dr.ing. E. Tews BSc (Erik)

Universitair docent


Cordless Telephones
Mobile Phones
Peer To Peer Networks
Switching Networks
Digital Video Broadcasting (Dvb)
Hardware Security
Program Processors
Radio Stations
Field Programmable Gate Arrays (Fpga)
Particle Accelerators
Radio Links
Network Protocols


Baumann, P., Katzenbeisser, S., Stopczynski, M., & Tews, E. (2016). Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection. In WPES '16. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society (pp. 37-46). Association for Computing Machinery. DOI: 10.1145/2994620.2994621
Schulz, M., Klapper, P., Hollick, M., Tews, E., & Katzenbeisser, S. (2016). Trust The Wire, They Always Told Me!: On Practical Non-Destructive Wire-Tap Attacks Against Ethernet. In WiSec '16. Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (pp. 43-48). Association for Computing Machinery. DOI: 10.1145/2939918.2940650
Senftleben, M., Barroso, A., Bucicoiu, M., Hollick, M., Katzenbeisser, S., & Tews, E. (2016). On the Privacy and Performance of Mobile Anonymous Microblogging. IEEE transactions on information forensics and security, 11(7), 1578-1591. DOI: 10.1109/TIFS.2016.2541633
Tews, E., & Schlehuber, C. (2014). Quantitative Ansätze zur IT-Risikoanalyse. In S. Katzenbeisser, V. Lotz, & E. R. Weippl (Eds.), Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit (Vol. 228, pp. 293-303). (LNI). Nederlands Centrum Geestelijke Volksgezondheid.
Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., & Tews, E. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. In Proceedings of the 23rd USENIX Security Symposium (pp. 733-748)
Schlehuber, C., Tews, E., & Katzenbeisser, S. (2014). IT-Security in Railway Signalling Systems. In H. Reimer, N. Pohlmann, & W. Schneider (Eds.), ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference (pp. 56-64). Springer. DOI: 10.1007/978-3-658-06708-3_4
Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S., & Sadeghi, A-R. (2014). MoP-2-MoP - Mobile Private Microblogging. In N. Christin, & R. Safavi-Naini (Eds.), Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (pp. 384-396). (Lecture Notes in Computer Science; Vol. 8437). Springer. DOI: 10.1007/978-3-662-45472-5_25
Ghiglieri, M., & Tews, E. (2014). A privacy protection system for HbbTV in Smart TVs. In 2014 IEEE 11th Consumer Communications and Networking Conference 2014 (pp. 357-362). IEEE. DOI: 10.1109/CCNC.2014.6866595
Karvelas, N. P., Peter, A., Katzenbeisser, S., Tews, E., Tews, E., & Hamacher, K. (2014). Privacy preserving whole genome sequence processing through proxy-aided ORAM. In 13th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2014) (pp. 1-10). New York: Association for Computing Machinery. DOI: 10.1145/2665943.2665962
Weiner, M., Massar, M., Tews, E., Giese, D., & Wieser, W. (2013). Security analysis of a widely deployed locking system. In A-R. Sadeghi, V. D. Gligor, & M. Yung (Eds.), 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 (pp. 929-940). Association for Computing Machinery. DOI: 10.1145/2508859.2516733
Peter, A., Tews, E., Tews, E., & Katzenbeisser, S. (2013). Efficiently outsourcing multiparty computation under multiple keys. IEEE transactions on information forensics and security, 8(12), 2046-2058. DOI: 10.1109/TIFS.2013.2288131

Pure Link

Google Scholar Link



Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling (gebouwnr. 11), kamer 2027
Hallenweg 19
7522NH  Enschede

Navigeer naar locatie


Universiteit Twente
Faculteit Elektrotechniek, Wiskunde en Informatica
Zilverling  2027
Postbus 217
7500 AE Enschede