Prof. Dr. Esfandiar Mohammadi

Details: mohammadi.eu


Ratzeburger Allee 160
23562 Lübeck
Gebäude 64, 1. OG, Raum 104

Email:esfandiar.mohammadi(at)uni-luebeck.de
Phone:+49 451 3101 6609
Fax:+49 451 3101 6604

Publikationen

2022

  • Moritz Kirschte, Sebastian Meiser, Saman Ardalan and Esfandiar Mohammadi,
    Single SMPC Invocation DPHelmet: Differentially Private Distributed Learning on a Large Scale , arXiv , Nov. 2022.
    DOI:10.48550/ARXIV.2211.02003
    Datei: https://arxiv.org/abs/2211.02003

  • 2021

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Divide and Funnel: a Scaling Technique for Mix-Networks , IACR Cryptol. ePrint Arch. , pp. 1685, 2021.
    Datei: https://eprint.iacr.org/2021/1685

  • David M. Sommer, Lukas Abfalterer, Sheila Zingg and Esfandiar Mohammadi,
    Learning Numeric Optimal Differentially Private Truncated Additive Mechanisms , CoRR , vol. abs/2107.12957, 2021.
    Datei: https://arxiv.org/abs/2107.12957

  • Eike Petersen, Yannik Potdevin, Esfandiar Mohammadi, Stephan Zidowitz, Sabrina Breyer, Dirk Nowotka, Sandra Henn, Ludwig Pechmann, Martin Leucker, Philipp Rostalski and Christian Herzog,
    Responsible and Regulatory Conform Machine Learning for Medicine: A Survey of Technical Challenges and Solutions , CoRR , vol. abs/2107.09546, 2021.
    Datei: https://arxiv.org/abs/2107.09546

  • 2020

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Comprehensive Anonymity Trilemma: User Coordination is not enough in Proceedings on Privacy Enhancing Technologies (PETS/PoPETS) 2020.3 , Sciendo, 2020.
    DOI:10.2478/popets-2020-0056
    Datei: https://content.sciendo.com/view/journals/popets/2020/3/article-p356.xml

  • 2019

  • David Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani and Srdjan Capkun,
    Deniable Upload and Download via Passive Participation in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) , Boston, MA: USENIX Association, 2019. pp. 649--666.
    ISBN:978-1-931971-49-2
    Datei: https://www.usenix.org/conference/nsdi19/presentation/sommer

  • Damien Desfontaines, Elisabeth Krahmer and Esfandiar Mohammadi,
    Passive and active attackers in noiseless privacy , CoRR , vol. abs/1905.00650, 2019.
    Datei: http://arxiv.org/abs/1905.00650

  • David Sommer, Sebastian Meiser and Esfandiar Mohammadi,
    Privacy Loss Classes: The Central Limit Theorem in Differential Privacy , Proceedings on Privacy Enhancing Technologies , vol. 2019, no. 2, pp. 245 - 269, 2019. Sciendo.
    DOI:https://doi.org/10.2478/popets-2019-0029
    Datei: https://content.sciendo.com/view/journals/popets/2019/2/article-p245.xml

  • 2018

  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi and Aniket Kate,
    Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency---Choose Two in In Proceedings of the 39th IEEE Symposium on Security and Privacy (S\&P) , IEEE, 2018. pp. 170--188.

  • Sebastian Meiser and Esfandiar Mohammadi,
    Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy in Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS) , ACM, 2018.

  • 2017

  • Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser and Esfandiar Mohammadi,
    AnoA: A Framework for Analyzing Anonymous Communication Protocols , Journal of Privacy and Confidentiality , vol. 7, no. 2:5, pp. 163--178, 2017. IEEE.

  • 2016

  • Michael Backes, Robert Künnemann and Esfandiar Mohammadi,
    Computational Soundness of Dalvik Bytecode in Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS) , ACM, 2016.

  • 2015

  • Michael Backes, Esfandiar Mohammadi and Tim Ruffing,
    Computational Soundness for Interactive Primitives in Proc.\ 20th European Symposium on Research in Computer Security (ESORICS) , Springer, 2015. pp. 125--145.

  • Michael Backes, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi and Kim Pecina,
    Symbolic Malleable Zero-knowledge Proofs in Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF) , IEEE, 2015. pp. 412--426.

  • 2014

  • Michael Backes, Aniket Kate, Sebastian Meiser and Esfandiar Mohammadi,
    (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS) , ACM, 2014. pp. 513--524.

  • Michael Backes, Esfandiar Mohammadi and Tim Ruffing,
    Computational Soundness Results for ProVerif in Proceedings of the 3rd Conference on Principles of Security and Trust (POST) , Springer, 2014. pp. 42--62.

  • Michael Backes, Praveen Manoharan and Esfandiar Mohammadi,
    TUC: Time-sensitive and Modular Analysis of Anonymous Communication in Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF) , IEEE, 2014. pp. 383--397.

  • Kim Pecina, Esfandiar Mohammadi and Christina Pöpper,
    Zero-Communication Seed Establishment for Anti-Jamming Techniques in Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT) , Internet Society, 2014.

  • 2013

  • Michael Backes, Aniket Kate and Esfandiar Mohammadi,
    Ace: An Efficient Key-Exchange Protocol for Onion Routing in Proceedings of the 11th ACM Workshop on Privacy in the Electronic Society (WPES) , ACM, 2013. pp. 55--64.

  • Michael Backes, Dario Fiore and Esfandiar Mohammadi,
    Privacy-Preserving Accountable Computation in Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS) , Springer, 2013. pp. 38--56.

  • 2012

  • Michael Backes, Aniket Kate, Ian Goldberg and Esfandiar Mohammadi,
    Provably Secure and Practical Onion Routing in Proceedings of the 25th IEEE Computer Security Foundations Symposium (CSF) , IEEE, 2012. pp. 369--385.

  • 2010

  • Michael Backes, Matteo Maffei and Esfandiar Mohammadi,
    Computationally Sound Abstraction and Verification of Secure Multi-Party Computations in Proceedings of the 30th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) , Schloss Dagstuhl--Leibniz-Zentrum für Informatik, 2010. pp. 352--363.