Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UN Handbook on Privacy-Preserving Computation Techniques., , , , , , , , , and 3 other author(s). CoRR, (2023)A Conceptual Model and Predicate Language for Data Selection and Projection Based on Provenance., and . TaPP, USENIX Association, (2010)Superimposed Information Architecture for Digital Libraries., , , , , , , , , and 2 other author(s). ECDL, volume 5173 of Lecture Notes in Computer Science, page 88-99. Springer, (2008)RACK: A Semantic Model and Triplestore for Curation of Assurance Case Evidence., , , , , , , , and . SAFECOMP Workshops, volume 14182 of Lecture Notes in Computer Science, page 149-160. Springer, (2023)Detecting Cyberattack Entities from Audit Data via Multi-View Anomaly Detection with Feedback., , , , , and . AAAI Workshops, volume WS-18 of AAAI Technical Report, page 277-284. AAAI Press, (2018)Computing with Data Privacy: Steps toward Realization., and . IEEE Secur. Priv., 13 (1): 22-29 (2015)Maturity and Performance of Programmable Secure Computation., , , and . IEEE Secur. Priv., 14 (5): 48-56 (2016)Ensemble PDP-8: eight principles for distributed portals., , , , , , , , , and 4 other author(s). JCDL, page 341-344. ACM, (2010)RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications., , , , , , and . WAHC@CCS, page 57-68. ACM, (2019)From Keys to Databases - Real-World Applications of Secure Multi-Party Computation., , , , , , , and . Comput. J., 61 (12): 1749-1771 (2018)