Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial equation solving by lifting procedures for ramified fibers., , , and . Theor. Comput. Sci., 315 (2-3): 335-369 (2004)Secure Exchange of Digital Goods in a Decentralized Data Marketplace., , , , , and . CoRR, (2019)OpTERA - Optimization and Real Equation Solving., , , , , , and . German-Argentinian Workshop on Information Technology, page 69-72. (1999)An attack on MySQL's login protocol, , , , and . CoRR, (2010)The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms., , and . WOOT, USENIX Association, (2007)Enforcing Privacy in Web Applications., and . PST, (2005)Deformation Techniques for Sparse Systems., , , and . Found. Comput. Math., 9 (1): 1-50 (2009)WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace., , , , and . CoRR, (2020)The impact of predicting attacker tools in security risk assessments., and . CSIIRW, page 75. ACM, (2010)On the Time-Space Complexity of Geometric Elimination Procedures., , and . Appl. Algebra Eng. Commun. Comput., 11 (4): 239-296 (2001)