The loopix anonymity system AM Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis 26th {USENIX} Security Symposium ({USENIX} Security 17), 1199-1216, 2017 | 222 | 2017 |
AnoA: A Framework for Analyzing Anonymous Communication Protocols M Backes, A Kate, P Manoharan, S Meiser, E Mohammadi Computer Security Foundations Symposium (CSF), 2013 IEEE 26th, 163-178, 2013 | 142 | 2013 |
Differentially Private Smart Metering with Battery Recharging M Backes, S Meiser Data Privacy Management and Autonomous Spontaneous Security. DPM 2013, SETOP …, 2014 | 129 | 2014 |
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency-Choose Two D Das, S Meiser, E Mohammadi, A Kate 2018 IEEE Symposium on Security and Privacy (SP), 108-126, 2018 | 116 | 2018 |
Privacy loss classes: The central limit theorem in differential privacy DM Sommer, S Meiser, E Mohammadi Proceedings on Privacy Enhancing Technologies 2019 (2), 245-269, 2019 | 81 | 2019 |
(Nothing else) MATor (s): Monitoring the Anonymity of Tor's Path Selection M Backes, A Kate, S Meiser, E Mohammadi Proc. of the 21st Conference on Computer and Communications Security (CCS’14), 2014 | 63 | 2014 |
Delegatable functional signatures M Backes, S Meiser, D Schröder Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 57 | 2016 |
Approximate and Probabilistic Differential Privacy Definitions S Meiser Cryptology ePrint Archive, 2018 | 53 | 2018 |
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy S Meiser, E Mohammadi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 51 | 2018 |
Your Choice MATor (s): large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks M Backes, S Meiser, M Slowik Proceedings on Privacy Enhancing Technologies 2016 (2), 40-60, 2015 | 23 | 2015 |
Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources M Backes, A Kate, S Meiser, T Ruffing Applied Cryptography and Network Security. ACNS 2015. Lecture Notes in …, 2015 | 20* | 2015 |
Comprehensive Anonymity Trilemma: User Coordination is not enough D Das, S Meiser, E Mohammadi, A Kate Proceedings on Privacy Enhancing Technologies 3, 356-383, 2020 | 19 | 2020 |
Operational Signature Schemes. M Backes, Ö Dagdelen, M Fischlin, S Gajek, S Meiser, D Schröder IACR Cryptology ePrint Archive 2014, 820, 2014 | 12 | 2014 |
Divide and funnel: a scaling technique for mix-networks D Das, S Meiser, E Mohammadi, A Kate Cryptology ePrint Archive, 2021 | 4 | 2021 |
Quantitative anonymity guarantees for Tor SWL Meiser Saarland University, 2016 | 3 | 2016 |
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor M Backes, S Koch, S Meiser, E Mohammadi, C Rossow Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 3 | 2015 |
Delegatable functional signatures S Meiser, D Schröder IET Information Security 12 (3), 194-206, 2017 | 1 | 2017 |
Computational soundness of passively secure encryption in presence of active adversaries S Meiser Saarland University, 2011 | 1 | 2011 |
Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale M Kirschte, S Meiser, S Ardalan, E Mohammadi arXiv preprint arXiv:2211.02003, 2022 | | 2022 |
Not all is lost for anonymity–but quite a lot is. D Das, S Meiser, E Mohammadi, A Kate Hot Topics in Privacy Enhancing Technologies Workshop, 2019 | | 2019 |