default search action
Thomas Lorünser
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Veronika Siska, Thomas Lorünser, Stephan Krenn, Christoph Fabianek:
Integrating Secure Multiparty Computation into Data Spaces. CLOSER 2024: 346-357 - [c31]Julia Mader, Thomas Lorünser:
Feasibility of Privacy Preserving Minutiae-Based Fingerprint Matching. ICISSP 2024: 899-906 - [i16]Daniel Bachlechner, Ruben Helmut Hetfleisch, Stephan Krenn, Thomas Lorünser, Michael Rader:
Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers. CoRR abs/2408.15694 (2024) - 2023
- [j6]Thomas Lorünser, Stephan Krenn, Christoph Pacher, Bernhard Schrenk:
On the Security of Offloading Post-Processing for Quantum Key Distribution. Entropy 25(2): 226 (2023) - [i15]Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Florian Wohner:
Outsourced Computations Maintaining Confidentiality and Authenticity. ERCIM News 2023(133) (2023) - 2022
- [c30]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management. CCSW 2022: 41-51 - [c29]Thomas Lorünser, Benjamin Rainer, Florian Wohner:
Towards a Performance Model for Byzantine Fault Tolerant Services. CLOSER 2022: 178-189 - [c28]Christoph G. Schuetz, Thomas Lorünser, Samuel Jaburek, Kevin Schuetz, Florian Wohner, Roman Karl, Eduard Gringinger:
A Distributed Architecture for Privacy-Preserving Optimization Using Genetic Algorithms and Multi-party Computation. CoopIS 2022: 168-185 - [c27]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing. ICISSP 2022: 637-647 - [i14]Thomas Lorünser, Florian Wohner, Stephan Krenn:
A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management. CoRR abs/2205.03048 (2022) - [i13]Stephan Krenn, Thomas Lorünser:
Single-Use Delegatable Signatures Based on Smart Contracts. CoRR abs/2210.02826 (2022) - [i12]Thomas Lorünser, Stephan Krenn, Christoph Pacher, Bernhard Schrenk:
On the Security of Offloading Post-Processing for Quantum Key Distribution. CoRR abs/2210.08977 (2022) - 2021
- [c26]Stephan Krenn, Thomas Lorünser:
Single-Use Delegatable Signatures Based on Smart Contracts. ARES 2021: 40:1-40:7 - [i11]Thomas Lorünser, Benjamin Rainer, Florian Wohner:
Towards a Performance Model for Byzantine Fault Tolerant (Storage) Services. CoRR abs/2101.04489 (2021) - [i10]Thomas Lorünser, Christoph G. Schütz, Eduard Gringinger:
SlotMachine - A Privacy-preserving Marketplace for Slot Management. ERCIM News 2021(126) (2021) - 2020
- [c25]Thomas Lorünser, Florian Wohner:
Performance Comparison of Two Generic MPC-frameworks with Symmetric Ciphers. ICETE (2) 2020: 587-594 - [i9]Thomas Lorünser, Niki Dürk, Stephan Puxkandl:
FLEXPROD - Flexible Optimizations of Production with Secure Auctions. ERCIM News 2020(123) (2020)
2010 – 2019
- 2019
- [j5]Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, John Sören Pettersson:
Making secret sharing based cloud storage usable. Inf. Comput. Secur. 27(5) (2019) - 2018
- [c24]Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger:
CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. ARES 2018: 4:1-4:9 - [c23]Leon Sell, Henrich C. Pöhls, Thomas Lorünser:
C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality. CloudCom 2018: 230-238 - [c22]Jakob Stangl, Thomas Lorünser, Sai Manoj Pudukotai Dinakarrao:
A fast and resource efficient FPGA implementation of secret sharing for storage applications. DATE 2018: 654-659 - [c21]David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. Public Key Cryptography (1) 2018: 219-250 - [i8]Stephan Krenn, Thomas Lorünser, Christoph Striecks:
Engineering Cryptography for Security and Privacy in the Cloud. ERCIM News 2018(113) (2018) - [i7]Thomas Lorünser, Eva María Muñoz, Marco Decandia Brocca:
Secure and Robust Multi-Cloud Storage for the Public Sector. ERCIM News 2018(114) (2018) - [i6]David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications. IACR Cryptol. ePrint Arch. 2018: 321 (2018) - 2017
- [j4]Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger:
Agile cryptographic solutions for the cloud. Elektrotech. Informationstechnik 134(7): 364-369 (2017) - [c20]Andreas Happe, Florian Wohner, Thomas Lorünser:
The Archistar Secret-Sharing Backup Proxy. ARES 2017: 88:1-88:8 - [c19]Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks:
Towards Attribute-Based Credentials in the Cloud. CANS 2017: 179-202 - [c18]Stephan Krenn, Thomas Lorünser, Christoph Striecks:
Batch-verifiable Secret Sharing with Unconditional Privacy. ICISSP 2017: 303-311 - [c17]Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martínez Garcí, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, Alberto Zanini:
Secure and Privacy-Friendly Storage and Data Processing in the Cloud. Privacy and Identity Management 2017: 153-169 - 2016
- [j3]Christoph Pacher, Aysajan Abidin, Thomas Lorünser, Momtchil Peev, Rupert Ursin, Anton Zeilinger, Jan-Åke Larsson:
Attacks on quantum key distribution protocols that employ non-ITS authentication. Quantum Inf. Process. 15(1): 327-362 (2016) - [c16]Denise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso:
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System. ARES 2016: 88-97 - [c15]Aleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless:
Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle. ARES 2016: 428-436 - [c14]Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. ARES 2016: 733-741 - [c13]Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner:
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider. Privacy and Identity Management 2016: 76-91 - [c12]Andreas Happe, Stephan Krenn, Thomas Lorünser:
Malicious Clients in Distributed Secret Sharing Based Storage Networks. Security Protocols Workshop 2016: 206-214 - [i5]Daniel Slamanig, Agi Karyda, Thomas Lorünser:
PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud. ERCIM News 2016(104) (2016) - [i4]Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser:
Secure and Privacy-Preserving Identity Management in the Cloud. ERCIM News 2016(104) (2016) - [i3]Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls:
A New Architecture for Developing Cryptographic Cloud Services. ERCIM News 2016(106) (2016) - 2015
- [j2]Bernhard Schrenk, Roland Lieger, Thomas Lorünser, Paraskevas Bakopoulos, Andreas Poppe, Martin Stierle, Hercules Avramopoulos, Helmut Leopold:
Fully Passive Resiliency Node for Optical Access [Invited]. JOCN 7(11): B10-B15 (2015) - [j1]Bernhard Schrenk, Fabian Laudenbach, Roland Lieger, Thomas Lorünser, Paraskevas Bakopoulos, Andreas Poppe, Martin Stierle, Hercules Avramopoulos, Helmut Leopold:
Passive ROADM Flexibility in Optical Access With Spectral and Spatial Reconfigurability. IEEE J. Sel. Areas Commun. 33(12): 2837-2846 (2015) - [c11]Thomas Lorünser, Andreas Happe, Daniel Slamanig:
ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing. CloudCom 2015: 371-378 - [c10]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich C. Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CSP Forum 2015: 14-25 - [c9]Bernhard Schrenk, Fabian Laudenbach, Roland Lieger, Thomas Lorünser, Paraskevas Bakopoulos, Andreas Poppe, Martin Stierle, Hercules Avramopoulos, Helmut Leopold:
Fully-passive ROADM for flexible in metro-access networks. ECOC 2015: 1-3 - [c8]Thomas Lorünser, Thomas Länger, Daniel Slamanig:
Cloud Security and Privacy by Design. e-Democracy 2015: 202-206 - [c7]Bernhard Schrenk, Thomas Lorünser, Thomas Zemen:
Towards spectrum-programmable, mesh-enabled mobile xHaul through reconfigurable WDM overlay in fully-passive networks. ICTON 2015: 1-4 - [c6]Bernhard Schrenk, Roland Lieger, Thomas Lorünser, Paraskevas Bakopoulos, Andreas Poppe, Martin Stierle, Hercules Avramopoulos, Helmut Leopold:
Fully-passive resiliency switch for agile PON restoration. OFC 2015: 1-3 - [c5]Alaa Sarah Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig:
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements. Privacy and Identity Management 2015: 79-96 - [i2]Thomas Lorünser, Charles Bastos Rodriguez, Denise Demirel, Simone Fischer-Hübner, Thomas Groß, Thomas Länger, Mathieu Des Noes, Henrich Christopher Pöhls, Boris Rozenberg, Daniel Slamanig:
Towards a New Paradigm for Privacy and Security in Cloud Services. CoRR abs/1506.05980 (2015) - 2014
- [c4]Aleksandar Hudic, Markus Tauber, Thomas Lorünser, Maria Krotsiani, George Spanoudakis, Andreas Mauthe, Edgar R. Weippl:
A Multi-layer and MultiTenant Cloud Assurance Evaluation Methodology. CloudCom 2014: 386-393 - 2012
- [i1]Christoph Pacher, Aysajan Abidin, Thomas Lorünser, Momtchil Peev, Rupert Ursin, Anton Zeilinger, Jan-Åke Larsson:
Attacks on quantum key distribution protocols that employ non-ITS authentication. CoRR abs/1209.0365 (2012)
2000 – 2009
- 2008
- [c3]Thomas Lorünser, Edwin Querasser, Thomas Matyus, Momtchil Peev, Johannes Wolkerstorfer, Michael Hutter, Alexander Szekely, Ilse Wimberger, Christian Pfaffel-Janser, Andreas Neppach:
Security processor with quantum key distribution. ASAP 2008: 37-42 - [c2]Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer:
Key Management of Quantum Generated Keys in IPsec. SECRYPT 2008: 177-183 - 2004
- [c1]Roland Lieger, Thomas Lorünser, Gerhard Humer, Florian Schupfer:
Embedding quantum cryptography on DSP-boards. EUSIPCO 2004: 2027-2030
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 02:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint