If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Privacy Preserving Mathematics
Authentication Engineering & Materials Science
Lattice Basis Reduction Mathematics
Reconciliation Mathematics
Network protocols Engineering & Materials Science
Cryptography Engineering & Materials Science
LLL Algorithm Mathematics
3G mobile communication systems Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2018

Privacy-preserving multi-party bartering secure against active adversaries

Wuller, S., Meyer, U. & Wetzel, S., Sep 28 2018, Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017. Institute of Electrical and Electronics Engineers Inc., p. 205-214 10 p. 8476936

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy preserving
Cash
Guarantee
Privacy
Payment

Privacy-Preserving Subgraph Checking

Wüller, S., Assadsolimani, B., Meyer, U. & Wetzel, S., Oct 29 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514182. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
Complex networks
3 Citations (Scopus)

Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques

Wüller, S., Mayer, D., Förg, F., Schüppen, S., Assadsolimani, B., Meyer, U. & Wetzel, S., Jan 1 2017, In : Journal of Computer Security. 25, 1, p. 59-81 23 p.

Stevens Institute of Technology

Research output: Contribution to journalArticle

Cryptography
1 Citation (Scopus)

Efficient commodity matching for privacy-preserving two-party bartering

Förg, F., Wetzel, S. & Meyer, U., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 107-114 8 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication