Blog Standard

ICT 2015 - Key challenges in end-to-end privacy/security in untrusted environments

Venue: Centro de Congressos de Lisboa. Lisbon, Portugal. Networking session 8 - (Sala 1.07). 1st floor. Date: October 22nd 2015. Time: 14:50-15:35 A joint networking session supported by the Horizon 2020 projects PRISMACLOUD, TREDISEC and WITDOM is going to...


Cloud Security and Privacy by Design

Thomas LorĂŒnser, Thomas LĂ€nger, and Daniel Slamanig "Cloud Security and Privacy by Design" 6th International Conference on E-Democracy, Athens, Greece, 10th - 11th December, 2015. Proceedings.


Proactive Security Analysis of Changes in Virtualized Infrastructures

Authors Sören Bleikertz (IBM Research - Zurich), Carsten Vogel (IBM Research - Zurich), Thomas Groß (Newcastle University), Sebastian Mödersheim (DTU Compute) Abstract The pervasiveness of cloud computing can be attributed to its scale and elasticity. However, the operational complexity of...


Privacy-Aware Authentication in the Internet of Things

Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer. "Privacy-Aware Authentication in the Internet of Things", Cryptology and Network Security, 14th International Conference, CANS 2015, Marrakesh, Morocco, December 8-12. 2015.


ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing

Thomas LorĂŒnser, Andreas Happe, and Daniel Slamanig. "ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing". IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, Canada, November 30 - December 3, 2015.


Towards a New Paradigm for Privacy and Security in Cloud Services

Thomas LorĂŒnser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-HĂŒbner, Thomas Groß, Thomas LĂ€nger, Mathieu des Noes, Henrich C. Pöhls, Boris Rozenberg, and Daniel Slamanig. "Towards a New Paradigm for Privacy and Security in Cloud Services". In New LEIT projects...


Signatures and Efficient Proofs on Committed Graphs and NP-Statements

Author Thomas Gross (School of Computing Science, Newcastle University, UK) Abstract Digital signature schemes are a foundational building block enabling integrity and non-repudiation. We propose a graph signature scheme and corresponding proofs that allow a prover (1) to obtain a signature...



Become a Member