-25.06.2010

2008

J. Wiebelitz, W. Müller, M. Brenner, G. von Voigt(2008): Towards a Comprehensive Accounting Solution in the Multi-Middleware Environment of the D-Grid Initiative, Proc. Cracow Grid Workshop '08, Krakau Oktober 2008

Journale

2019

Lena Wiese, Tim Waage, Michael Brenner(2019): CloudDBGuard: A Framework for encrypted data storage in NoSQL Wide Column Stores,Elsevier Data & Knowledge Engineering, ISSN 0169-023X (to appear)

2013

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2013): Privacy/performance trade-off in private search on bio-medical data,Elsevier Future Generation Computer Systems, ISSN 0167-739X

Zeitschriftenartikel

2016

Michael Brenner, Jürgen Schmidt(2016): Angriff der Krypto-Zombies - Warum Verschlüsselung mit Hintertüren unsere Sicherheit gefährdet,c't Magazin für Computertechnik (ISSN 0724-8679) Ausgabe 11/2016, S. 64-67, heise Verlag

Michael Brenner(2016): Rechnen mit sieben Siegeln - Verschlüsselt rechnen mit homomorpher Verschlüsselung,c't Magazin für Computertechnik (ISSN 0724-8679) Ausgabe 6/2016, S. 176-178, heise Verlag

2013

Michael Brenner(2013): Geheimes Rechnen - Homomorphe Kryptosysteme: Algebra mit verschlüsselten Zahlen,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 7/2013, S. 115-118, heise Verlag

2012

Michael Brenner(2012): Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 6/2012, S. 120-124, heise Verlag

Michael Brenner(2012): Vertrauliche Datenverarbeitung in der Cloud - Wie schützt man Programme und Daten in verteilten Systemen?,Unimagazin (ISSN 1616-4075) Ausgabe 1/2 2012 "Future Internet", Leibniz Universität Hannover

Bücher und Buchbeiträge

2019

Michael Brenner, Tancrède Lepoint, Kurt Rohloff (Eds.)(2019): Proceedings of the 7th Workshop on Encrypted Computing and Applied Homomorphic Cryptography,ACM New York (to appear)

2018

Michael Brenner and Kurt Rohloff (Eds.)(2018): Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography,ACM New York, ISBN 978-1-4503-5987-0

2017

Joseph Bonneau, Andrea Bracciali, Michael Brenner, Markus Jakobsson, Andrew Miller, Kurt Rohloff, Peter Y. A. Ryan, Massimiliano Sala, Vanessa Teague (Eds.)(2017): 21st International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2017 Workshops BITCOIN, TA, VOTING, WAHC and WTSC,Springer Lecture Notes in Computer Science, LNCS Volume 10323, ISBN 978-3-319-70278-0

2016

Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, Kurt Rohloff (Eds.)(2016): 20th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2016 Workshops BITCOIN, VOTING and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 9604, ISBN 978-3-662-53356-7 (print) / 978-3-662-53357-4 (online)

2015

Michael Brenner, Nicolas Christin, Benjamin Johnson and Kurt Rohloff (Eds.)(2015): 19th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2015 Workshops BITCOIN, WAHC and Wearables,Springer Lecture Notes in Computer Science, LNCS Volume 8976, ISBN 978-3-662-48050-2 (print) / 48051-9 (online)

2014

Rainer Böhme, Michael Brenner, Tyler Moore and Matthew Smith (Eds.)(2014): 18th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2014 Workshops BITCOIN and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 8438, ISBN 978-3-662-44774-1 (online) / 44773-4 (print)

2013

Andrew A. Adams, Michael Brenner, Matthew Smith (Eds.)(2013): 17th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2013 Workshops USEC and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 7862, ISBN 978-3-642-41319-3 (print) / 41320-9 (online)

Patente

2012

Michael Brenner, Matthew Smith(2012): Encrypted Computing,International Patent EP 2678772 B1 20150408 (DE) "Encrypted Computing"

2011

Michael Brenner, Matthew Smith(2011): Verfahren und Vorrichtung zur Berechnung homomorph verschlüsselter Programme,Deutsches Patent- und Markenamt (angemeldetes Patent, amtl. Az. 10 2011 012 328.8)

Vorträge

2017

Michael Brenner(2017): Rechnen mit sieben Siegeln - Konstruktion einer verschlüsselt rechnenden Maschine,Vortrag über das hcrypt-Projekt beim Kolloquium am Institut für Informatik der Georg-August-Universität Göttingen (8. Februar 2017)

2015

Michael Brenner(2015): Homomorphe Verschlüsselung,Jahrestagung des AK Informationssicherheit Fujitsu NEXT e.V.

2013

Michael Brenner, Henning Perl(2013): The hcrypt Project: Applying Homomorphic Cryptography,Oberseminar-Vortrag beim CDC der TU Darmstadt

Technische Berichte

2017

Michael Brenner, Wei Dai, Shai Halevi, Kyoohyung Han, Amir Jalali, Miran Kim, Alex Malozemoff, Kim Laine, Pascal Paillier, Yuriy Polyakov, Kurt Rohloff, Erkay Savas, Berk Sunar (2017): White Paper: Standardizing an API for RLWE-Based Homomorphic Encryption,Homomorphic Encryption Standardization Consortium, An Open Industry / Government / Academic Consortium to Advance Secure Computation, http://homomorphicencryption.org Datei

2016

Michael Brenner(2016): Microsoft entrauscht homomorphe Krypto-Library SEAL,Heise Security online http://heise.de/-3243299

2013

Michael Brenner(2013): ENISA-Empfehlungen zu Krypto-Verfahren,Heise Security online http://heise.de/-2043356

Dissertationen

2012

Michael Brenner(2012): Rechnen mit verschlüsselten Programmen und Daten,Dissertation, Technische Informationsbibliothek Hannover Datei