Urmăriți
Christian Weinert
Christian Weinert
Adresă de e-mail confirmată pe rhul.ac.uk - Pagina de pornire
Titlu
Citat de
Citat de
Anul
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5542018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
1972018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1352017
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
1282019
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
792015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
702018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
542020
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
412019
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
402018
All the numbers are US: large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
352020
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021
232021
Towards practical secure neural network inference: the journey so far and the road ahead
ZÁ Mann, C Weinert, D Chabal, JW Bos
ACM Computing Surveys 56 (5), 1-37, 2023
142023
Trustworthy AI inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
142020
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
122021
Cryptospn: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
ECAI 2020, 1946-1953, 2020
102020
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
92014
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
82022
Scionfl: Efficient and robust secure quantized aggregation
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024
72024
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
72020
Privacy-preserving speech processing via STPC and TEEs (Poster)
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
7*2019
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20