关注
Anwar Hithnawi
Anwar Hithnawi
在 inf.ethz.ch 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
H Shafagh, A Hithnawi, S Duquennoy
ACM Cloud Computing Security Workshop (CCSW 2017)., 2017
5782017
SoK: Fully Homomorphic Encryption Compilers
A Viand, P Jattke, A Hithnawi
IEEE Symposium on Security and Privacy (SP), 2021
1292021
Talos: Encrypted Query Processing for the Internet of Things
H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu
ACM Conference on Embedded Network Sensor Systems (SenSys 2015), 197-210, 2015
1262015
Secure sharing of partially homomorphic encrypted iot data
H Shafagh, A Hithnawi, L Burkhalter, P Fischli, S Duquennoy
ACM Conference on Embedded Network Sensor Systems (SenSys 2017), 1-14, 2017
1012017
RoFL: Robustness of Secure Federated Learning
H Lycklama, L Burkhalter, A Viand, N Küchler, A Hithnawi
2023 IEEE Symposium on Security and Privacy (SP), 2023
77*2023
TIIM: technology-independent interference mitigation for low-power wireless networks
A Hithnawi, H Shafagh, S Duquennoy
ACM Conference on Information Processing in Sensor Networks (IPSN 2015), 1-12, 2015
752015
Understanding the impact of cross technology interference on IEEE 802.15. 4
A Hithnawi, H Shafagh, S Duquennoy
ACM Workshop on Wireless Network Testbeds, Experimental Evaluation and …, 2014
702014
CrossZig: Combating Cross-Technology Interference in Low-power Wireless Networks
A Hithnawi, S Li, H Shafagh, J Gross, S Duquennoy
ACM Conference on Information Processing in Sensor Networks (IPSN 2016), 1-12, 2016
642016
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
H Shafagh, L Burkhalter, S Ratnasamy, A Hithnawi
USENIX Security Symposium 2020, 2020
512020
TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
L Burkhalter, A Hithnawi, A Viand, H Shafagh, S Ratnasamy
USENIX NSDI 2020, 2020
422020
Poster: Towards Encrypted Query Processing for the Internet of Things
H Shafagh, A Hithnawi, A Dröscher, S Duquennoy, W Hu
ACM Conference on Mobile Computing and Networking (MobiCom 2015), 251-253, 2015
422015
Security Comes First, A Public-key Cryptography Framework for the Internet of Things
H Shafagh, A Hithnawi
IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2014 …, 2014
402014
Zeph: Cryptographic Enforcement of End-to-End Data Privacy
L Burkhalter, N Küchler, A Viand, H Shafagh, A Hithnawi
USENIX OSDI 2021, 2021
382021
HECO: Fully Homomorphic Encryption Compiler
A Viand, P Jattke, M Haller, A Hithnawi
32nd USENIX Security Symposium (USENIX Security 23), 2023
31*2023
Verifiable fully homomorphic encryption
A Viand, C Knabenhans, A Hithnawi
WAHC 2024, 2024
292024
Come Closer: Proximity-based Authentication for the Internet of Things
H Shafagh, A Hithnawi
ACM Conference on Mobile Computing and Networking (MobiCom 2014), 421-424, 2014
24*2014
VF-PS: How to Select Important Participants in Vertical Federated Learning, Efficiently and Securely?
J Jiang, L Burkhalter, F Fu, B Ding, B Du, A Hithnawi, B Li, C Zhang
NeurIPS, 2022
192022
A Receiver-based 802.11 Rate Adaptation Scheme with on-demand Feedback
F Schmidt, A Hithnawi, O Punal, J Gross, K Wehrle
IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC …, 2012
122012
Demo Abstract: Talos a Platform for Processing Encrypted IoT Data
H Shafagh, L Burkhalter, A Hithnawi
ACM Conference on Embedded Network Sensor Systems (SenSys 2016), 308-309, 2016
9*2016
Exploiting Physical Layer Information to Mitigate Cross-technology Interference Effects on Low-power Wireless Networks
A Hithnawi
ACM Conference on Information Processing in Sensor Networks (IPSN 2013), 2013
72013
系统目前无法执行此操作,请稍后再试。
文章 1–20