Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
Logo Leibniz Universität Hannover
Logo: Computational Health Informatics
  • Zielgruppen
  • Suche
 

Publikationen

Suche nach
in in allen Feldern AutorTitelBeschreibung
Kategorie
Jahr
 

2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 1994 1992 1991 alle Jahre

Konferenzen

Benjamin Henne, Christian Szongott, Matthew Smith(2012): Coupled Multi-Agent Simulations for Mobile Security & Privacy Research,Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2012) Datei

Christian Szongott, Benjamin Henne, Matthew Smith(2012): Evaluating the threat of epidemic mobile malware,Proceedings of the 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2012) Datei

Christian Szongott, Benjamin Henne, Matthew Smith(2012): Mobile Evil Twin Malnets - The Worst of Both Worlds,Proceedings of the 11th International Conference on Cryptology and Network Security (CANS 2012) Datei

Henning Perl, Yassene Mohammed, Michael Brenner, Matthew Smith(2012): Fast Confidential Search for Bio-Medical Data Using Bloom Filters and Homomorphic Cryptography,Proceedings of the 8th IEEE International Conference on eScience (eScience 2012), ISBN 978-1-4673-4467-8, pp. 1-8

Marian Harbach, Sascha Fahl, Michael Brenner, Thomas Muders and Matthew Smith (2012): Towards Privacy-Preserving Access Control with Hidden Policies, Hidden Credentials and Hidden Decisions, Proceedings of Tenth Annual Conference on Privacy, Security and Trust (PST 2012) Datei

Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith(2012): Towards Measuring Warning Readability,Eighth Symposium On Usable Privacy and Security (SOUPS 2012), Poster Datei

Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith(2012): All Our Messages Are Belong to Us: Usable Confidentiality in Social Networks,Proceedings of the World Wide Web Conference (WWW 2012), Poster Datei

Matthew Smith, Benjamin Henne, Christian Szongott, Gabriele von Voigt(2012): Big Data Privacy Issues in Public Social Media,Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2012) Datei

Michael Brenner, Henning Perl, Matthew Smith(2012): Practical Applications of Homomorphic Encryption,Proceedings of the 7th International Conference on Security and Cryptography (SECRYPT 2012), ISBN 978-989-8565-24-2, pp. 5-14 Datei

Michael Brenner, Henning Perl, Matthew Smith(2012): How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), ISBN 978-0-7695-4745-9/12, pp. 375-382 Datei

Mustafa Sofean and Matthew Smith(2012): A Real-Time Disease Surveillance Architecture Using Social Networks,Proceedings of the 24th European Medical Informatics Conference (MIE 2012)

Mustafa Sofean and Matthew Smith(2012): A Real-Time Architecture for Detection of Diseases using Social Networks: Design, Implementation and Evaluation. (poster) ,Proceedings of the ACM Conference on Hypertext and Hypermedia (HT 2012)

Mustafa Sofean, Kerstin Denecke, Avaré Stewart, Matthew Smith(2012): Medical Case-Driven Classification of Microblogs: Characteristics and Annotation,ACM SIGHIT International Health Informatics Symposium (IHI 2012)

N. gentschen Felde, W. Hommel, H. Reiser, F. von Eye, J. Kohlrausch, C. Szongott(2012): A Grid–based Intrusion Detection System (GIDS),18th EUNIS Congress, 2012, Poster, University of Trás–os–Montes e Alto Douro, Vila Real, Portugal

N. gentschen Felde, W. Hommel, H. Reiser, F. von Eye, J. Kohlrausch, C. Szongott(2012): Das Datenschutzkonzept für das föderierte Frühwarnsystem im D–Grid und seine technische Umsetzung,GI–Edition – Lecture Notes in Informatics (LNI): Proceedings; 5. DFN–Forum Kommunikationstechnologien – Beiträge der Fachtagung

Sascha Fahl, Marian Harbach, Matthew Smith(2012): Human-Centric Visual Access Control for Clinical Data Management,Proceedings of the IEEE International Conference on Digital Ecosystems and Technologies

Sascha Fahl, Marian Harbach, Matthew Smith(2012): Towards Human-Centric Visual Access Control for Clinical Data Management,Proceedings of the 24th European Medical Informatics Conference (MIE 2012)

Sascha Fahl, Marian Harbach, Thomas Muders and Matthew Smith(2012): TrustSplit: Usable Confidentiality for Social Network Messaging,Proceedings of the ACM Conference on Hypertext and Hypermedia (HT 2012)

Sascha Fahl, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben and Matthew Smith(2012): Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security,Proceedings of the 19th ACM Conference on Computer and Communications Security (ACM CCS 2012), to appear Datei

Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith(2012): Confidentiality as a Service - Usable Security for the Cloud,11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012)

Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander and Matthew Smith(2012): Helping Johnny 2.0 to Encrypt His Facebook Conversations,Eighth Symposium On Usable Privacy and Security (SOUPS 2012) Datei

Yassene Mohammed, Gabriele von Voigt, Matthew Smith(2012): Enabling Big Data Driven Biomedicine Using Scientific Workflows and Cloud Computing,GMDS 2012, 16.-20. Sept., Beitrag: 173

Zeitschriftenartikel

Michael Brenner(2012): Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie,iX Magazin für professionelle Informationstechnik (ISSN 0935-9680) Ausgabe 6/2012, S. 120-124, heise Verlag

Michael Brenner(2012): Vertrauliche Datenverarbeitung in der Cloud - Wie schützt man Programme und Daten in verteilten Systemen?,Unimagazin (ISSN 1616-4075) Ausgabe 1/2 2012 "Future Internet", Leibniz Universität Hannover

Patente

Michael Brenner, Matthew Smith(2012): Encrypted Computing,International Patent EP 2678772 B1 20150408 (DE) "Encrypted Computing"

Dissertationen

Michael Brenner(2012): Rechnen mit verschlüsselten Programmen und Daten,Dissertation, Technische Informationsbibliothek Hannover Datei

Studentische Arbeiten (Auszug)

Marcus Wobig(2012): Entsperren von Android Smartphones mit Hilfe von Near Field Communication,Prüfer: M. Smith, G. von Voigt; Betreuer: S. Fahl; Bachelorarbeit, August 2012 Datei

Marten Oltrogge(2012): Konzeptionierung und Implementierung einer Webapplikation zur Benutzerverwaltung für den CaaS Dienst,Prüfer: M. Smith, G. von Voigt; Betreuer: S. Fahl; Bachelorarbeit, März 2012