Papers and Articles

Attribute-based Credentials for Trust: Identity in the Information Society
  Kai Rannenberg, Jan Camenisch, and Ahmad Sabouri, eds.
  ISBN 978-3-319-14439-9. Springer, 2015.
 
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
  Jan Camenisch, Robert R. Enderlein, and Gregory Neven
  Public-Key Cryptography--PKC 2015, pp. 283-307. Springer, 2015.
   
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life
  Ahmad Sabouri, Kai Rannenberg
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 3-16. Springer, 2015.
   
A Cloud-based Model to Facilitate Mobility of Privacy-preserving Attribute-based Credential Users
  Ahmad Sabouri
  To appear in the Proceedings of IEEE TrustCom 2015.
   
Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers
  Ahmad Sabouri
  To appear in the Proceedings of 14th IFIP Conference on e-Business, e-Services and e-Society (I3E 2015).
   
Anonymous ePetitions – Another Step towards eDemocracy
  Hannah Obersteller
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 110-124. Springer, 2015.
   
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues
  Felix Bieker, Marit Hansen, Gert L. Mikkelsen, Hannah Obersteller
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 253-266. Springer, 2015.
   
Benchmarking Privacy-ABC Technologies - Evaluation of Storage and Communication Efficiency
  Fatbardh Veseli, Jetzabel Serna-Olvera
  To appear in the Proceedings of IEEE Service 2015.
   
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication
  Ronny Bjones, Ioannis Krontiris, Pascal Pallier, Kai Rannenberg
  Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 111-124. Springer, 2014.
   
Concepts and Languages for Privacy-preserving Attribute-based Authentication
  Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
  Journal of Information Security and Applications, Vol. 19, Issue 1, pp. 25-44. Elsevier, 2014.
   
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials
  Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, Paul Spirakis, and Yannis Stamatiou
  Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 140-156. Springer, 2014.
   
Hemmnisse für Privacy by Design und Privacy Technologies
  Marit Hansen
  Fundationes I: Geschichte und Theorie des Datenschutzes. Monsenstein und Vannerdat, 2014.
   
Towards a Framework for Benchmarking Privacy-ABC Technologies
  Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
  ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference (SEC 2014), pp. 197-204. Springer, 2014.
   
User Acceptance of Privacy-ABCs: An Exploratory Study
  Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasia Liagkou, Kai Rannenberg, Yannis C. Stamatioun
  Second International Conference on Human Aspects of Information Security, Privacy, and Trust - (HAS 2014), pp. 375-386. Springer, 2014.
   
Towards a Privacy-preserving Inspection Process for Authentication Solutions with Conditional Identification
  Felix Bieker, Marit Hansen, Harald Zwingelberg
  Open Identity Summit 2014, pp. 85-96. Gesellschaft für Informatik, 2014.
   
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
  Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven
  Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, pp. 551-572. Springer, 2014.
   
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment
  Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
  34th Annual Cryptology Conference on Advances in Cryptology (CRYPTO 2014), pp. 256-275. Springer, 2014.
   
Privacy-Preserving Auditing for Attribute-Based Credentials
  Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
  Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, pp. 109-127. Springer, 2014.
   
On the Impossibility of Structure-Preserving Deterministic Primitives
  Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya
  Theory of Cryptography - 11th Theory of Cryptography Conference (TCC 2014), pp. 713-738. Springer, 2014.
   
Privacy-preserving Authentication Solutions – Best Practices for Implementation and EU Regulatory Perspectives
  Felix Bieker, Marit Hansen
  eChallenges 2014 Conference Proceedings, pp. 1-10. IEEE, 2014.
   
Privacy-ABCs to Leverage Identity Management as a Service
  Ahmad Sabouri, Ronny Bjones
  Privacy Technologies and Policy - Second Annual Privacy Forum (APF 2014), pp. 143-153. Springer, 2014.
   
Trust Relationships in Privacy-ABCs Ecosystem
  Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
  11th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2014), pp. 13-23. Springer, 2014.
   
Integrating and Trialling Attribute-based Credentials on Smartcards for Building Trust - The ABC4Trust Project
  Ahmad Sabouri, Jonas Lindstrøm Jensen, Kasper Lyneborg Damgård, Janus Dam Nielsen, Kai Rannenberg
  24. SIT-Smartcard Workshop, pp. 8-21. Fraunhofer Verlag, 2014.
   
Privacy-respecting School Community Interaction Platform
  Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg
  Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum (CSP Forum 2014), pp. 108-119. Springer, 2014.
   
Negotiating and Brokering Cloud Resources based on Security Level Agreements
  Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo
  3rd International Conference on Cloud Computing and Services Science, pp. 533-541. SciTePress, 2013.
   
Anonymously Sharing Flickr Pictures with Facebook Friends
  Jan Camenisch, Günter Karjoth, Gregory Neven, and Franz-Stefan Preiss
  12th ACM Workshop on Privacy in the Electronic Society, pp. 13-24. ACM, 2013.
   
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication
  Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss
  Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 34-52. Springer, 2013.
   
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
  Hamza Ghani, Jesus Luna, Neeraj Suri
  2013 International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), pp. 1-8. IEEE, 2013.
   
Predictive Vulnerability Scoring in the Context of Insufficient Information Availability
  Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri
  2013 International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), pp. 1-8. IEEE, 2013.
   
Fair Private Set Intersection with a Semi-trusted Arbiter.
  Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
  Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11-3 Conference (DBSec 2013), pp. 128-144. Springer, 2013.
   
Recognizing Your Digital Friends
  Patrik Bichsel, Jan Camenisch, Mario Verdicchio
  Security and Privacy in Social Networks, pp. 27-46. Springer, 2013.
   
Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions
  Masayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki
  2013 ACM Workshop on Digital Identity Management (DIM’13), pp. 1-12. ACM, 2013.
   
Understanding and Using Anonymous Credentials
  Zinaida Benenson, Ioannis Krontiris, Kai Rannenberg, Vasia Liagkou, Alexander Schopf, Dominik Schröder, Yannis Stamatiou,
  Posters of the 9th Symposium On Usable Privacy and Security (SOUPS 2013), 2013.
   
Online Privacy - Towards Informational Self-Determination on the Internet
  Simone Fischer-Hübner, Chris Hoofnagle, Ioannis Krontiris, Kai Rannenberg, and Michael Waidner
  Digital Enlightenment Yearbook - The Value of Personal Data, pp. 123-138. IOS Press, 2013.
   
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications
  Ioannis Krontiris, Tassos Dimitriou
  9th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2013), pp. 249-257. IEEE, 2013.
   
Data Protection by Default in Identity-Related Applications
  Marit Hansen
  Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 4-17. Springer, 2013.
   
Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals – Position Paper
  Marit Hansen
  Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 104-106. Springer, 2013.
   
Eighth ACM Workshop on Digital Identity Management (DIM 2013): Identity at the Crossroads
  Thomas Groß, Marit Hansen
  2013 ACM SIGSAC Conference on Computer & communications security (CCS '13), pp. 1493-1494. ACM, 2013.
   
Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung
  Nils Gruschka, Meiko Jensen
  Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt, pp. 2119-2133. Köllen Verlag, 2013.
   
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution
  Vasiliki Liagkou, Effi Makri, Paul Spirakis, Yiannis Stamatiou
  Global Security, Safety, and Sustainability - 7th International and 4th e-Democracy Joint Conferences (ICGS3/e-Democracy 2011), pp. 72-79. Springer, 2012.
   
Privacy-by-Design Based on Quantitative Threat Modeling
  Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris
  7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), pp. 2012. IEEE, 2012.
   
Menschen vergessen – Systeme nicht, Mehr Datenschutz für den Einzelnen mit ABC4Trust
  Ioannis Krontiris, Apostolis Pyrgelis
  PHP Magazine Vol. 5/12. PHP Magazine, 2012.
   
ABC4Trust EU Project
  Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
  9th International Conference Trust, Privacy and Security in Digital Business (TrustBus 2012), pp. 218-219. Springer, 2012.
   
Quantitative Assessment of Cloud Security Level Agreements: A Case Study
  Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri
  International Conference on Security and Cryptography (ECRYPT 2012), pp. 64-73. SciTePress, 2012.
   
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees
  Jesus Luna Garcia, Robert Langenberg, Neeraj Suri
  2012 ACM Workshop on Cloud Computing Security, pp. 103-112. ACM, 2012.
   
Cyber-Physical Systems und Privatsphärenschutz
  Marit Hansen, Christian Thiel
  Datenschutz und Datensicherheit (DuD), Vol. 36, No. 1, pp. 26-30. SP Gabler Verlag, 2012.
   
Vertraulichkeit und Integrität von Daten und IT-Systemen im Cloud-Zeitalter
  Marit Hansen
  Datenschutz und Datensicherheit (DuD), Vol. 36, No. 6, pp. 407-412. SP Gabler Verlag, 2012.
   
Überwachungstechnologien
  Marit Hansen
  Datenschutz Grundlagen, Entwicklungen und Kontroversen, Schriftenreihe Band 1190, pp. 78-87. Bundeszentrale für politische Bildung, 2012.
   
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals
  Marit Hansen
  Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 14-31. Springer, 2012.
   
Extending Comparison Shopping Sites by Privacy Information on Retailers
  Ulrich König, Marit Hansen
  Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 171-186. Springer, 2012.
   
Privacy Protection Goals and Their Implications for eID Systems
  Harald Zwingelberg, Marit Hansen
  Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 245-260. Springer, 2012.
   
Electronic Identities Need Private Credentials
  Jan Camenisch, Anja Lehmann, Gregory Neven
  IEEE Security & Privacy, Vol. 10, No. 1, pp. 218-219. IEEE, 2012.
   
Batch Verification of Short Signatures
  Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen
  Journal of Cryptology, Vol. 25, No. 4, pp. 723-747. Springer, 2012.
   
Efficient Attributes for Anonymous Credentials
  Jan Camenisch, Thomas Groß
  ACM Transactions on Information and System Security, Vol. 15, Issue 1, Art. Nr. 4. ACM, 2012.
   
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing
  Jan Camenisch, Anna Lysyanskaya, Gregory Neven
  2012 ACM Conference on Computer and Communications Security, pp. 525-536. ACM, 2012.
   
Data-Minimizing Authentication Goes Mobile
  Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
  Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference (CMS 2012), pp. 55-71. Springer, 2012.
   
A Calculus for Privacy-friendly Authentication
  Patrik Bichsel, Jan Camenisch, Dieter Sommer
  17th ACM Symposium on Access Control Models and Technologies, pp. 157-166. ACM, 2012.
   
Fully Anonymous Attribute Tokens from Lattices
  Jan Camenisch, Gregory Neven, Markus Rückert
  Security and Cryptography for Networks - 8th International Conferenc (SCN 2012), pp. 57-75. Springer, 2012.
   
Efficient Structure-Preserving Signature Scheme from Standard Assumptions
  Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambie
  Security and Cryptography for Networks - 8th International Conference (SCN 2012), pp. 76-94. Springer, 2012.
   
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
  Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven
  Security and Cryptography for Networks - 8th International Conferenc (SCN 2012), pp. 559-579. Springer, 2012.
   
Computing on Authenticated Data
  Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
  Theory of Cryptography: 9th Theory of Cryptography Conference (TCC 2012), pp. 1-20. Springer, 2012.
   
A Security Metrics Framework for the Cloud
  Jesus Luna, Hamza Ghani, Daniel Germanus and Neeraj Suri
  International Conferences on Security and Cryptography (SECRYPT 2011), pp. 245-250. SciTePress, 2011.
   
Privacy Protection Goals and Top 10 Mistakes in System Design from a Privacy Perspective
  Marit Hansen
  Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 14-31. Springer, 2011.
   
Datenschutz im Web 2.0 – ein Auslaufmodell?
  Marit Hansen
  Kritische Positionen - Sicherheit mit und ohne Netz – Technische und rechtliche Herausforderungen des Web 2.0 - 3rd Symposium of IT-Sicherheit am Donaustrand, pp. 23-26. Verlag Karl Stutz, 2011.
   
Privacy 2.0 – Ein Reality-Check
  Marit Hansen
  Kritische Positionen - Sicherheit mit und ohne Netz – Technische und rechtliche Herausforderungen des Web 2.0 - 3rd Symposium of IT-Sicherheit am Donaustrand”, pp. 23-26. Verlag Karl Stutz, 2011.
   
De-Mail und Datenschutz – Gesetzliche Anforderungen, Zertifizierung und Verbesserungspotential
  Thomas Probst, Marit Hansen
  Sicher in die digitale Welt von morgen: Tagungsband zum 12. Deutschen IT-Sicherheitskongress, pp. 455-468. Gau-Algesheim: SecuMedia, 2011.
   
Towards Displaying Privacy Information With Icons
  Leif-Erik Holtz, Katharina Nocun, Marit Hansen
  Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 338-348. Springer, 2011.
   
Identity and Privacy Issues Throughout Life
  Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg
  Privacy and Identity Management for Life, pp. 87-110. Springer, 2011.
   
Transparency Tools
  Hans Hedbom, Tobias Pulls, Marit Hansen
  Privacy and Identity Management for Life, pp. 135-143. Springer, 2011.
   
Privacy Policy Icons
  Leif-Erik Holtz, Harald Zwingelberg, Marit Hansen
  Privacy and Identity Management for Life, pp. 279-285. Springer, 2011.
   
Contributions to Standardisation
  Hans Hedbom, Jan Schallaböck, Rigo Wenning, Marit Hansen
  Privacy and Identity Management for Life, pp. 479-492. Springer, 2011.
   
PrimeLife's Legacy
  Jan Camenisch, Marit Hansen
  Privacy and Identity Management for Life, pp. 505-506. Springer, 2011.
   
Juristische Fragen altersgerechter Assistenzsysteme, Studie im Auftrag des BMBF
  ULD (Several Authors)
  ULD Website, 2011.
   

 

 

Additional information