Positions
Dr. Michael Brenner
Dr. Michael Brenner
Phone
Dr. Michael Brenner
Phone
Management
Workstations and Security Section
Deputy Head
Leibniz Universität IT Services (LUIS)
Department Officers for IT Security
Leibniz Universität IT Services (LUIS)
Arbeitsbereiche
- Arbeitsplatz-PC
- IT-Sicherheit
- Identitätsmanagement
- Zentrale Dienste Mail, Kalender, DDI (DNS, DHCP, IPAM), XMPP, Matrix
- Stellv. Informationssicherheitsbeauftragter der LUH
Wissenschaftliche Tätigkeiten
Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC)
- WAHC'23 bei der 30. ACM CCS
- WAHC'22 bei der 29. ACM CCS
- WAHC'21 bei der 28. ACM CCS
- WAHC'20 Online Event (Covid)
- WAHC'19 bei der 26. ACM CCS
- WAHC'18 bei der 25. ACM CCS
- WAHC'17 bei der 21. Financial Crypto & Data Security
- WAHC'16 bei der 20. Financial Crypto & Data Security
- WAHC'15 bei der 19. Financial Crypto & Data Security
- WAHC'14 bei der 18. Financial Crypto & Data Security
- WAHC'13 bei der 17. Financial Crypto & Data Security
Homomorphic Cryptography Standards
- 2019 4. Homomorphic Encryption Standards Meeting in Santa Clara
- 2018 3. Homomorphic Encryption Standards Meeting in Toronto (U Toronto)
- 2018 2. Homomorphic Encryption Standards Meeting in Cambridge (MIT)
- 2017 1. Homomorphic Encryption Standards Meeting in Redmond (Microsoft Research)
Links
The Open Source hcrypt Project
HomomorphicEncryption.org Standards Consortium
Publikationen
Showing results 16 - 20 out of 41
Brenner M. Microsoft entrauscht homomorphe Krypto-Library SEAL. c't Magazin für Computertechnik. 2016;Heise Security Online.
Brenner M. Rechnen mit sieben Siegeln - Verschlüsselt rechnen mit homomorpher Verschlüsselung. c't Magazin für Computertechnik. 2016;(6/2016):176-178.
Dietrich S, Brenner M, Krombholz K. Who are you now? Fading to multiple personas. In Proceedings of the 12th Symposium On Usable Privacy and Security: Who are you?! Adventures in Authentication Workshop. USENIX Association. 2016
Brenner M, (ed.), Rohloff K, (ed.). 19th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2015 Workshops BITCOIN, WAHC and Wearables. Springer Verlag, 2015.
Szongott C, Brenner M, Smith M. METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. In Okamoto T, Bohme R, editors, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Vol. LNCS 8975. Springer Verlag. 2015. p. 370-386. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-662-47854-7_22