Towards Blockchain-based Auditable Storage and Sharing of IoT Data H Shafagh, A Hithnawi, S Duquennoy ACM Cloud Computing Security Workshop (CCSW 2017)., 2017 | 578 | 2017 |
SoK: Fully Homomorphic Encryption Compilers A Viand, P Jattke, A Hithnawi IEEE Symposium on Security and Privacy (SP), 2021 | 129 | 2021 |
Talos: Encrypted Query Processing for the Internet of Things H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu ACM Conference on Embedded Network Sensor Systems (SenSys 2015), 197-210, 2015 | 126 | 2015 |
Secure sharing of partially homomorphic encrypted iot data H Shafagh, A Hithnawi, L Burkhalter, P Fischli, S Duquennoy ACM Conference on Embedded Network Sensor Systems (SenSys 2017), 1-14, 2017 | 101 | 2017 |
RoFL: Robustness of Secure Federated Learning H Lycklama, L Burkhalter, A Viand, N Küchler, A Hithnawi 2023 IEEE Symposium on Security and Privacy (SP), 2023 | 77* | 2023 |
TIIM: technology-independent interference mitigation for low-power wireless networks A Hithnawi, H Shafagh, S Duquennoy ACM Conference on Information Processing in Sensor Networks (IPSN 2015), 1-12, 2015 | 75 | 2015 |
Understanding the impact of cross technology interference on IEEE 802.15. 4 A Hithnawi, H Shafagh, S Duquennoy ACM Workshop on Wireless Network Testbeds, Experimental Evaluation and …, 2014 | 70 | 2014 |
CrossZig: Combating Cross-Technology Interference in Low-power Wireless Networks A Hithnawi, S Li, H Shafagh, J Gross, S Duquennoy ACM Conference on Information Processing in Sensor Networks (IPSN 2016), 1-12, 2016 | 64 | 2016 |
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams H Shafagh, L Burkhalter, S Ratnasamy, A Hithnawi USENIX Security Symposium 2020, 2020 | 51 | 2020 |
TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control L Burkhalter, A Hithnawi, A Viand, H Shafagh, S Ratnasamy USENIX NSDI 2020, 2020 | 42 | 2020 |
Poster: Towards Encrypted Query Processing for the Internet of Things H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu ACM Conference on Mobile Computing and Networking (MobiCom 2015), 251-253, 2015 | 42 | 2015 |
Security Comes First, A Public-key Cryptography Framework for the Internet of Things H Shafagh, A Hithnawi IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2014 …, 2014 | 40 | 2014 |
Zeph: Cryptographic Enforcement of End-to-End Data Privacy L Burkhalter, N Küchler, A Viand, H Shafagh, A Hithnawi USENIX OSDI 2021, 2021 | 38 | 2021 |
HECO: Fully Homomorphic Encryption Compiler A Viand, P Jattke, M Haller, A Hithnawi 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 31* | 2023 |
Verifiable fully homomorphic encryption A Viand, C Knabenhans, A Hithnawi WAHC 2024, 2024 | 29 | 2024 |
Come Closer: Proximity-based Authentication for the Internet of Things H Shafagh, A Hithnawi ACM Conference on Mobile Computing and Networking (MobiCom 2014), 421-424, 2014 | 24* | 2014 |
VF-PS: How to Select Important Participants in Vertical Federated Learning, Efficiently and Securely? J Jiang, L Burkhalter, F Fu, B Ding, B Du, A Hithnawi, B Li, C Zhang NeurIPS, 2022 | 19 | 2022 |
A Receiver-based 802.11 Rate Adaptation Scheme with on-demand Feedback F Schmidt, A Hithnawi, O Punal, J Gross, K Wehrle IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC …, 2012 | 12 | 2012 |
Demo Abstract: Talos a Platform for Processing Encrypted IoT Data H Shafagh, L Burkhalter, A Hithnawi ACM Conference on Embedded Network Sensor Systems (SenSys 2016), 308-309, 2016 | 9* | 2016 |
Exploiting Physical Layer Information to Mitigate Cross-technology Interference Effects on Low-power Wireless Networks A Hithnawi ACM Conference on Information Processing in Sensor Networks (IPSN 2013), 2013 | 7 | 2013 |