Papers and Articles
Attribute-based Credentials for Trust: Identity in the Information Society | |
Kai Rannenberg, Jan Camenisch, and Ahmad Sabouri, eds. | |
ISBN 978-3-319-14439-9. Springer, 2015. | |
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions | |
Jan Camenisch, Robert R. Enderlein, and Gregory Neven | |
Public-Key Cryptography--PKC 2015, pp. 283-307. Springer, 2015. | |
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life | |
Ahmad Sabouri, Kai Rannenberg | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 3-16. Springer, 2015. | |
A Cloud-based Model to Facilitate Mobility of Privacy-preserving Attribute-based Credential Users | |
Ahmad Sabouri | |
To appear in the Proceedings of IEEE TrustCom 2015. | |
Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers | |
Ahmad Sabouri | |
To appear in the Proceedings of 14th IFIP Conference on e-Business, e-Services and e-Society (I3E 2015). | |
Anonymous ePetitions – Another Step towards eDemocracy | |
Hannah Obersteller | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 110-124. Springer, 2015. | |
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues | |
Felix Bieker, Marit Hansen, Gert L. Mikkelsen, Hannah Obersteller | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 253-266. Springer, 2015. | |
Benchmarking Privacy-ABC Technologies - Evaluation of Storage and Communication Efficiency | |
Fatbardh Veseli, Jetzabel Serna-Olvera | |
To appear in the Proceedings of IEEE Service 2015. | |
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication | |
Ronny Bjones, Ioannis Krontiris, Pascal Pallier, Kai Rannenberg | |
Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 111-124. Springer, 2014. | |
Concepts and Languages for Privacy-preserving Attribute-based Authentication | |
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss | |
Journal of Information Security and Applications, Vol. 19, Issue 1, pp. 25-44. Elsevier, 2014. | |
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials | |
Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, Paul Spirakis, and Yannis Stamatiou | |
Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 140-156. Springer, 2014. | |
Hemmnisse für Privacy by Design und Privacy Technologies | |
Marit Hansen | |
Fundationes I: Geschichte und Theorie des Datenschutzes. Monsenstein und Vannerdat, 2014. | |
Towards a Framework for Benchmarking Privacy-ABC Technologies | |
Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri | |
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference (SEC 2014), pp. 197-204. Springer, 2014. | |
User Acceptance of Privacy-ABCs: An Exploratory Study | |
Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasia Liagkou, Kai Rannenberg, Yannis C. Stamatioun | |
Second International Conference on Human Aspects of Information Security, Privacy, and Trust - (HAS 2014), pp. 375-386. Springer, 2014. | |
Towards a Privacy-preserving Inspection Process for Authentication Solutions with Conditional Identification | |
Felix Bieker, Marit Hansen, Harald Zwingelberg | |
Open Identity Summit 2014, pp. 85-96. Gesellschaft für Informatik, 2014. | |
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures | |
Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven | |
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, pp. 551-572. Springer, 2014. | |
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment | |
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven | |
34th Annual Cryptology Conference on Advances in Cryptology (CRYPTO 2014), pp. 256-275. Springer, 2014. | |
Privacy-Preserving Auditing for Attribute-Based Credentials | |
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial | |
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, pp. 109-127. Springer, 2014. | |
On the Impossibility of Structure-Preserving Deterministic Primitives | |
Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya | |
Theory of Cryptography - 11th Theory of Cryptography Conference (TCC 2014), pp. 713-738. Springer, 2014. | |
Privacy-preserving Authentication Solutions – Best Practices for Implementation and EU Regulatory Perspectives | |
Felix Bieker, Marit Hansen | |
eChallenges 2014 Conference Proceedings, pp. 1-10. IEEE, 2014. | |
Privacy-ABCs to Leverage Identity Management as a Service | |
Ahmad Sabouri, Ronny Bjones | |
Privacy Technologies and Policy - Second Annual Privacy Forum (APF 2014), pp. 143-153. Springer, 2014. | |
Trust Relationships in Privacy-ABCs Ecosystem | |
Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg | |
11th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2014), pp. 13-23. Springer, 2014. | |
Integrating and Trialling Attribute-based Credentials on Smartcards for Building Trust - The ABC4Trust Project | |
Ahmad Sabouri, Jonas Lindstrøm Jensen, Kasper Lyneborg Damgård, Janus Dam Nielsen, Kai Rannenberg | |
24. SIT-Smartcard Workshop, pp. 8-21. Fraunhofer Verlag, 2014. | |
Privacy-respecting School Community Interaction Platform | |
Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg | |
Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum (CSP Forum 2014), pp. 108-119. Springer, 2014. | |
Negotiating and Brokering Cloud Resources based on Security Level Agreements | |
Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo | |
3rd International Conference on Cloud Computing and Services Science, pp. 533-541. SciTePress, 2013. | |
Anonymously Sharing Flickr Pictures with Facebook Friends | |
Jan Camenisch, Günter Karjoth, Gregory Neven, and Franz-Stefan Preiss | |
12th ACM Workshop on Privacy in the Electronic Society, pp. 13-24. ACM, 2013. | |
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication | |
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss | |
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 34-52. Springer, 2013. | |
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics | |
Hamza Ghani, Jesus Luna, Neeraj Suri | |
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), pp. 1-8. IEEE, 2013. | |
Predictive Vulnerability Scoring in the Context of Insufficient Information Availability | |
Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri | |
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), pp. 1-8. IEEE, 2013. | |
Fair Private Set Intersection with a Semi-trusted Arbiter. | |
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello | |
Data and Applications Security and Privacy XXVII - 27th Annual IFIP WG 11-3 Conference (DBSec 2013), pp. 128-144. Springer, 2013. | |
Recognizing Your Digital Friends | |
Patrik Bichsel, Jan Camenisch, Mario Verdicchio | |
Security and Privacy in Social Networks, pp. 27-46. Springer, 2013. | |
Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions | |
Masayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki | |
2013 ACM Workshop on Digital Identity Management (DIM’13), pp. 1-12. ACM, 2013. | |
Understanding and Using Anonymous Credentials | |
Zinaida Benenson, Ioannis Krontiris, Kai Rannenberg, Vasia Liagkou, Alexander Schopf, Dominik Schröder, Yannis Stamatiou, | |
Posters of the 9th Symposium On Usable Privacy and Security (SOUPS 2013), 2013. | |
Online Privacy - Towards Informational Self-Determination on the Internet | |
Simone Fischer-Hübner, Chris Hoofnagle, Ioannis Krontiris, Kai Rannenberg, and Michael Waidner | |
Digital Enlightenment Yearbook - The Value of Personal Data, pp. 123-138. IOS Press, 2013. | |
Privacy-Respecting Discovery of Data Providers in Crowd-Sensing Applications | |
Ioannis Krontiris, Tassos Dimitriou | |
9th IEEE International Conference on Distributed Computing in Sensor Systems (IEEE DCOSS 2013), pp. 249-257. IEEE, 2013. | |
Data Protection by Default in Identity-Related Applications | |
Marit Hansen | |
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 4-17. Springer, 2013. | |
Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals – Position Paper | |
Marit Hansen | |
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference (IDMAN 2013), pp. 104-106. Springer, 2013. | |
Eighth ACM Workshop on Digital Identity Management (DIM 2013): Identity at the Crossroads | |
Thomas Groß, Marit Hansen | |
2013 ACM SIGSAC Conference on Computer & communications security (CCS '13), pp. 1493-1494. ACM, 2013. | |
Wasch mich, aber mach mich nicht nass - Anonymisierungsverfahren als Schlüssel zur datenschutzkonformen E-Mail-Filterung | |
Nils Gruschka, Meiko Jensen | |
Informatik 2013 - Informatik angepasst an Mensch, Organisation und Umwelt, pp. 2119-2133. Köllen Verlag, 2013. | |
A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution | |
Vasiliki Liagkou, Effi Makri, Paul Spirakis, Yiannis Stamatiou | |
Global Security, Safety, and Sustainability - 7th International and 4th e-Democracy Joint Conferences (ICGS3/e-Democracy 2011), pp. 72-79. Springer, 2012. | |
Privacy-by-Design Based on Quantitative Threat Modeling | |
Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris | |
7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), pp. 2012. IEEE, 2012. | |
Menschen vergessen – Systeme nicht, Mehr Datenschutz für den Einzelnen mit ABC4Trust | |
Ioannis Krontiris, Apostolis Pyrgelis | |
PHP Magazine Vol. 5/12. PHP Magazine, 2012. | |
ABC4Trust EU Project | |
Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg | |
9th International Conference Trust, Privacy and Security in Digital Business (TrustBus 2012), pp. 218-219. Springer, 2012. | |
Quantitative Assessment of Cloud Security Level Agreements: A Case Study | |
Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri | |
International Conference on Security and Cryptography (ECRYPT 2012), pp. 64-73. SciTePress, 2012. | |
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees | |
Jesus Luna Garcia, Robert Langenberg, Neeraj Suri | |
2012 ACM Workshop on Cloud Computing Security, pp. 103-112. ACM, 2012. | |
Cyber-Physical Systems und Privatsphärenschutz | |
Marit Hansen, Christian Thiel | |
Datenschutz und Datensicherheit (DuD), Vol. 36, No. 1, pp. 26-30. SP Gabler Verlag, 2012. | |
Vertraulichkeit und Integrität von Daten und IT-Systemen im Cloud-Zeitalter | |
Marit Hansen | |
Datenschutz und Datensicherheit (DuD), Vol. 36, No. 6, pp. 407-412. SP Gabler Verlag, 2012. | |
Überwachungstechnologien | |
Marit Hansen | |
Datenschutz Grundlagen, Entwicklungen und Kontroversen, Schriftenreihe Band 1190, pp. 78-87. Bundeszentrale für politische Bildung, 2012. | |
Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals | |
Marit Hansen | |
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 14-31. Springer, 2012. | |
Extending Comparison Shopping Sites by Privacy Information on Retailers | |
Ulrich König, Marit Hansen | |
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 171-186. Springer, 2012. | |
Privacy Protection Goals and Their Implications for eID Systems | |
Harald Zwingelberg, Marit Hansen | |
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 245-260. Springer, 2012. | |
Electronic Identities Need Private Credentials | |
Jan Camenisch, Anja Lehmann, Gregory Neven | |
IEEE Security & Privacy, Vol. 10, No. 1, pp. 218-219. IEEE, 2012. | |
Batch Verification of Short Signatures | |
Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen | |
Journal of Cryptology, Vol. 25, No. 4, pp. 723-747. Springer, 2012. | |
Efficient Attributes for Anonymous Credentials | |
Jan Camenisch, Thomas Groß | |
ACM Transactions on Information and System Security, Vol. 15, Issue 1, Art. Nr. 4. ACM, 2012. | |
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing | |
Jan Camenisch, Anna Lysyanskaya, Gregory Neven | |
2012 ACM Conference on Computer and Communications Security, pp. 525-536. ACM, 2012. | |
Data-Minimizing Authentication Goes Mobile | |
Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer | |
Communications and Multimedia Security - 13th IFIP TC 6/TC 11 International Conference (CMS 2012), pp. 55-71. Springer, 2012. | |
A Calculus for Privacy-friendly Authentication | |
Patrik Bichsel, Jan Camenisch, Dieter Sommer | |
17th ACM Symposium on Access Control Models and Technologies, pp. 157-166. ACM, 2012. | |
Fully Anonymous Attribute Tokens from Lattices | |
Jan Camenisch, Gregory Neven, Markus Rückert | |
Security and Cryptography for Networks - 8th International Conferenc (SCN 2012), pp. 57-75. Springer, 2012. | |
Efficient Structure-Preserving Signature Scheme from Standard Assumptions | |
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambie | |
Security and Cryptography for Networks - 8th International Conference (SCN 2012), pp. 76-94. Springer, 2012. | |
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption | |
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven | |
Security and Cryptography for Networks - 8th International Conferenc (SCN 2012), pp. 559-579. Springer, 2012. | |
Computing on Authenticated Data | |
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters | |
Theory of Cryptography: 9th Theory of Cryptography Conference (TCC 2012), pp. 1-20. Springer, 2012. | |
A Security Metrics Framework for the Cloud | |
Jesus Luna, Hamza Ghani, Daniel Germanus and Neeraj Suri | |
International Conferences on Security and Cryptography (SECRYPT 2011), pp. 245-250. SciTePress, 2011. | |
Privacy Protection Goals and Top 10 Mistakes in System Design from a Privacy Perspective | |
Marit Hansen | |
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 14-31. Springer, 2011. | |
Datenschutz im Web 2.0 – ein Auslaufmodell? | |
Marit Hansen | |
Kritische Positionen - Sicherheit mit und ohne Netz – Technische und rechtliche Herausforderungen des Web 2.0 - 3rd Symposium of IT-Sicherheit am Donaustrand, pp. 23-26. Verlag Karl Stutz, 2011. | |
Privacy 2.0 – Ein Reality-Check | |
Marit Hansen | |
Kritische Positionen - Sicherheit mit und ohne Netz – Technische und rechtliche Herausforderungen des Web 2.0 - 3rd Symposium of IT-Sicherheit am Donaustrand”, pp. 23-26. Verlag Karl Stutz, 2011. | |
De-Mail und Datenschutz – Gesetzliche Anforderungen, Zertifizierung und Verbesserungspotential | |
Thomas Probst, Marit Hansen | |
Sicher in die digitale Welt von morgen: Tagungsband zum 12. Deutschen IT-Sicherheitskongress, pp. 455-468. Gau-Algesheim: SecuMedia, 2011. | |
Towards Displaying Privacy Information With Icons | |
Leif-Erik Holtz, Katharina Nocun, Marit Hansen | |
Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, pp. 338-348. Springer, 2011. | |
Identity and Privacy Issues Throughout Life | |
Jaromir Dobias, Marit Hansen, Stefan Köpsell, Maren Raguse, Arnold Roosendaal, Andreas Pfitzmann, Sandra Steinbrecher, Katalin Storf, Harald Zwingelberg | |
Privacy and Identity Management for Life, pp. 87-110. Springer, 2011. | |
Transparency Tools | |
Hans Hedbom, Tobias Pulls, Marit Hansen | |
Privacy and Identity Management for Life, pp. 135-143. Springer, 2011. | |
Privacy Policy Icons | |
Leif-Erik Holtz, Harald Zwingelberg, Marit Hansen | |
Privacy and Identity Management for Life, pp. 279-285. Springer, 2011. | |
Contributions to Standardisation | |
Hans Hedbom, Jan Schallaböck, Rigo Wenning, Marit Hansen | |
Privacy and Identity Management for Life, pp. 479-492. Springer, 2011. | |
PrimeLife's Legacy | |
Jan Camenisch, Marit Hansen | |
Privacy and Identity Management for Life, pp. 505-506. Springer, 2011. | |
Juristische Fragen altersgerechter Assistenzsysteme, Studie im Auftrag des BMBF | |
ULD (Several Authors) | |
ULD Website, 2011. | |