LUIS Über uns Team
Dr. Michael Brenner

Dr. Michael Brenner

Portraitfoto Michael Brenner Portraitfoto Michael Brenner
Dr. Michael Brenner
Portraitfoto Michael Brenner Portraitfoto Michael Brenner
Dr. Michael Brenner
Positions
Management
Workstations and Security Section
Deputy Head
Leibniz Universität IT Services (LUIS)
Department Officers for IT Security
Leibniz Universität IT Services (LUIS)

Arbeitsbereiche

  • Arbeitsplatz-PC
  • IT-Sicherheit
  • Identitätsmanagement
  • Zentrale Dienste Mail, Kalender, DDI (DNS, DHCP, IPAM), XMPP, Matrix
  • Stellv. Informationssicherheitsbeauftragter der LUH

Wissenschaftliche Tätigkeiten

Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC)

Homomorphic Cryptography Standards

  • 2019 4. Homomorphic Encryption Standards Meeting in Santa Clara
  • 2018 3. Homomorphic Encryption Standards Meeting in Toronto (U Toronto)
  • 2018 2. Homomorphic Encryption Standards Meeting in Cambridge (MIT)
  • 2017 1. Homomorphic Encryption Standards Meeting in Redmond (Microsoft Research)

Links

The Open Source hcrypt Project
HomomorphicEncryption.org Standards Consortium

Publikationen

Showing results 26 - 30 out of 41

Henne B, Kater C, Smith M, Brenner M. Selective Cloaking: Need-to-know for Location-based Apps. In Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust . 2013
Perl H, Mohammed Y, Brenner M, Smith M. Privacy/performance trade-off in private search on bio-medical data. Future Generation Computer Systems. 2013.
Brenner M. Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie. iX Magazin für professionelle Informationstechnik. 2012;120-124.
Brenner M, Perl H, Smith M. How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications . IEEE Computer Society. 2012. p. 375-382
Brenner M, Perl H, Smith M. Practical Applications of Homomorphic Encryption. In Proceedings of the 7th International Conference on Security and Cryptography. 2012. p. 5-14