Author of the publication

Mask: a system for privacy-preserving policy-based access to published content.

, , , and . SIGMOD Conference, page 1239-1242. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Key Management for Smart Power Grids - Approaches and Issues, , , , , , and . CoRR, (2012)Mask: a system for privacy-preserving policy-based access to published content., , , and . SIGMOD Conference, page 1239-1242. ACM, (2010)Trusted CI Experiences in Cybersecurity and Service to Open Science., , , , , , , , , and 9 other author(s). PEARC, page 60. ACM, (2019)Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing., , , , , and . ICNC, page 1-6. IEEE Computer Society, (2016)Scaling Byzantine Fault-Tolerant Replication toWide Area Networks., , , , , , , and . DSN, page 105-114. IEEE Computer Society, (2006)On the accuracy of decentralized virtual coordinate systems in adversarial networks., and . ACM Conference on Computer and Communications Security, page 214-224. ACM, (2007)Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing., , , , , and . CoRR, (2015)Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks., , and . ICNP, page 65-74. IEEE Computer Society, (2006)