Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
  • Zielgruppen
  • Suche
 

Publications

search
in all authortitledescription
category
year
 

2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2000 all years

Konferenzen

Lena Wiese, Daniel Homann, Tim Waage, Michael Brenner(2018): Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse,SICHERHEIT 2018, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik, Bonn (to appear)

Daniel Lückehe, Katharina Schmidt, Karsten Plotz, and Gabriele von Voigt (2017): Analysis of Sound Localization Data Generated by the Extended Mainzer Kindertisch, KI 2017: Advances in Artificial Intelligence - 40th Annual German Conference on AI, Dortmund, Germany, September 25-29, 2017, Proceedings

Mohammad Siahatgar, Gabriele von Voigt(2016): Evaluation of Sparse Linear Algebra Operations in Trilinos,Proceeding of the European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS 2016), Crete, Greece, 5-10 June 2016

Sven Dietrich, Michael Brenner, Katharina Krombholz(2016): Who are you now? Fading to multiple personas,Who are you?! Adventures in Authentication Workshop, 12th Symposium On Usable Privacy and Security (SOUPS) 2016, on the web: https://www.usenix.org/conference/soups2016

Christian Szongott, Michael Brenner, Matthew Smith(2015): METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points,Financial Cryptography and Data Security 2015 (FC'15), Springer Lecture Notes in Computer Science, LNCS Volume 8975, ISBN 978-3-662-47853-0, pp. 370-386

Benjamin Henne, Christian Kater, Matthew Smith, and Michael Brenner(2013): Selective Cloaking: Need-to-know for Location-based Apps,Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. file

Michael Brenner and Matthew Smith(2013): Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine,Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ISBN 978-1-4503-2477-9/13/11, pp. 1363-1365 file

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2012): Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography,Proceedings of the 8th IEEE International Conference on eScience (eScience 2012), ISBN 978-1-4673-4467-8, pp. 1-8

Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders and Matthew Smith (2012): Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions, Proceedings of Tenth Annual Conference on Privacy, Security and Trust (PST 2012) file

Matthew Smith, Benjamin Henne, Christian Szongott, Gabriele von Voigt(2012): Big Data Privacy Issues in Public Social Media,Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2012) file

Michael Brenner, Henning Perl, Matthew Smith(2012): Practical Applications of Homomorphic Encryption,Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT 2012), ISBN 978-989-8565-24-2, pp. 5-14 file

Michael Brenner, Henning Perl, Matthew Smith(2012): How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), ISBN 978-0-7695-4745-9/12, pp. 375-382 file

Yassene Mohammed, Gabriele von Voigt, Matthew Smith(2012): Enabling Big Data Driven Biomedicine Using Scientific Workflows and Cloud Computing,GMDS 2012, 16.-20. Sept., Beitrag: 173

Henning Perl, Michael Brenner, Matthew Smith(2011): Poster: An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System,Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ISBN 978-1-4503-0948-6, pp. 837-840 file

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): Secret Program Execution in the Cloud applying Homomorphic Encryption,Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), ISBN:978-1-4577-0871-8, pp. 114-119 file

Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith(2011): A Smart-Gentry based Software System for Secret Program Execution,Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT 2011), ISBN 978-989-8425-71-3, pp. 238-244 file

Christopher Kunz, Jan Wiebelitz, Matthew Smith(2010): An attack-resilient Grid auditing infrastructure,Proceedings of the IEEE WCNIS 2010 file IEEE WCNIS 2010 25.-27.06.2010

Michael Brenner, Jan Wiebelitz, Matthew Smith(2010): A JEE-based Architecture for Distributed Multi-Domain Resource Accounting,2010 Sixth IEEE International Conference on eScience Workshops, ISBN:978-0-7695-4295-9/10, pp. 31-38 file

Mohammed Y, Dickmann F, Sax U, von Voigt G, Smith M, Rienhoff O.(2010): Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community ,Medinfo 2010, Stud Health Technol Inform. 2010;160(Pt 2):1339-43. Medinfo 2010

Mohammed Y, Sax U, Dickmann F, Lippert J, Solodenko J, von Voigt G, Smith M, Rienhoff O.(2010): On transferring the grid technology to the biomedical community,HealthGrid 2010, Stud Health Technol Inform. 2010;159:28-39. HealthGrid2010

Wiebelitz, J., Brenner, M., Kunz, C., Smith, M.(2010): Early Defense - Enabling Attribute-Based Authorization in Grid Firewalls,Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, ISBN:978-1-60558-942-8, pp. 336-339 HPDC 2010 22.06-25.06.2010

Yassene Mohammed, Frank Dickmann, Ulrich Sax, Gabriele von Voigt, Matthew Smith, Otto Rienhoff(2010): Reaching for the Cloud: On the Lessons Learned from Grid Computing Technology Transfer Process to the Biomedical Community (to be published), Medinfo 2010

Yassene Mohammed, Ulrich Sax, Frank Dickmann, Joerg Lippert, Juri Solodenko, Gabriele von Voigt, Matthew Smith, Otto Rienhoff(2010): On Transferring the Grid Technology to the Biomedical Community (to be published), Healthgrid 2010

C. Kunz, J. Wiebelitz, S. Piger, C. Grimm(2009): A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection,Proc. of the 5th International Conference on Networking and Services (ICNS 2009) ICNS 2009 20.04.2009 - 24.04.2009

C. Kunz, J. Wiebelitz, S. Piger, C. Grimm(2009): A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection,Proc. of the 8th International Symposium on Parallel and Distributed Computing (ISPDC '09) ISPDC 2009

J. Wiebelitz, C. Kunz, S. Piger, C. Grimm(2009): TCP-AuthN: TCP Inline Authentication to Enhance Network Security in Grid Environments,Proc. of the 8th International Symposium on Parallel and Distributed Computing ISPDC 2009

J. Wiebelitz, C. Kunz, S. Piger, C. Grimm(2009): TCP-AuthN: An Approach to Dynamic Firewall Operation in Grid Environments,Proc. of the 5th International Conference on Networking and Services ICNS 2009 April 2009

J. Wiebelitz, S. Piger, C. Kunz, C. Grimm(2009): Transparent Identity-based Firewall Transition for eScience,Proc. of the 2009 5th IEEE International Conference on eScience Workshops e-Science 2009 09. - 13.12.2009

Kunz, C.; Szongott, C.; Wiebelitz, J.; Grimm, C.(2009): Design and Implementation of a Grid Proxy Auditing Infrastructure,Proc. of the 2009 5th IEEE International Conference on eScience Workshops 5th IEEE International Conference on E-Science Workshops 12/2009

J. Wiebelitz, S. Dal Pra, W. Müller, G. von Voigt(2008): The German Grid Initiative: A Uniform Accounting Service in Multiple Middleware Environments, The 5th International Workshop on Grid Economics and Business Models (GECON 2008), Las Palmas August 2008

J. Wiebelitz, W. Müller, M. Brenner, G. von Voigt(2008): Towards a Comprehensive Accounting Solution in the Multi-Middleware Environment of the D-Grid Initiative, Proc. Cracow Grid Workshop '08, Krakau Oktober 2008

Nils Jensen, Gabriel Gaus, Gabriele von Voigt, Stephan Olbrich(2007): Design and Psychophysical Study of Volume Compression for Haptic Rendering,Second Joint EuroHaptics Conference and Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (WHC 2007), 22-24 March 2007, Tsukuba, Japan, pp. 261-267, 2007, IEEE Computer Society, 978-0-7695-2738-3.

R. Groeper, C. Grimm, S. Piger, J. Wiebelitz(2007): An Architecture for Authorization in Grids using Shibboleth and VOMS,Proc. of the 33rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Lübeck, Germany, August 2007. 33rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 27-31 August 2007

C. Grimm, S. Piger, J. Wiebelitz(2006): Evaluation von Security-Mechanismen in Grid-Umgebungen,Proc. 20. DFN-Arbeitstagung über Kommunikationsnetze, Heilbronn, Juni 2006

Claus-Peter Rückemann, Wolfgang Müller, Gabriele Voigt(2006): Comparison of Grid Accounting Concepts for D-Grid,Proceedings of the Cracow Grid Workshop, CGW'06, Cracow, Poland, October 15-18, Academic Computer Centre CYFRONET AGH, Bubak, M., Turala, M., and Wiatr, K. (eds.)

Gabriele Voigt, Claus-Peter Rückemann, Wolfgang Müller(2006): Development of a Billing Framework for D-Grid,Proceedings of the Cracow Grid Workshop, CGW'06, Cracow, Poland, October 15-18, Academic Computer Centre CYFRONET AGH, Bubak, M., Turala, M., and Wiatr, K. (eds.)

S. Piger, C. Grimm, J. Wiebelitz, R. Groeper(2006): An Approach to Restricted Delegation of User Rights based on the gLite Middleware,Proc. Cracow Grid Workshop 06, Krakau, Polen, Oktober 2006.

S. Rieger, B. Gersbeck-Schierholz, J. Mönnich, J. Wiebelitz(2006): Self-Service PKI-Lösungen for eScience,Proc. 13. DFN Workshop "Sicherheit in vernetzten Systemen", Hamburg, März 2006.

C. Grimm, J. Wiebelitz, S. Piger, D. Goehr(2005): Betrieb sicherer Netzinfrastrukturen für Grid-Umgebungen,19. DFN-Arbeitstagung über Kommunikationsnetze, Düsseldorf, Mai 2005. In: GI-Edition „Lecture Notes in Informatics“ (LNI), P-73, S. 289–303, Köllen Verlag, Bonn, 2005.

Nils Jensen, Wolfgang Nejdl, Gabriele Voigt, Johannes Bernarding(2005): Efficient 1-Pass Prediction for Volume Compression,Image Analysis, 14th Scandinavian Conference, SCIA 2005, Joensuu, Finland, June 19-22, 2005, Proceedings, pp. 302-311, 2005, Springer, 3-540-26320-9.

Nils Jensen, Ralf Einhorn, Gabriele Voigt(2004): A Supply-Chain for Computer-Mediated Communication and Visualization,WSCG Conference 2004, Plzen, Czech Republic, 2-6 February 2004.

Nils Jensen, Wolfgang Nejdl, Stephan Olbrich, Gabriele Voigt(2004): Development of a Virtual Laboratory System for Science Education,Interactive Multimedia Electronic Journal of Computer-enhanced Learning. 6(2), October 2004. Wake Forest University, USA.

Journale

Daniel Lückehe and Gabriele von Voigt (2018): Evolutionary image simplification for lung nodule classification with convolutional neural networks, International Journal of Computer Assisted Radiology and Surgery

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2013): Privacy/performance trade-off in private search on bio-medical data,Elsevier Future Generation Computer Systems (ISSN 0167-739X)

Zeitschriftenartikel

Michael Brenner(2016): Rechnen mit sieben Siegeln - Verschlüsselt rechnen mit homomorpher Verschlüsselung,c't Magazin für Computertechnik (ISSN 0724-8679) Ausgabe 6/2016, S. 176-178, heise Verlag

Michael Brenner, Jürgen Schmidt(2016): Angriff der Krypto-Zombies - Warum Verschlüsselung mit Hintertüren unsere Sicherheit gefährdet,c't Magazin für Computertechnik (ISSN 0724-8679) Ausgabe 11/2016, S. 64-67, heise Verlag

Gabriele von Voigt(2014): Advising European policy makers,Magazine ICT-onderzoek, II/3, Sept. 2014, p. 6

Matthew Smith, Benjamin Henne, Gabriele von Voigt(2013): Big Data Privacy Issues in Public Social Media,in: Newsletter of E-INNOVATION Germany, Big Data, Issue 36, March 2013

Michael Brenner(2013): Geheimes Rechnen - Homomorphe Kryptosysteme: Algebra mit verschlüsselten Zahlen,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 7/2013, S. 115-118, heise Verlag

Michael Brenner(2012): Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 6/2012, S. 120-124, heise Verlag

Michael Brenner(2012): Vertrauliche Datenverarbeitung in der Cloud - Wie schützt man Programme und Daten in verteilten Systemen?,Unimagazin (ISSN 1616-4075) Ausgabe 1/2 2012 "Future Internet", Leibniz Universität Hannover

Bücher und Buchbeiträge

Joseph Bonneau, Andrea Bracciali, Michael Brenner, Markus Jakobsson, Andrew Miller, Kurt Rohloff, Peter Y. A. Ryan, Massimiliano Sala, Vanessa Teague (Eds.)(2017): 21st International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2017 Workshops BITCOIN, TA, VOTING, WAHC and WTSC,Springer Lecture Notes in Computer Science, LNCS Volume 10323 (to appear)

Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, Kurt Rohloff (Eds.)(2016): 20th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2016 Workshops BITCOIN, VOTING and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 9604, ISBN 978-3-662-53356-7 (print) / 978-3-662-53357-4 (online)

Michael Brenner, Nicolas Christin, Benjamin Johnson and Kurt Rohloff (Eds.)(2015): 19th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2015 Workshops BITCOIN, WAHC and Wearables,Springer Lecture Notes in Computer Science, LNCS Volume 8976, ISBN 978-3-662-48050-2 (print) / 48051-9 (online)

Rainer Böhme, Michael Brenner, Tyler Moore and Matthew Smith (Eds.)(2014): 18th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2014 Workshops BITCOIN and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 8438, ISBN 978-3-662-44774-1 (online) / 44773-4 (print)

Andrew A. Adams, Michael Brenner, Matthew Smith (Eds.)(2013): 17th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2013 Workshops USEC and WAHC,Springer Lecture Notes in Computer Science, LNCS Volume 7862, ISBN 978-3-642-41319-3 (print) / 41320-9 (online)

C. Grimm, G. von Voigt(2006): Security als Service,In: O. Rienhoff, U. Sax (Eds.), Grid-Computing in der bio-medizinischen Forschung – Datenschutz und Datensicherheit, Urban & Vogel GmbH, München, 2006, 8 Seiten, ISBN 978-3-89935-237-5

Christian Grimm, Gabriele Voigt (2006): Security als Service,U. Sax, Y. Mohammed, F. Viezens, O. Rienhoff (Eds.) Grid-Computing in der biomedizinischen Forschung – Datenschutz und Datensicherheit, Urban &Vogel GmbH, München, 8 Seiten, ISBN 978-3-89935-237-5

Patente

Michael Brenner, Matthew Smith(2012): Encrypted Computing,International Patent EP 2678772 B1 20150408 (DE) "Encrypted Computing"

Michael Brenner, Matthew Smith(2011): Verfahren und Vorrichtung zur Berechnung homomorph verschlüsselter Programme,Deutsches Patent- und Markenamt (angemeldetes Patent, amtl. Az. 10 2011 012 328.8)

Vorträge

Michael Brenner(2017): Rechnen mit sieben Siegeln - Konstruktion einer verschlüsselt rechnenden Maschine,Vortrag über das hcrypt-Projekt beim Kolloquium am Institut für Informatik der Georg-August-Universität Göttingen (8. Februar 2017)

Michael Brenner(2015): Homomorphe Verschlüsselung,Jahrestagung des AK Informationssicherheit Fujitsu NEXT e.V.

Michael Brenner, Henning Perl(2013): The hcrypt Project: Applying Homomorphic Cryptography,Oberseminar-Vortrag beim CDC der TU Darmstadt

Projektberichte

J. Wiebelitz, M. Brenner(2008): Konzept für das Accounting im D-Grid,

J. Wiebelitz, M. Brenner(2008): DGAS als Accounting-System im D-Grid,

J. Wiebelitz, W. Müller, M. Brenner, C. Grimm, G. von Voigt(2008): Stand der Entwicklungen im Bereich Accounting für D-Grid,

T. Dussa, U. Epting, B. Filipovic, G. Foest, J. Glowka, J. Götze, C. Grimm, M. Hillenbrand, C. Kohlschütter, R. Lohner, S. Makedanz, P. Müller, M. Pattloch, S. Piger, T. Straub, J. Wiebelitz(2006): Analyse von AA-Infrastrukturen in Grid-Middleware,1. Zwischenbericht D-Grid FG3-4, 72 Seiten, BMBF-Projekt, März 2006

T. Dussa, U. Epting, B. Filipovic, G. Foest, J. Glowka, J. Götze, C. Grimm, M. Hillenbrand, C. Kohlschütter, R. Lohner, S. Makedanz, P. Müller, M. Pattloch, S. Piger, T. Straub, J. Wiebelitz(2006): Use Cases for Authorization in Grid-Middleware,2. Zwischenbericht D-Grid FG3-4, 26 Seiten, BMBF-Projekt, September 2006

Nils Jensen, Wolfgang Nejdl, Stephan Olbrich, Siegfried Raasch, Stefan Seipel, Ralf Einhorn, Karsten Chmielewski, Gabriele Voigt(2003): Heuristic Evaluation of a Virtual Lab System,Technical Report L3S Q4 2003. VASE 3, L3S, University of Hanover, Germany

Technische Berichte

Michael Brenner, Wei Dai, Shai Halevi, Kyoohyung Han, Amir Jalali, Miran Kim, Alex Malozemoff, Kim Laine, Pascal Paillier, Yuriy Polyakov, Kurt Rohloff, Erkay Savas, Berk Sunar (2017): White Paper: Standardizing an API for RLWE-Based Homomorphic Encryption,Homomorphic Encryption Standardization Consortium, An Open Industry / Government / Academic Consortium to Advance Secure Computation, http://homomorphicencryption.org file

Michael Brenner(2016): Microsoft entrauscht homomorphe Krypto-Library SEAL,Heise Security online http://heise.de/-3243299

Michael Brenner(2013): ENISA-Empfehlungen zu Krypto-Verfahren,Heise Security online http://heise.de/-2043356

Dissertationen

Michael Brenner(2012): Rechnen mit verschlüsselten Programmen und Daten,Dissertation, Technische Informationsbibliothek Hannover file

Studentische Arbeiten (Auszug)

J. Wiebelitz(2000): Überlegungen zur Realisierung eines Firewall-Konzeptes für die Universität Hannover,Prüfer: H. Pralle, C.-E. Liedtke, Betreuer: B. Böker, Diplomarbeit, April 2000