Books and Monographs

Proceedings Volumes

  • M. Barni, J. Herrera, S. Katzenbeisser, F. Perez-Gonzalez, Information Hiding, 7th International Workshop (IH 2005), Springer Lecture Notes in Computer Science, vol. 3727, 2005.
    [Link: Springer]
  • J. Dittmann, S. Katzenbeisser, A. Uhl, Communications and Multimedia Security, 9th International Conference (CMS 2005), Springer Lecture Notes in Computer Science, vol. 3677, 2005.
    [Link: Springer]
  • Y. Shi, H.-J. Kim, S. Katzenbeisser, Digital Watermarking, 6th International Workshop (IWDW 2007), Springer Lecture Notes in Computer Science, vol. 5041, 2007.
    [Link: Springer]
  • H.-J. Kim, S. Katzenbeisser, A. Ho, Digital Watermarking, 7th International Workshop (IWDW 2008), Springer Lecture Notes in Computer Science, vol. 5450, 2007.
    [Link: Springer]
  • S. Katzenbeisser, A.-R. Sadeghi, 11th Information Hiding (IH 2009), Proceedings, Springer Lecture Notes in Computer Science, vol. 5806, 2009.
    [Link: Springer]
  • Y. Chen, S. Katzenbeisser, A.-R. Sadeghi, Proceedings of the 11th ACM Workshop on Digital Rights Management (ACM DRM'11), ACM Press, 2011.
    [Link: ACM]
  • S. Katzenbeisser, K. Kursawe, B. Preneel, A.-R. Sadeghi, Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511), Dagstuhl Reports 1(12), pp. 62-68, 2011.
    [Link: Dagstuhl]
  • M. Bieliková, G. Friedrich, G. Gottlob, S. Katzenbeisser, G. Turán, 38th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2012), Springer Lecture Notes in Computer Science, vol. 7147, 2012.
    [Link: Springer]
  • S. Katzenbeisser, E. Weippl, L. Jean Camp, M. Volkamer, M. Reiter, X. Zhang, 5th International Conference on Trust and Trustworthy Computing (TRUST 2012), Springer Lecture Notes in Computer Science, vol. 7344, 2012.
    [Link: Springer]
  • C. Li, J. Dittmann, S. Katzenbeisser, S. Craver, Multimedia and Security Workshop (MM&Sec 2012), ACM Press, 2012.
    [Link: ACM]
  • A. Katzenbeisser, V. Lotz, E. Weippl, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), GI LNI, vol. 228, 2014.
  • A. Unterweger, A. Uhl, S. Katzenbeisser, R. Kwitt, A. Piva, ACM Information Hiding and Multimedia Security Workshop (IH&MMSec '14), ACM Press, 2014.
    [Link: ACM]
  • S. Katzenbeisser, J. Guajardo, Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (TrustED), ACM Press, 2015.
    [Link: ACM]
  • J.-P. Hubaux, S. Katzenbeisser, B. Malin, G. Tsudik, Genomic Privacy, Dagstuhl Seminar 15431, Dagstuhl Reports 5(10), 2015.
    [Link: Dagstuhl]
  • G. Danezis, S. Katzenbeisser, C. Peters, B. Preneel, Privacy and Security in Smart Energy Grids, Dagstuhl Seminar 16032, Dagstuhl Reports 6(1), 2016.
    [Link: Dagstuhl]
  • J.-H. Hoepman, S. Katzenbeisser, ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Proceedings, Springer Verlag, 2016
    [Link: Springer]
  • E. R. Weippl, S. Katzenbeisser, C. Kruegel, A. C. Myers, S. Halevi, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), ACM Press, 2016
    [Link: ACM]

Papers in Journals

  • A. Adelsbach, S. Katzenbeisser, A. Sadeghi, "Watermark Detection With Zero-Knowledge Disclosure", ACM Multimedia Systems, Springer Verlag, vol. 9, no. 3, 2003, pp.266-278.
    [Link: Springer]
  • F. Fischer, M. Holzer, S. Katzenbeisser, "The Influence of Neighbourhood and Choice on the Complexity of Finding Pure Nash Equilibria", Information Processing Letters, vol. 99, no. 6, 2006, pp. 239-245.
    [Link: Elsevier]
  • M. Christodorescu, J. Kinder, S. Jha, S. Katzenbeisser, H. Veith, "Software Transformations to Improve Malware Detection", in Journal in Computer Virology, Springer Verlag, vol. 3, no. 4, 2007, pp. 253-265.
    [Link: Springer]
  • S. Kirbiz, M. Celik, A. Lemma, S. Katzenbeisser, "Decode-Time Forensic Watermarking of AAC Bit-Streams", in IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, 2007, pp. 683-696.
    [Link: IEEE]
  • Z. Erkin, A. Piva, S. Katzenbeisser, R. Lagendijk, J. Shokrollahi, G. Neven, "Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing", in EURASIP Journal on Information Security, 2007.
    [Link: Hindawi, open access]
  • B. Skoric, S. Katzenbeisser, M. Celik, "Symmetric Tardos Fingerprinting Codes for Arbitrary Alphabet Sizes", in Designs, Codes and Cryptography, vol. 42, no. 2, 2008, pp. 137-166.
    [Link: Springer]
  • M. Celik, A. Lemma, S. Katzenbeisser, M. van der Veen, "Look-Up-Table Based Secure Client-Side Embedding for Spread-Spectrum Watermarks", in IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, 2008, pp. 475-487.
    [Link: IEEE]
  • S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, M. Maas, "A Buyer-Seller Watermarking Protocol Based on Secure Embedding", in IEEE Transactions on Information Forensics and Security, vol. 3, no. 4, 2008, pp. 783-786.
    [Link: IEEE]
  • S. Müller, S. Katzenbeisser, C. Eckert, "On Multi-Authority Ciphertext-Policy Attribute-Based Encryption", in Bulletin of the Korean Mathematical Society, vol. 46, no. 4, 2009, pp. 803-819.
  • D. Reker, S. Katzenbeisser, K. Hamacher, "Computation of mutual information from Hidden Markov Models", in Computational Biology and Chemistry, vol. 34, 2010, pp. 328-333.
    [Link: Sciencedirect]
  • S. Jha, S. Katzenbeisser, C. Schallhart, H. Veith, S. Chenney, "Semantic Integrity in Large-Scale Online Simulations", in ACM Transactions on Internet Technology, vol. 10, no. 1, 2010.
    [Link: ACM]
  • J. Kinder, S. Katzenbeiser, C. Schallhart, H. Veith, "Proactive Detection of Computer Worms Using Model Checking",  in IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 4, 2010, pp. 424-438.
    [Link: IEEE]
  • B. Skoric, S. Katzenbeisser, M. Celik, H. Schaathun, "Tardos Fingerprinting Codes in the Combined Digit Model", in IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, 2011, pp. 906-919.
    [Link: IEEE]
  • S. Katzenbeisser, Ü. Koçabas, V. van der Leest, A.-R. Sadeghi, G. Schrijen, C. Wachsmann, "Recyclable PUFs: logically reconfigurable PUFs", in Journal of Cryptographic Engineering, vol. 1, no. 3, 2011, pp. 177-186.
    [Link: Springer]
  • S. Katzenbeisser, A. Schaller, "Physical Unclonable Functions: Sicherheitseigenschaften und Anwendungen", in Datenschutz und Datensicherheit, 12/2012, Springer Verlag, pp. 881-885.
  • M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schröder, "Secure computations on non-integer values with applications to privacy-preserving sequence analysis", Information Security Technical Report, Elsevier, vol. 17, no. 3, 2013, pp. 117-128.
    [Link: Elsevier]
  • F. Armknecht, S. Katzenbeisser, A. Peter, "Group Homomorphic Encryption: Characterizations, Impossibility Results, and Applications", in Designs, Codes and Cryptography, vol. 67, no. 2, 2013, pp. 209-232.
    [Link: Springer]
  • M. Ober, S. Katzenbeisser, K. Hamacher, "Structure and Anonymity of the Bitcoin Transaction Graph", in Future Internet, vol. 5, no. 2, 2013, pp. 237-250.
    [Link: MDPI, open access]
  • A. Peter, E. Tews, S. Katzenbeisser, "Efficiently Outsourcing Multiparty Computation Under Multiple Keys", in IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, 2013, pp. 2046-2058.
    [Link: IEEE]
  • S. Schrittwieser, S. Katzenbeisser, P. Kieseberg, M. Huber, M. Leithner, M. Mulazzani, E. Weippl, "Covert Computation - Hiding code in code through compile-time obfuscation", in Computers and Security, Elsevier, vol. 42, May 2014, pp. 13-26.
    [Link: Elsevier]
  • S. Schrittwieser, S. Katzenbeisser, J. Kinder, G. Merzdovnik, E. Weippl, "Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code analysis?", in ACM Computing Surveys, vol. 49, no. 1, 2016. pp.4:1-4:37.
    [Link: ACM]
  • S. Katzenbeisser, "Technischer Schutz vor geheimdienstlicher Überwachung", in Datenschutz und Datensicherheit, vol. 40. no. 2, 2016, pp. 98-100.
    [Link: Springer]
  • M. Senftleben, A. Barroso, M. Bucicoiu, M. Hollick, S. Katzenbeisser, E. Tews, "On the Privacy and Anonymity of Mobile Anonymous Microblogging", in IEEE Transactions on Information Forensics and Security, vol. 11, no. 7, 2016, pp. 1578-1591.
    [Link: IEEE]

Patents

  • US 8,726,029: S. Katzenbeisser, W. Michiels, P. Gorissen, A. Lemma, M. Celik, "Cryptographic Processing of Content"
  • US 8,627,103: S. Katzenbeisser, M. Petkovic, "Identity-Based Encryption of Data Items for Secure Access Thereto"

Published Patent Applications

  • WO/2008/068675: A. Bruekers, S. Katzenbeisser, P. Tuyls, "Secure Matching of DNA Profiles"
  • WO/2008/110971: K. Kursawe, T. Kerins, S. Katzenbeisser, H. De Perthuis, "Encryption and Decryption of Auxiliary Data"
  • WO/2008/114162: M. van der Veen, A. Lemma, S. Katzenbeisser, M. Celik, "Apparatus and Methods for Digital Content Distribution"
  • WO/2008/135951: S. Katzenbeisser, J. Troncoso-Pastoriza, M. Celik, "Method and System for Performing an Oblivious Query Issued by a First Party on a String Provided by a Second Party"
  • WO/2008/149307: A. Lemma, M. Celik, S. Katzenbeisser, M. van der Veen, "Watermark Generation and Embedding"
  • WO/2009/007876: A. Lemma, M. Celik, M. van der Veen, S. Katzenbeisser, "Watermarking and Encryption of Entropy-Coded Data Using Additive Huffman Table"
  • WO/2009/014779: M. Christodorescu, S. Jha, S. Katzenbeisser, J. Kinder, H. Veith, "System for Malware Normalization and Detection"
  • WO/2009/027902: A. Lemma, M. van der Veen, M. Celik, S. Katzenbeisser, "Apparatus and Methods for Transferring Editable Digital Content"
  • WO/2009/031082: S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, "Apparatus and Methods for Transferring Digital Content"
  • WO/2009/034504: S. Katzenbeisser, W. Michiels, P. Gorissen, A. Lemma, M. Celik, "Cryptographic Processing of Content"
  • WO/2009/141759: A. Bruekers, S. Katzenbeisser, T. Kevenaar, C. Liem, I. Nasrullah, "Noise Robust Helper Data System"
  • WO/2009/141784: S. Katzenbeisser, M. Petkovic, "Identity-Based Encryption of Data Items for Secure Access Thereto"
  • WO/2010/046820: R. Berkane, M. Damstra, R. Koster, S. Katzenbeisser, M. Petkovic, "Performing Measurement of a Subject"

Contributions to Books

  • P. Tomsich, S. Katzenbeisser, "Digitale Wasserzeichen für den Urheberrechtsschutz", in Jahrbuch der Rechtsinformatik 2001 - Intelligente Agenten, XML, Bürgercard, Verlag Österreich, 2001 (in German).
  • M. van der Veen, A. Lemma, M. Celik, S. Katzenbeisser, "Forensic Watermarking in Digital Rights Management", in W. Jonker, M. Petkovic (eds.), Security, Privacy and Trust in Modern Data Management, Springer Verlag, 2007, pp. 287-302.
  • S. Katzenbeisser, H. Liu, M. Steinebach: "Multimedia Document Authentication: Challenges and Solutions", in C.T. Li (ed.), Handbook of Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, IGI Global, 2010. pp. 155-175.
  • U. Rührmair, H. Busch, S. Katzenbeisser: "Strong PUFs: Models, Constructions and Security Proofs", in A. Sadeghi, P. Tuyls (eds.), Towards Hardware Intrinsic Security: Foundations and Practice, Springer, 2010, pp. 79-96.
  • M. Barni, S. Katzenbeisser: "Digital Watermarking", in B. Rosenberg (ed.), Handbook of Financial Cryptography and Security, CRC Press, 2011, pp. 391-436.
  • S. Katzenbeisser, J. Kinder, H. Veith: "Malware Detection", in H. Tilborg, S. Jajodia (eds.), Encyclopedia of Cryptography and Security (2nd edition), Springer Verlag, 2011, pp. 752-755.
  • C. Vielhauer, J. Dittmann, S. Katzenbeisser: "Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain", in P. Campisi (ed.), Security and Privacy in Biometrics, Springer Verlag, 2013, pp. 25-43.

Papers in Conferences and Workshops

  • P. Tomsich, S. Katzenbeisser, "Towards a Robust and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property", in Electronic Commerce and Web Technologies, Proceedings (ECWEB 2000), Springer Lecture Notes in Computer Science, vol. 1875, 2000, pp. 38-47.
  • P. Tomsich, S. Katzenbeisser, "Copyright Protection Protocols for Multimedia Distribution Based on Trusted Hardware", in Protocols for Multimedia Systems (PROMS 2000), Proceedings, Cracow (Poland), October 2000, pp. 249-256.
  • S. Craver, S. Katzenbeisser, "Copyright Protection Protocols Based on Asymmetric Watermarking", in R. Steinmetz, J. Dittmann, M. Steinebach: Communications and Multimedia Security Issues of the New Century, Proceedings of the Fifth Conference on Communication and Multimedia Security (CMS'01), Kluwer Academic Publishers, 2001, pp. 159-170.
  • S. Craver, S. Katzenbeisser, "Security Analysis of Public-Key Watermarking Schemes", Proceedings of the SPIE vol. 4475, Mathematics of Data/Image Coding, Compression, and Encryption IV, July 2001, pp. 172-182.
  • S. Katzenbeisser, P. Tomsich, "Applied Information Security for m-Commerce and Digital Television Environments", Electronic Commerce and Web Technologies, Second International Conference, Proceedings, Springer Lecture Notes in Computer Science, vol. 2115, September 2001, pp. 166-175.
  • S. Katzenbeisser, "On the Design of Copyright Protection Protocols for Multimedia Distribution Using Symmetric and Public-Key Watermarking", in 12th International Workshop on Database and Expert Systems Applications, Fifth International Query Processing and Multimedia Issues in Distributed Systems Workshop (QPMIDS'2001), IEEE Computer Society Press, 2001, pp. 815-819.
  • S. Katzenbeisser, H. Veith, "Securing Symmetric Watermarking Schemes Against Protocol Attacks", Proceedings of the SPIE vol. 4675, Security and Watermarking of Multimedia Contents IV, 2002, pp. 260-268.
  • S. Katzenbeisser, F. A. P. Petitcolas, "Defining Security in Steganographic Systems", Proceedings of the SPIE vol. 4675, Security and Watermarking of Multimedia Contents IV, 2002, pp. 50-56.
  • A. Adelsbach, S. Katzenbeisser, A. Sadeghi, "Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure" (invited paper), in European Signal Processing Conference 2002, Toulouse, France, 2002.
  • A. Adelsbach, S. Katzenbeisser, H. Veith, "Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks", in ACM Workshop on Digital Rights Management (DRM'2003), Proceedings, Washington DC, 2003, pp. 111-119.
  • A. Adelsbach, S. Katzenbeisser, A.-R. Sadeghi, "On the Insecurity of Non-Invertible Watermarking Schemes for Dispute Resolving", in International Workshop on Digital Watermarking (IWDW 2003), Springer Lecture Notes in Computer Science, vol. 2939, 2003, pp. 355-369.
  • S. Katzenbeisser, "On the Integration of Cryptography and Watermarks" (invited paper), in International Workshop on Digital Watermarking (IWDW 2003), Springer Lecture Notes in Computer Science, vol. 2939, 2003, pp. 50-60.
  • S. Katzenbeisser, J. Dittmann, "Malicious Attacks Against Media Authentication Schemes Based on Invertible Watermarks", in Proceedings of the SPIE vol. 5306, Security and Watermarking of Multimedia Contents VI, 2004, pp. 838-847.
  • M. Holzer, S. Katzenbeisser, C. Schallhart, "Towards a formal semantics for ODRL", in First ODRL International Workshop, 2004.
  • R. Bergmair, S. Katzenbeisser, "Towards Human-Interactive Proofs in the Text Domain: Using the Problem of Sense-Ambiguity for Security", in Information Security Conference (ISC'04), Proceedings, Springer Lecture Notes in Computer Science, vol. 3225, 2004, pp. 257-267.
  • S. Katzenbeisser, C. Schallhart, H. Veith, "Malware Engineering", in Sicherheit 2005, Sicherheit - Schutz und Zuverlässigkeit, 2. Jahrestagung, Fachbereich Sicherheit der Gesellschaft für Informatik, 2005, pp. 139-148.
  • J. Dittmann, A. Lang, M. Steinebach, S. Katzenbeisser, "ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten", in Sicherheit 2005, Sicherheit - Schutz und Zuverlässigkeit, 2. Jahrestagung, Fachbereich Sicherheit der Gesellschaft für Informatik, 2005, pp. 189-192 (in German).
  • J. Dittmann, S. Katzenbeisser, C. Schallhart, H. Veith, "Ensuring Media Integrity on Third-Party Infrastructures", in 20th IFIP International Information Security Conference (SEC2005), Springer Verlag, 2005, pp. 493-507.
  • S. Katzenbeisser, "Computational Security Models for Digital Watermarks", in Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS 2005), 2005.
  • J. Kinder, S. Katzenbeisser, C. Schallhart, H. Veith, "Detecting Malicious Code by Model Checking", in Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'05), Springer Lecture Notes in Computer Science, vol. 3548, 2005, pp. 174-187.
  • R. Bergmair, S. Katzenbeisser, "Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens", in 8th Information Hiding Conference, Springer Lecture Notes in Computer Science, vol. 4437, 2007, pp. 109-123.
  • A. Adelsbach, S. Katzenbeisser, A.-R. Sadeghi, "A Computational Model for Watermark Robustness", in 8th Information Hiding Conference, Springer Lecture Notes in Computer Science, vol. 4437, 2007, pp. 145-160.
  • S. Katzenbeisser, K. Kursawe, J. Talstra, "Graceful Infringement Reactions in DRM Systems", in 6th ACM Workshop on Digital Rights Management, ACM Press, 2006, pp. 89-96.
  • A. Lemma, S. Katzenbeisser, M. Celik, M. van der Veen, "Secure Watermark Embedding through Partial Encryption", in International Workshop on Digital Watermarking (IWDW 2006), Springer Lecture Notes in Computer Science, vol. 4283, 2006, pp. 433-445. (This paper won the best paper award)
  • A. Lemma, S. Katzenbeisser, M. Celik, M. van der Veen, "Secure Watermark Embedding of Forensic Watermarks in MPEG-2 Bitstreams (Extended Abstract)", in First Benelux Workshop on Information and System Security (WISSEC'06).
  • M. Celik, A. Lemma, S. Katzenbeisser, M. van der Veen, "Secure Embedding of Spread Spectrum Watermarks Using Look-up-Tables", in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2007), vol. 2, IEEE Press, 2007, pp. 153-156.
  • S. Kirbiz, M. Celik, A. Lemma, S. Katzenbeisser, "Forensic Watermarking During AAC Playback", in IEEE International Conference on Multimedia and Expo (ICME 2007), IEEE Press, 2007, pp. 1111-1114.
  • S. Kirbiz, M. Celik, A. Lemma, S. Katzenbeisser, "Adli Takip için AAC Bit-katarlarinin Damgalanmasi" (Watermarking of AAC Bit-streams for Forensic Tracking), in 15th IEEE Signal Processing and Communication Applications Conference (SIU 2007), IEEE Press, 2007 (in Turkish), pp. 1-4.
  • M. Celik, J. Talstra, A. Lemma, S. Katzenbeisser, "Camcorder Capture Robust Low-Complexity Watermarking of MPEG-2 Bit-streams", in IEEE International Conference on Image Processing (ICIP 2007), IEEE Press, 2007, vol. 5, pp. 489-492.
  • S. Katzenbeisser, B. Skoric, M. Celik, A.-R. Sadeghi, "Combining Tardos Fingerprinting Codes and Fingercasting", in 9th Information Hiding, Springer Lecture Notes in Computer Science, vol. 4567, 2007, pp. 294-310.
  • M. Petkovic, S. Katzenbeisser, K. Kursawe, "Rights Management Technologies: The Best Choice for Securing Electronic Health Records?", in Securing Electronic Business Processes, Information Security Solutions Europe (ISSE/SECURE 2007), Vieweg Verlag, 2007, pp. 178-187.
  • J. R. Troncoso Pastoriza, S. Katzenbeisser, M. Celik, A. Lemma, "A Secure Multidimensional Point Inclusion Protocol", in ACM Multimedia and Security Workshop (ACM MMSEC'07), ACM Press, 2007, pp. 109-120.
  • B. Skoric, S. Katzenbeisser, M. Celik, "Symmetric Tardos Fingerprinting Codes for Arbitrary Alphabet Sizes", in Second Benelux Workshop on Information and System Security (WISSEC'07), 2007.
  • K. Kursawe, S. Katzenbeisser, "Computing Under Occupation", in New Security Paradigms Workshop (NSPW'07), ACM Press, 2007, pp. 81-88.
  • S. Bajaj, R. Sion, B. Carbunar, S. Katzenbeisser, "NS2: Networked Searchable Store with Privacy and Correctness", in 33rd International Conference on Very Large Data Bases (VLDB'07), 2007, pp. 1342-1345.
  • S. Jha, S. Katzenbeisser, C. Schallhart, H. Veith, S. Chenney, "Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments (Extended Abstract)", in IEEE Symposium on Security and Privacy (Oakland'07), 2007, pp. 179-186.
  • J. R. Troncoso Pastoriza, S. Katzenbeisser, M. Celik, "Privacy Preserving Error Resilient DNA Searching Through Oblivious Automata", in 14th ACM Conference on Computer and Communications Security (CCS'07), 2007, pp. 519-528.
  • A. Lemma, M. Celik, S. Katzenbeisser, M. van der Veen, "Watermarking for Content-Aware Intelligent Toys", in IEEE International Conference on Consumer Electronics, 2008.
  • A. Lemma, S. Katzenbeisser, M. Celik, S. Kirbiz, "Forensic Watermarking and Bit-Rate Conversion of Partially Encrypted AAC Bitstreams", in Proceedings of the SPIE vol. 6819, Security, Forensics, Steganography and Watermarking of Multimedia Contents X, 2008.
  • S. Katzenbeisser, M. Petkovic, "Privacy-Preserving Recommendation Systems for Consumer Healthcare Services", Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, Workshop on Privacy and Assurance, IEEE Press, 2008, pp. 889-895.
  • K. Kursawe, S. Katzenbeisser, "Trust in Consumer Electronics", in Securing Electronic Business Processes, Information Security Solutions Europe (ISSE 2008), Vieweg Verlag, 2008, pp. 139-143.
  • L. Fischer, S. Katzenbeisser, C. Eckert, "Measuring Unlinkability Revisited", ACM Workshop on Privacy in the Electronic Society (WPES 2008), ACM Press, 2008, pp. 105-110.
  • F. Stumpf, A. Fuchs, S. Katzenbeisser, C. Eckert, "Improving the Scalability of Platform Attestation", ACM Workshop on Scalable Trusted Computing (STC 2008), ACM Press, pp. 1-10.
  • S. Müller, S. Katzenbeisser, C. Eckert, "Distributed Attribute-Based Encryption", in International Conference on lnformation Security and Cryptology (ICISC 2008), Springer Lecture Notes in Computer Science, vol. 5461, 2009, pp. 20-36.
  • S. Katzenbeisser, K. Kursawe, F. Stumpf, "Revocation of TPM Keys", in Second International Conference on Trusted Computing (TRUST 2009)Springer Lecture Notes in Computer Science, vol. 5471, 2009, pp. 120-132.
  • Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, T. Toft, "Privacy-Preserving Face Recognition", in Privacy Enhancing Technologies Symposium (PET 2009)Springer Lecture Notes in Computer Science, vol. 5672, 2009, pp. 235-253.
  • Y. Liu, F. Armknecht, D. Ghosal, S. Katzenbeisser, A. Sadeghi, S. Schulz, "Hide and Seek in Time - Robust Covert Timing Channels", in European Symposium on Research in Computer Security (ESORICS 2009)Springer Lecture Notes in Computer Science, vol. 5789, 2009, pp. 120-135.
  • M. Steinebach, M. El Ouariachi, H. Liu, S. Katzenbeisser, "On the Reliability of Cell Phone Camera Fingerprint Recognition", in International Conference on Digital Forensics & Cyber Crime (ICDF2C), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 31, 2009, pp. 69-76.
  • H. Busch, S. Katzenbeisser, P. Baecher, "PUF-Based Authentication Protocols, Revisited", in International Workshop on Information Security Applications (WISA'09)Springer Lecture Notes in Computer Science, vol. 5932, 2009, pp. 296-308.
  • B. Skoric, S. Katzenbeisser, M. Celik, H. Schaathun, "Tardos Fingerprinting Codes in the Combined Digit Model (Extended Abstract)", in First IEEE Workshop on Information Forensics and Security (WIFS'09), IEEE Press, 2009.
  • M. Steinebach, H. Liu, S. Katzenbeisser, U. Rührmaier, "Audio watermarking forensics: detecting malicious re-embedding", in SPIE Electronic Imaging Conference, Media Forensics and Security XII, 2010.
  • M. Steinebach, H. Liu, S. Katzenbeisser, "Cell phone camera ballistics: attacks and countermeasures", in SPIE Electronic Imaging Conference, Multimedia on Mobile Devices, 2010.
  • S. Müller, S. Katzenbeisser, "A New DRM Architecture with Strong Enforcement", in Proceedings of the International Conference on Availability, Reliability and Security (ARES 2010), Workshop on Frontiers in Availability, Reliability and Security, IEEE Press, 2010, pp. 397-403.
  • U. Rührmair, S. Katzenbeisser, M. Steinebach, S. Zmudzinski, "Watermark-Based Authentication and Key Exchange in Teleconferencing Systems", in IFIP Conference on Communications and Multimedia Security (CMS'10)Springer Lecture Notes in Computer Science vol. 6109, 2010, pp. 75-80.
  • S. Alsouri, Ö. Dagdelen, S. Katzenbeisser, "Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation", in 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010)Springer Lecture Notes in Computer Science, vol. 6101, 2010, pp. 63-77.
  • H. Busch, M. Sotakova, S. Katzenbeisser, R. Sion, "The PUF Promise", in 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010)Springer Lecture Notes in Computer Science, vol. 6101, 2010, pp. 290-297.
  • C. Brzuska, H. Busch, O. Dagdelen, M. Fischlin, M. Franz, S. Katzenbeisser, M. Manulis, C. Onete, A. Peter, B. Poettering, D. Schröder, "Redactable Signatures for Tree-Structured Data: Definitions and Constructions", in 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Springer Lecture Notes in Computer Science, vol. 6123, 2010, pp. 87-104.
  • M. Schäfer, W. Berchtold, M. Steinebach, S. Zmudzinski, S. Katzenbeisser, "Collusion Secure Fingerprint Watermarking for Real World Applications", in GI Sicherheit - Schutz und Zuverlässigkeit 2010, GI-Edition, pp. 129-140.
  • Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz and S. Katzenbeisser, "Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic", in Information Hiding (IH 2010)Springer Lecture Notes in Computer Science, vol. 6387, 2010, pp. 193-207.
  • B. Deiseroth, M. Franz, K. Hamacher, S. Jha, S. Katzenbeisser, H. Schröder, "Secure Computations on Non-Integer Values", in IEEE Workshop on Information Forensics and Security (WIFS'10), IEEE Press, 2010, pp. 1-6.
  • M. Franz, S. Katzenbeisser, B. Deiseroth, K. Hamacher, S. Jha, H. Schröder, "Towards Secure Bioinformatics Services", in Financial Cryptography and Data Security (FC 2011)Springer Lecture Notes in Computer Science vol. 7035, 2011, pp. 276 - 283.
  • M. Franz, B. Carbunar, R. Sion, S. Katzenbeisser, M. Sotakova, P. Williams, A. Peter, "Oblivious Outsourced Storage with Delegation", in Financial Cryptography and Data Security (FC 2011)Springer Lecture Notes in Computer Science, vol. 7035, 2011, pp. 127-140.
  • N. Cuong, S. Katzenbeisser, "Security of Copy-Move Forgery Detection Techniques", in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'11), IEEE Press, 2011, pp. 1864-1867.
  • S. Schrittwieser, S. Katzenbeisser, "Code Obfuscation against Static and Dynamic Reverse Engineering", in Information Hiding Conference (IH 2011)Springer Lecture Notes in Computer Science, vol. 6958, 2011, pp. 270-284.
  • S. Müller, S. Katzenbeisser, "Hiding the Policy in Cryptographic Access Control", in Security and Trust Management (STM), 7th International WorkshopSpringer Lecture Notes in Computer Science, vol. 7170, 2011, pp. 90-105.
  • S. Biedermann, S. Katzenbeisser, "Detecting Computer Worms in the Cloud", in iNetSec 2011 - Open Problems in Network Security, Springer Lecture Notes in Computer Science, vol. 7039, 2011, pp. 43-54.
  • K. Hamacher, S. Katzenbeisser, "Public Security: Simulations Need to Replace Conventional Wisdom", in New Security Paradigms Workshop (NSPW 2011), ACM Press, pp. 115-124.
  • A. Alsouri, S. Katzenbeisser, S. Biedermann, "Trustable outsourcing of business processes to cloud computing environments", in 5th International Conference on Network and System Security (NSS 2011), IEEE Press, 2011, pp. 280-284.
  • M. Franz, S. Katzenbeisser, "Processing Encrypted Floating Point Signals", in ACM Workshop on Multimedia and Security (MMSEC'11), ACM Press, 2011, pp. 103-108.
  • N. Cuong, S. Katzenbeisser, "Performance and Robustness Analysis for some Re-sampling Detection Techniques in Digital Images", 10th International Workshop on Digital Forensics and Watermarking (IWDW 2011)Springer Lecture Notes in Computer Science, vol. 7128, 2011, pp. 387-397.
  • C. Brzuska, M. Fischlin, H. Schröder, S. Katzenbeisser: "Physically Uncloneable Functions in the Universal Composition Framework", in Advances in Cryptography (CRYPTO 2011)Springer Lecture Notes in Computer Science, vol. 6841, 2011, to pp. 51-70.
  • S. Katzenbeisser, Ü. Kocabas, V. van der Leest, A.-R. Sadeghi, G.-J. Schrijen, H. Schröder, C. Wachsmann: "Recyclable PUFs: Logically Reconfigurable PUFs", in Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)Springer Lecture Notes in Computer Science, vol. 6917, 2011, pp. 374-289.
  • Ü. Kocabas, A. Peter, S. Katzenbeisser, A.-R. Sadeghi: "Converse PUF-based Authentication", in Trust and Trustworthy Computing 2012 (TRUST 2012), Springer Lecture Notes in Computer Science, vol. 7344, 2012, pp. 142-158.
  • F. Armknecht, S. Katzenbeisser, A. Peter: "Shift-Type Homomorphic Encryption and its Application to Fully Homomorphic Encryption", in 5th International Conference on Cryptology in Africa (AFRICACRYPT 2012), Springer Lecture Notes in Computer Science, vol. 7374, 2012, pp. 234-251.
  • N. Cuong, S. Katzenbeisser: "Robust Resampling Detection in Digital Images", in 13th Conference on Communications and Multimedia Security (CMS 2012), Springer Lecture Notes in Computer Science, vol. 7394, 2012, pp. 3-15.
  • N. Cuong, S. Katzenbeisser: "Detection of Copy-move Forgery in Digital Images Using Radon Transformation and Phase Correlation", in Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2012), IEEE Press, 2012, pp. 134-137.
  • S. Katzenbeisser and Ü. Kocabas and V. Rozic and A.-R. Sadeghi and I. Verbauwhede and C. Wachsmann "PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs)", in Workshop on Cryptographic Hardware and Embedded Systems 2012 (CHES 2012), Springer Lecture Notes in Computer Science, vol. 7428, 2012, pp. 283-301.
  • A. Peter, M. Kronberg, W. Trei, S. Katzenbeisser: "Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited", in 15th International Conference on Information Security (ISC 2012), Springer Lecture Notes in Computer Science, vol. 7483, 2012, pp. 242-257.
  • S. Alsouri, J. Sinschek, A. Sewe, E. Bodden, S. Katzenbeisser and M. Mezini: "Dynamic Anomaly Detection for More Trustworthy Outsourced Computation in Hybrid Clouds", in 15th International Conference on Information Security (ISC 2012)Springer Lecture Notes in Computer Science, vol. 7483, 2012, pp. 242-257.
  • Andreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith: "Secure Two-Party Computations in ANSI C", in ACM Conference on Computer and Communications Security (CCS 2012), ACM Press, 2012, pp. 772-783.
  • S. Biedermann, M. Mink, S. Katzenbeisser: "Fast dynamic extracted honeypots in cloud computing", in ACM Workshop on Cloud computing security (CCSW 2012), ACM Press, 2012, pp. 13-18.
  • A. Van Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, C. Wachsmann: "Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs", in Financial Cryptography (FC 2012)Springer Lecture Notes in Computer Science, vol. 7397, 2012, pp. 374-389.
  • A. Peter, T. Hartmann, S. Müller, S. Katzenbeisser: "Privacy-Preserving Architecture for Forensic Image Recognition", in 4th IEEE International Workshop on Information Forensics and Security (WIFS 2012), IEEE Press, 2012, pp. 79-84.
  • S. Schrittwieser, S. Katzenbeisser, P. Kieseberg, M. Huber, M. Leithner, M. Mulazzani and E. Weippl: "Covert Computation - Hiding code in code for obfuscation purposes", in ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), ACM Press, 2013, pp. 529-534.
  • N. Cuong, S. Katzenbeisser: "Detecting Resized Double JPEG Compressed Images - Using Support Vector Machines", in Communications and Multimedia Security (CMS 2013), Springer Lecture Notes in Computer Science, 2013, pp. 113-122.
  • S. Biedermann, M. Zittel, S. Katzenbeisser: "Improving security of virtual machines during live migrations", in Eleventh Annual International Conference on Privacy, Security and Trust (PST 2013), IEEE Press, 2013, pp. 352-357.
  • A. Van Herrewege, V. van der Leest, A. Schaller, S. Katzenbeisser and I. Verbauwhede: "Secure PRNG Seeding on Commercial Of-the-Shelf Microcontrollers", in ACM Workshop on Trustworthy Embedded Devices (TrustED), ACM Press, 2013, pp. 54-66.
  • A. Holzer, N. P. Karvelas, S. Katzenbeisser, H. Veith and M. Franz: "Challenges in Compiler Construction for Secure Two-Party Computation", in Workshop on Language Support for Privacy Enhancing Technologies (PETShop), ACM Press, 2013, pp. 3-6.
  • S. Biedermann, S. Katzenbeisser: "POSTER: Event-based Isolation of Critical Data in the Cloud", in 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM Press, pp. 383-386.
  • A. Van Herrewege, A. Schaller, I. Verbauwhede, S. Katzenbeisser: "DEMO: Inherent PUFs and Secure PRNGs on Commercial Off-the-Shelf Microcontrollers", in 20th ACM Conference on Computer and Communications Security (CCS 2013), ACM Press, pp. 1333-1336.
  • S. Biedermann, N. P. Karvelas, S. Katzenbeisser, T. Strufe, A. Peter, "ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation" in Theory and Practice of Computer Science - 40th International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2014), Springer Lecture Notes in Computer Science, vol. 8327, 2014, pp. 114-125.
  • F. Armknecht, T. Gagliardoni, S. Katzenbeisser, A. Peter, "General Impossibility of Group Homomorphic Encryption in the Quantum World", in the 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2014), Springer Lecture Notes in Computer Science, vol. 8383, 2014, pp. 556-573
  • M. Franz, A. Holzer, S. Katzenbeisser, C. Schallhart, H. Veith, "CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations", in 23rd International Conference on Compiler Construction (CC 2014), Springer Lecture Notes in Computer Science, vol. 8409, 2014, pp. 244-249.
  • M. Senftleben, M. Bucicoiu, E. Tews, F. Armknecht, S. Katzenbeisser, A. Sadeghi, "MoP-2-MoP - Mobile private microblogging", in Financial Cryptography and Data Security (FC 2014), Springer Lecture Notes in Computer Science, vol. 8437, 2014, pp. 384-396.
  • A. Schaller, T. Arul, V. van der Leest, S. Katzenbeisser, "Lightweight Anti-counterfeiting Solution for Low-End Commodity Hardware Using Inherent PUFs", in Trust and Trustworthy Computing (TRUST 2014), Springer Lecture Notes in Computer Science, vol. 8564, 2014, pp. 83-100.
  • N. P. Karvelas, A. Peter, S. Katzenbeisser, E. Tews and K. Hamacher, "Privacy Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM", in 13th Workshop on Privacy in the Electronic Society (WPES 2014), ACM Press, 2014, pp. 1-10.
  • S. Biedermann, S. Katzenbeisser, J. Szefer, "Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications", in 6th Workshop on Hot Topics in Cloud Computing (HotCloud 2014), USENIX Association, 2014
  • S. Biedermann, T. Ruppenthal, S. Katzenbeisser, "Data-Centric Phishing Detection based on Transparent Virtualization Technologies", in 12th International Conference on Privacy, Security and Trust (PST 2014), IEEE Press, 2014, pp. 215-223.
  • F. Araujo, K. W. Hamlen, S. Biedermann, S. Katzenbeisser, "From Patches to Honey-Patches: Lightweight Attacker-Misdirection, Deception, and Disinformation", in 21st Conference on Computer and Communications Security (CCS 2014), ACM Press, 2014, pp. 942-953.
  • S. Biedermann, S. Katzenbeisser, J. Szefer, "Hot-Hardening: Getting More Out of Your Security Settings", in 30th Annual Computer Security Applications Conference (ACSAC 2014), ACM Press, 2014, pp. 6-15.
  • C. Schlehuber, E. Tews, S. Katzenbeisser, "IT-Security in Railway Signalling Systems", in ISSE 2014 Securing Electronic Business Processes, Springer Vieweg, 2014, pp. 56-64.
  • S. Schrittwieser, S. Katzenbeisser, G. Merzdovnik, P. Kieseberg, E. Weippl, "AES-SEC: Improving Software Obfuscation through Hardware Assistance", in Ninth International Conference on Availability, Reliability and Security (ARES 2014), IEEE Press, pp. 184-191.
  • N. Buescher, S. Katzenbeisser, "Faster Secure Computation through Automatic Parallelization", 24th USENIX Security Symposium (USENIX Security 2015), USENIX Association, 2015, pp. 531-546.
  • F. Kohnhäuser, A. Schaller, S. Katzenbeisser, "PUF-based Software Protection for Low-End Embedded Devices", 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), Springer Lecture Notes in Computer Science, vol. 9229, 2015.
  • M. Franz, A. Holzer, S. Katzenbeisser, C. Schallhart, H. Veith, "Compilation for Secure Two-Party Computations", in Software Engineering & Management 2015, GI LNI, vol. 239, pp. 143-145.
  • S. Biedermann, S. Katzenbeisser, J. Szefer, "Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors", in Financial Cryptography and Data Security (FC 2015)Springer Lecture Notes in Computer Science, vol. 8975, 2015, pp. 489-496.
  • A. Schaller, B. Skoric, S. Katzenbeisser, "On the Systematic Drift of Physically Unclonable Functions Due to Aging", in Proceedings of the 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), ACM Press, pp. 15-20.
  • N. Matyunin, J. Szefer, S. Biedermann, S. Katzenbeisser, "Covert channels using mobile device's magnetic field sensors", in 21st Asia and South Pacific Design Automation Conference, 2016, pp. 525-532
  • J. Buchmann, N. Büscher, F. Göpfert, S. Katzenbeisser, J. Krämer, D. Micciancio, S. Siim, C. van Vredendaal, M. Walter, "Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge", in Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography (AsiaPKC@AsiaCCS), 2016, pp. 11-20.
  • W. Xiong, A. Schaller, N. Anagnostopoulos, M. Saleem, S. Gabmeyer, S. Katzenbeisser, J. Szefer, "Run-Time Accessible DRAM PUFs in Commodity Devices", in Cryptographic Hardware and Embedded Systems (CHES 2016), 2016, pp. 432-453.
  • N. Büscher, A. Holzer, A. Weber, S. Katzenbeisser, "Compiling Low Depth Circuits for Practical Secure Computation", in 21st European Symposium on Research in Computer Security (ESORICS 2016)Springer Lecture Notes in Computer Science, vol. 9879, 2016, pp. 80-98.
  • F. Kohnhäuser, S. Katzenbeisser, "Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices", in 21st European Symposium on Research in Computer Security (ESORICS 2016)Springer Lecture Notes in Computer Science, vol. 9879, 2016, pp. 320-338.
  • S. Stammler, S. Katzenbeisser, K. Hamacher, "Correcting Finite Sampling Issues in Entropy l-diversity", in Privacy in Statistical Databases (PSD 2016)Springer Lecture Notes in Computer Science, vol. 9867, pp. 135-146.
  • M. Schulz, P. Klapper, M. Hollick, E. Tews, S. Katzenbeisser, "Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet", in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WISEC 2016), ACM Press, 2016, pp. 43-48.
  • P. Baumann, S. Katzenbeisser, M. Stopczynski, E. Tews, "Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection", in Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society (WPES 2016), ACM Press, 2016, pp. 37-46.

Research Reports and Preprints


zum Seitenanfangzum Seitenanfang

A A A | Drucken Print | Impressum Impressum | Kontakt Contact | Last edited: 4 months ago