Author of the publication

Positioning Information Security Roles, Processes and Interactions.

, and . ISSE, page 163-172. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Leakage in Federated Learning with Trusted Hardware., and . CoRR, (2020)Dynamic Searchable Encryption with Small Client Storage., , , and . IACR Cryptol. ePrint Arch., (2019)A Zero-Knowledge Version of vSQL., , , , and . IACR Cryptol. ePrint Arch., (2017)AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities., , , , and . CoRR, (2023)Agora: A Privacy-Aware Data Marketplace., , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 3728-3740 (2022)Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time., and . AsiaCCS, page 252-264. ACM, (2021)Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators., , , and . USENIX Security Symposium, USENIX Association, (2024)I/O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy., , , and . USENIX Security Symposium, USENIX Association, (2024)Transparency Logs via Append-Only Authenticated Dictionaries., , , , , and . CCS, page 1299-1316. ACM, (2019)New Constructions for Forward and Backward Private Symmetric Searchable Encryption., , , and . CCS, page 1038-1055. ACM, (2018)