Trustworthy information processing


The trustworthy information processing research area target the development of rigorous algorithmic and system approaches to enable a trustworthy and accountable processing of data. Examples include accurate, privacy-friendly data acquisition; secure computation of privacy-sensitive information; rigorous cryptographic operations to ensure a trustworthy behaviour in malicious environments; and developing technical means for holding people accountable in case of misbehavior.


SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks

A promising semantics for relaxed-memory concurrency

Security Analysis of Cache Replacement Policies

Training Fair Classifiers

Uncovering the Spatiotemporal Patterns of Collective Social Activity

Distilling Information Reliability and Source Trustworthiness from Digital Traces

Fairness Beyond Disparate Treatment & Disparate Impact: Learning Classification without Disparate Mistreatment

A privacy-preserving reputation system with user rewards

Two Message Oblivious Evaluation of Cryptographic Functionalities

T3: Comprehensive policy compliance in data retrieval systems

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Attributbasierte Verschlüsselung für die Justiz

Ersetzendes Scannen - Kernelement im Gesamtkonzept einer elektronischen Aktenführung?

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Estimating Diffusion Networks: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm

Smart Mobility für das Saarland: Identifikation von Chancen und Handlungsempfehlungen für eine digital vernetzte Mobilität

Confidentiality and Authenticity for Distributed Version Control Systems — A Mercurial Extension

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

Foundations of Reconfigurable PUFs

PriCL: Creating a Precedent. A Framework for Reasoning about Privacy Case Law

How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data

Fully Secure Inner-Product Proxy Re-Encryption with constant size Ciphertext

Data Lineage in Malicious Environments

Privacy Preserving Payments in Credit Networks

Quantifying Information Flow in Cryptographic Systems

Elektronischer Rechtsverkehr in Verfahren ohne Anwaltszwang - der Justizgewährungsanspruch des Bürgers als praktischer und theoretischer Störfaktor? - Anmerkungen insbesondere aus amtsrichterlicher Sicht

Type-Based Verification of Electronic Voting Protocols

Type-Based Verification of Electronic Voting Protocols

E-Akte, elektronischer Rechtsverkehr und Barrierefreiheit

Elektronische Akten: Anforderungen und technische Lösungsmöglichkeiten

Poster: Quasi-ID: In fact, I am a human

Lime: Data Lineage in the Malicious Environment

SDDR: Light-Weight, Secure Mobile Encounters

Towards Detecting Anomalous User Behavior in Online Social Networks

Feasibility and Infeasibility of Secure Computation with Malicious PUFs

TUC: Time-sensitive and Modular Analysis of Anonymous Communication

Asynchronous MPC with a Strict Honest Majority Using Non-equivocation

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

BackRef: Accountability in Anonymous Communication Networks

X-pire 2.0 - A User-Controlled Expiration Date and Copy Protection Mechanism.