Positions
Dr. Michael Brenner
Dr. Michael Brenner
Phone
Dr. Michael Brenner
Phone
Management
Workstations and Security Section
Deputy Head
Leibniz Universität IT Services (LUIS)
Department Officers for IT Security
Leibniz Universität IT Services (LUIS)
Arbeitsbereiche
- Arbeitsplatz-PC
- IT-Sicherheit
- Identitätsmanagement
- Zentrale Dienste Mail, Kalender, DDI (DNS, DHCP, IPAM), XMPP, Matrix
- Stellv. Informationssicherheitsbeauftragter der LUH
Wissenschaftliche Tätigkeiten
Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC)
- WAHC'23 bei der 30. ACM CCS
- WAHC'22 bei der 29. ACM CCS
- WAHC'21 bei der 28. ACM CCS
- WAHC'20 Online Event (Covid)
- WAHC'19 bei der 26. ACM CCS
- WAHC'18 bei der 25. ACM CCS
- WAHC'17 bei der 21. Financial Crypto & Data Security
- WAHC'16 bei der 20. Financial Crypto & Data Security
- WAHC'15 bei der 19. Financial Crypto & Data Security
- WAHC'14 bei der 18. Financial Crypto & Data Security
- WAHC'13 bei der 17. Financial Crypto & Data Security
Homomorphic Cryptography Standards
- 2019 4. Homomorphic Encryption Standards Meeting in Santa Clara
- 2018 3. Homomorphic Encryption Standards Meeting in Toronto (U Toronto)
- 2018 2. Homomorphic Encryption Standards Meeting in Cambridge (MIT)
- 2017 1. Homomorphic Encryption Standards Meeting in Redmond (Microsoft Research)
Links
The Open Source hcrypt Project
HomomorphicEncryption.org Standards Consortium
Publikationen
Showing results 26 - 30 out of 41
Henne B, Kater C, Smith M, Brenner M. Selective Cloaking: Need-to-know for Location-based Apps. In Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust . 2013
Perl H, Mohammed Y, Brenner M, Smith M. Privacy/performance trade-off in private search on bio-medical data. Future Generation Computer Systems. 2013.
Brenner M. Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie. iX Magazin für professionelle Informationstechnik. 2012;120-124.
Brenner M, Perl H, Smith M. How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications . IEEE Computer Society. 2012. p. 375-382
Brenner M, Perl H, Smith M. Practical Applications of Homomorphic Encryption. In Proceedings of the 7th International Conference on Security and Cryptography. 2012. p. 5-14