TUD Logo

TUD Home » ... » Privacy and Data Security » Staff » Dr.-Ing. Elke Franz

Privacy and Data Security

against racism

Dr.-Ing. Elke Franz

Research interests

Curriculum Vitae

1992-1997 Study of Computer Science at TU Dresden (Dipl.-Inf.)
1998-2002 Ph.D. Studies of Computer Science at TU Dresden
since 2001 Scientific staff member at the Chair for Privacy and Data Security
2001-2003 Researcher in DFG project COMQUAD (Components with Quantitative Properties and Adaptivity)
2003-2008 Researcher in EU project PRIME (Privacy and Identity Management for Europe)
2004-2007 Researcher in EU NoE ECRYPT (European Network of Excellence in Cryptology)
since 07/2011 Management of a project (together with Prof. Jorswieck) involved in DFG SFB HAEC (Highly Adaptive Energy-Efficient Computing)
sice 12/2011 Management of DAAD project TruEGrid


Cryptography and Cryptanalysis
Data Security
Informatik I


  • E. Franz, S. Pfennig, T. Reiher: Efficiency of Rateless Secure Network Coding. Procedia Technology, Elsevier, vol. 17, 162 - 169, 2014.
  • U. Baumann, E. Franz, A. Pfitzmann: Kryptographische Systeme. Springer, 2014.
  • S. Pfennig, E. Franz, S. Engelmann, A. Wolf: End-to-End Key Establishment using Physical Layer Key Generation with Specific Attacker Models. Proceedings of the Workshop on Communication Security, 2014.
  • F. M. Ciorba, T. Ilsche, E. Franz, S. Pfennig, C. Scheunert, U. Markwardt, J. Schuchart, D. Hackenberg, R. Schöne, A. Knüpfer, W. E. Nagel, E. A. Jorswieck, M. S. Müller: Analysis of Parallel Applications on a High Performance - Low Energy Computer. Proceedings of the Workshop on Unconventional High Performance Computing, 2014.
  • S. Pfennig, E. Franz, F. M. Ciorba, T. Ilsche, W. E. Nagel: Modeling Communication Delays for Network Coding and Routing for Error-Prone Transmission. Proceedings of the IEEE International Conference on Future Generation Communication Technologies, 2014.
  • S. Pfennig, E. Franz: Adjustable Redundancy for Secure Network Coding in a Unicast Scenario. Proceedings of the International Symposium on Network Coding, 2014.
  • A. Biselli, E. Franz, M. Coutinho: Protection of Consumer Data in the Smart Grid Compliant with the German Smart Metering Guideline. SEGS’13.
  • S. Pfennig, E. Franz: Comparison of Different Secure Network Coding Paradigms Concerning Transmission Efficiency. International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), pp. 18-22, 2013.
  • J. Richter, E. Franz, S. Engelmann, S. Pfennig, E. A. Jorswieck: Physical Layer Security vs. Network Layer Secrecy: Who Wins on the Untrusted Two-Way Relay Channel? International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), pp. 179-183, 2013.
  • S. Mburu, E. Franz, T. Springer: A Conceptual Framework for Designing mHealth Solutions for Developing Countries. MobileHealth '13, Proc. of the 3rd ACM MobiHoc workshop on Perva-sive wireless healthcare, pp. 31-36, 2013.
  • S. Pfennig, E. Franz: Secure Network Coding: Dependency of Efficiency on Network Topology. IEEE ICC / CISS, Budapest, Hungary, 693-698, 2013.
  • G. M. Minamizaki, K. V. O. Fonseca, S. Clauß, E. Franz, S. Köpsell, H. Lazarek: Data security issues on metering systems of energy consumption in Brazil. ESPAÇO ENERGIA, issue 18, April 2013, pp. 28-38, 2013.
  • E. Franz, T. Springer, N. Harder: Enhancing Privacy in Social Applications with the Notion of Group Context. Workshop on Ubiquitous Computing Security Issues (UCSI‘12); 2012.
  • M. P. Coutinho, G. Lambert-Torres, L. E. B. da Silva, H. Lazarek, E. Franz: Detecting Cyber Attacks on SCADA and Other Critical Infrastructures. In: C. Laing, A. Badii, P. Vickers: Se-curing Critical Infrastructure and Critical Control Systems: Approaches for Threat Protection. IGI Global, 17-53. Web. 17 Jul. 2013.
  • E. Franz, S. Pfennig, A. Fischer: Efficiency of Secure Network Coding Schemes. Proc. of 13th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS), LNCS 7394, 145 – 159, 2012.
  • E. Franz, S. Pfennig, A. Fischer: Communication Overhead of Network Coding Schemes Secure against Pollution Attacks. Technical Report TUD-FI12-07, TU Dresden, May 2012.
  • E. Franz, K. Borcea-Pfitzmann, A. Pfitzmann: Revisiting the Naming Problem from a Privacy Perspective. Journal of Communication in Information Science and Management Engineering (CISME), 2(3), World Academic Publishing, 29-35, 2012.
  • K. Liesebach, E. Franz, A. Stange, A. Juschka, K. Borcea-Pfitzmann, A. Böttcher, H. Wahrig: Collaborative E-Learning. In: J. Camemisch, R. Leenes, D. Sommer: Digital Privacy: PRIME – Privacy and Identity Management for Europe. Springer, LNCS 6545, 657-677, 2011.
  • E. Franz, S. Rönisch, R. Bartel: Improved Embedding Based on a Set of Cover Images. Proceedings of the 11th ACM Workshop on Multimedia and Security (Princeton, New Jersey, USA, September 07 - 08, 2009). MM&Sec '09. ACM, New York, NY, 141-150.
  • E. Franz, K. Liesebach: Supporting Local Aliases as Usable Presentation of Secure Pseudonyms. In Proceedings of Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, 22-31.
  • S. Rönisch, E. Franz: Steganalysis Based on a Small Set of Images. In: A. Lang, J. Dittmann, C. Kraetzer (eds.): Final Report on Watermarking Benchmarking. ECRYPT Deliverable D.WVL.21, pp. 91-106, 2008.
  • M. Bergmann, C. Groba, E. Franz, T. Springer: Web 2.0 – Privacy 0.2? A few thoughts about new privacy challenges in the Web 2.0. In Proceedings W2Trust, First International Workshop on Web 2.0 Trust, Trondheim, Norway, June 16th 2008.
  • E. Franz, C. Groba, T. Springer, M. Bergmann: A Comprehensive Approach for Context-dependent Privacy Management. In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, March, 2008.
  • E. Kosta, J. Dumortier, P. Ribbers, A. Fairchild, J. Tseng, K. Liesbach, E. Franz, R. Leenes, M. Hoogwout, B. Priem, T. Kölsch, J. Zibuschka, G. Kramer, G. Schumacher: Requirements for Privacy Enhancing Tools. PRIME Deliverable D1.1.d, March, 2008.
  • E. Franz: Embedding Considering Dependencies between Pixels. In E. J. Delp, III, P. W.Wong, J. Dittmann, and N. D. Memon (Eds.): In Proceedings SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819, pages 68191D 1-12, January 2008.
  • T. Gloe, E. Franz, A. Winkler: Forensics for Flatbed Scanners. In Security, Steganography, and Watermarking of Multimedia Contents IX. Edited by Delp, Edward J., III; Wong, Ping Wah. Proceedings of the SPIE, Volume 6505, 2007, pp. 65051I.
  • E. Franz: Analysing Correlations Between Pixels. In: J. Dittmann, C. Kraetzer (Eds.): Report on Watermarking Benchmarking and Steganalysis, ECRYPT Deliverable D.WVL.16, pp. 8-21, 2007.
  • E. Franz, K. Liesebach, K. Borcea-Pfitzmann: Privacy-Aware User Interfaces within Collaborative Environments. Proceedings of the international workshop in conjunction with AVI 2006 on Context in Advanced Interfaces, Venice, Italy May 23 - 23, 2006, 45 – 48.
  • E. Franz, B. Engel: A Realization of Context Management Facilitating the Usage of Partial Identities. In: Proceedings of Workshop on Privacy-Enhanced Personalization (PEP 2006), Montréal, Canada, 2006.
  • E. Franz, K. Borcea-Pfitzmann: Intra-Application Partitioning in an eLearning Environment - A Discussion of Critical Aspects. In: Workshop on Security in eLearning at AReS 2006, Vienna, April 2006.
  • E. Franz, H. Wahrig, A. Boettcher, K. Borcea-Pfitzmann: Access Control in a Privacy-Aware eLearning Environment. In: Workshop on Security in eLearning at AReS 2006, Vienna, April 2006.
  • E. Franz, U. Wappler: Tailored Responsibility within Component-Based Systems. Proc. of CBSE 2005, 203-218.
  • K. Borcea, E. Franz, and A. Pfitzmann. Usable Presentation of Secure Pseudonyms. In Proceedings of Digital Identity Management (DIM 2005), Alexandria, Virginia, USA, November 2005.
  • K. Borcea, H. Donker, E. Franz, K. Liesebach, A. Pfitzmann, H. Wahrig. Intra-Application Partitioning of Personal Data. In Proc. Workshop on Privacy Enhanced Personalization (PEP 2005), Edinburgh, UK, 67–74, 2005.
  • K. Borcea, H. Donker, E. Franz, A. Pfitzmann, and H. Wahrig. Privacy-Aware eLearning: Why and How. In Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications (ED-MEDIA & EDTELECOM 2005), Montreal, Canada, pages 1466–1472, 2005.
  • K. Borcea, H. Donker, E. Franz, A. Pfitzmann, H. Wahrig: Towards Privacy-Aware eLearning. In: G. Danezis and D. Martin (Eds.): PET 2005, LNCS 3856, Springer-Verlag, Heidelberg 2006, 167-178.
  • E. Franz, A. Schneidewind: Pre-Processing for Adding Noise Steganography. In Proc. of the 7th Int. Workshop on Information Hiding, Barcelona, Spain, Springer, LNCS 3727, 189-203, 2005.
  • J. Dittmann, E. Franz, A. Schneidewind: Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen. Informatik Spektrum 28(6): 453-461 (2005).
  • E. Franz, A. Schneidewind: Adaptive Steganography Based on Dithering. In Proceedings of the 2004 Workshop on Multimedia and Security (Magdeburg, Germany, September 20 - 21, 2004). MM&Sec '04. ACM Press, New York, NY, 56-62.
  • H. Eichenhardt, E. Franz, S. Röttger, U. Wappler: Adapting Component Models to Support Responsibility. ISoLA (Preliminary proceedings), 1st Int. Symposium on Leveraging Applications of Formal Methods, 2004.
  • E. Franz: Steganography Preserving Statistical Properties. Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, October 2002, LNCS 2578, pp. 278-294, Springer 2003.
  • R. Aigner, H. Berthold, E. Franz, S. Göbel, H. Härtig, H. Hußmann, K. Meißner, K. Meyer-Wegener, M. Meyerhöfer, A. Pfitzmann, S. Röttger, A. Schill, T. Springer, F. Wehner: COMQUAD: Komponentenbasierte Softwaresysteme mit zusagbaren quantitativen Eigenschaften und Adaptionsfähigkeit. Inform., Forsch. Entwickl. 18(1): 39-40 (2003).
  • E. Franz: Steganographie durch Nachbildung plausibler Änderungen. Dissertation, Technische Universität Dresden, Institut für Systemarchitektur, 2002.
  • E. Franz: Steganographie unter Erhalt statistischer Merkmale. GI Fachtagung Verlässliche IT-Systeme (VIS ‘01), DuD Fachbeiträge, Vieweg 2001, 225-240.
  • E. Franz, A. Pfitzmann: Steganography Secure against Cover-Stego-Attacks. Proceedings of the Third International Workshop on Information Hiding, Dresden 1999, LNCS 1768, pp. 29-46, Springer 2000.
  • E. Franz, D. Schönfeld: Geschäftsmodelle für Watermarking. DuD 23(1999)12, 705-711, Vieweg 1999.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Einsatz von dummies im Mixnetz zum Schutz der Kommunikationsbeziehung. Sicherheit in Informationssystemen (SIS ’98), S. 65-94, vdf Hochschulverlag AG an der ETH Zürich, 1998.
  • E. Franz, A. Jerichow, G. Wicke: A Payment Scheme for Mixes Providing Anonymity. International IFIP Working Conference on Electronic Commerce ’98, 4-5th June 1998, LNCS 1402, pp. 94-108, Springer, Berlin 1998.
  • E. Franz, A. Jerichow: A Mix-Mediated Service and Its Payment. ESORICS ’98, LNCS 1485, pp. 313-328, Springer, Berlin,, 1998.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. 3rd Australasian Conference on Information Security and Privacy (ACISP ’98), LNCS 1438, pp. 111-222, Springer, Berlin, 1998.
  • E. Franz, A. Graubner, A. Jerichow, A. Pfitzmann: Modelling mix-mediated anonymous com-munication and preventing pool-mode attacks. 14th IFIP International Conference on Infor-mation Security (IFIP/SEC ’98), London, Chapman & Hall 1998.
  • E. Franz, A. Pfitzmann: Einführung in die Steganographie und Ableitung eines neuen Stegoparadigmas. Informatik-Spektrum 21, S. 183-193, Springer 1998.
  • H. Federrath, E. Franz, G. Wicke, A. Westfeld: Steganographie zur vertraulichen Kommunikation. IT-Sicherheit 3/97, S. 10-13, Datakontext-Fachverlag 1997.
  • H. Federrath, E. Franz, A. Jerichow, J. Müller, A. Pfitzmann: Ein Vertraulichkeit gewährendes Erreichbarkeitsverfahren (Schutz des Aufenthaltsortes in künftigen Mobilkommunikationssystemen). GI Fachtagung Kommunikation in Verteilten Systemen (KiVS) ‘97, 17.-22.2.97 in Braunschweig, S. 77-93, Springer 1997.
  • E. Franz, A. Jerichow, A. Pfitzmann: Systematisierung und Modellierung von Mixen. GI Fachtagung Verläßliche IT-Syteme (VIS ‘97), DuD Fachbeiträge, S. 171-190, Vieweg 1997.
  • E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, I. Stierand: Computer Based Steganoraphy. Proceedings of the First International Workshop on Information Hiding, Cambridge 1996, LNCS 1174, pp. 7-21, Springer, Berlin 1996.
Last modified: 22nd Dec 2014, 1.43 PM
Author: Webmaster

Elke Franz

Phone: +49 (0) 351 463-38076
Fax: +49 (0) 351 463-38255
e-mail contact form