Follow
Thomas Loruenser
Title
Cited by
Cited by
Year
The SECOQC quantum key distribution network in Vienna
M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, ...
New Journal of Physics 11 (7), 075001, 2009
8182009
Practical quantum key distribution with polarization entangled photons
A Poppe, A Fedrizzi, R Ursin, HR Böhm, T Lorünser, O Maurhardt, M Peev, ...
Optics Express 12 (16), 3865-3871, 2004
2972004
High-fidelity transmission of polarization encoded qubits from an entangled source over 100 km of fiber
H Hübel, MR Vanner, T Lederer, B Blauensteiner, T Lorünser, A Poppe, ...
Optics Express 15 (12), 7853-7862, 2007
1942007
A fully automated entanglement-based quantum cryptography system for telecom fiber networks
A Treiber, A Poppe, M Hentschel, D Ferrini, T Lorünser, E Querasser, ...
New Journal of Physics 11 (4), 045013, 2009
792009
A novel protocol-authentication algorithm ruling out a man-in-the middle attack in quantum cryptography
M Peev, M Nölle, O Maurhardt, T Lorünser, M Suda, A Poppe, R Ursin, ...
International Journal of Quantum Information 3 (01), 225-231, 2005
442005
ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing
T Lorünser, A Happe, D Slamanig
IEEE 7th International Conference on Cloud Computing Technology and Science …, 2015
412015
Revisiting proxy re-encryption: forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR international workshop on public key cryptography, 219-250, 2018
372018
Attacks on quantum key distribution protocols that employ non-ITS authentication
C Pacher, A Abidin, T Lorünser, M Peev, R Ursin, A Zeilinger, JÅ Larsson
Quantum Information Processing 15 (1), 327-362, 2016
212016
PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services
T Loruenser, D Slamanig, T Länger, HC Pöhls
2016 11Th international conference on availability, reliability and security …, 2016
202016
Passive ROADM flexibility in optical access with spectral and spatial reconfigurability
B Schrenk, F Laudenbach, R Lieger, T Lorünser, P Bakopoulos, A Poppe, ...
IEEE Journal on Selected Areas in Communications 33 (12), 2837-2846, 2015
182015
Towards attribute-based credentials in the cloud
S Krenn, T Lorünser, A Salzer, C Striecks
International Conference on Cryptology and Network Security, 179-202, 2017
152017
Opportunities and Challenges of CREDENTIAL
F Karegar, C Striecks, S Krenn, F Hörandner, T Lorünser, ...
IFIP International Summer School on Privacy and Identity Management, 76-91, 2016
152016
Towards a new paradigm for privacy and security in cloud services
T Lorünser, CB Rodriguez, D Demirel, S Fischer-Hübner, T Groß, ...
Cyber Security and Privacy Forum, 14-25, 2015
122015
Towards a New Paradigm for Privacy and Security in Cloud Services
T Loruenser, CB Rodriguez, D Demirel, S Fischer-Huebner, T Gross, ...
4th Cyber Security and Privacy EU Forum, CSP Forum 2015, 2015
122015
New release of an open source QKD software: design and implementation of new algorithms, modularization and integration with IPSec
O Maurhart, C Pacher, A Happe, T Lor, C Tamas, A Poppe, M Peev
Proc. Qcrypt, 1, 2013
122013
A multi-layer and multitenant cloud assurance evaluation methodology
A Hudic, M Tauber, T Lorünser, M Krotsiani, G Spanoudakis, A Mauthe, ...
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
102014
Making secret sharing based cloud storage usable
E Framner, S Fischer-Hübner, T Lorünser, AS Alaqra, JS Pettersson
Information & Computer Security, 2019
92019
CryptSDLC: Embedding cryptographic engineering into secure software development lifecycle
T Loruenser, HC Pöhls, L Sell, T Laenger
Proceedings of the 13th international conference on availability …, 2018
92018
A fast and resource efficient FPGA implementation of secret sharing for storage applications
J Stangl, T Lorünser, SMP Dinakarrao
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 654-659, 2018
92018
Response to" Vulnerability of'A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography'"
M Peev, C Pacher, T Lorünser, M Nölle, A Poppe, O Maurhart, M Suda, ...
International Journal of Quantum Information 7 (07), 1401-1407, 2009
92009
The system can't perform the operation now. Try again later.
Articles 1–20