• Publications
  • Influence
Cryptography for Security and Privacy in Cloud Computing
TLDR
A compilation of various recent cryptographic primitives, providing readers with the features and limitations of each. Expand
Security for the Robot Operating System
TLDR
We show how to secure ROS on an application level and describe a solution which is integrated directly into the ROS core. Expand
Defending Against Advanced Persistent Threats Using Game-Theory
TLDR
This work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Expand
S-BPM Illustrated
TLDR
In this book, the authors show how S-BPM and its tools can be used in order to solve communication and synchronization problems involving humans and/or machines in an organization. Expand
Application-level security for ROS-based applications
TLDR
We propose a security architecture intended for use on top of ROS on the application level. Expand
An Overview of Data Quality Frameworks
TLDR
This paper surveys data quality frameworks in a comparative way regarding the definition, assessment, and improvement of data quality with a focus on methodologies that are applicable in a wide range of business environments. Expand
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare
TLDR
We generalize the concept of redactable signatures towards documents that inherently provide a structure and investigate the security of our construction. Expand
Implementation of quantum key distribution network simulation module in the network simulator NS-3
TLDR
In this paper, we described the design of the QKD network simulation module which was developed in the network simulator of version 3 (NS-3). Expand
Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory
TLDR
The protection of cyber-physical networks is a topic of increasing importance. Expand
On the Security of a Universal Cryptocomputer: the Chosen Instruction Attack
TLDR
In this paper, we look at an idealized model of outsourced computation, which we call a cryptocomputer. Expand
...
1
2
3
4
5
...