Follow
Henning Perl
Henning Perl
Verified email at fkie.fraunhofer.de
Title
Cited by
Cited by
Year
Vccfinder: Finding potential vulnerabilities in open-source projects to assist code audits
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
3102015
SoK: secure messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2015 IEEE Symposium on Security and Privacy, 232-249, 2015
3082015
Rethinking SSL development in an appified world
S Fahl, M Harbach, H Perl, M Koetter, M Smith
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2412013
" If you want, I can store the encrypted password" A Password-Storage Field Study with Freelance Developers
A Naiakshina, A Danilova, E Gerlitz, E Von Zezschwitz, M Smith
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
1022019
Why Eve and Mallory (also) love webmasters: A study on the root causes of SSL misconfigurations
S Fahl, Y Acar, H Perl, M Smith
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
762014
Hey, nsa: Stay away from my market! future proofing app markets against powerful attackers
S Fahl, S Dechand, H Perl, F Fischer, J Smrcek, M Smith
proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
652014
Poster: an implementation of the fully homomorphic Smart-Vercauteren crypto-system
H Perl, M Brenner, M Smith
Proceedings of the 18th ACM conference on Computer and communications …, 2011
502011
You Won’t Be Needing These Any More: On Removing Unused Certificates From Trust Stores
H Perl, S Fahl, M Smith
Financial Cryptography, 2014
482014
How practical is homomorphically encrypted program execution? an implementation and performance evaluation
M Brenner, H Perl, M Smith
2012 ieee 11th international conference on trust, security and privacy in …, 2012
342012
Fast confidential search for bio-medical data using bloom filters and homomorphic cryptography
H Perl, Y Mohammed, M Brenner, M Smith
2012 IEEE 8th International Conference on E-Science, 1-8, 2012
322012
Practical Applications of Homomorphic Encryption.
M Brenner, H Perl, M Smith
SECRYPT, 5-14, 2012
272012
Privacy/performance trade-off in private search on bio-medical data
H Perl, Y Mohammed, M Brenner, M Smith
Future Generation Computer Systems 36, 441-452, 2014
182014
VCCFinder
H Perl, S Dechand, M Smith, D Arp, F Yamaguchi, K Rieck, S Fahl, Y Acar
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
32015
Security and Data Analysis
H Perl
Universitäts-und Landesbibliothek Bonn, 2017
2017
Hey, NSA
S Fahl, S Dechand, H Perl, F Fischer, J Smrcek, M Smith
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2014
An Evaluation System For SSL Validation Schemes
H Perl, S Fahl, M Smith
The system can't perform the operation now. Try again later.
Articles 1–16