Author of the publication

Implementing a Linear Algebra Approach to Data Processing.

, , , and . GTTSE, volume 10223 of Lecture Notes in Computer Science, page 215-222. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

d'Artagnan: A Trusted NoSQL Database on Untrusted Clouds., , , and . SRDS, page 61-70. IEEE, (2019)SafeRegions: Performance Evaluation of Multi-party Protocols on HBase., , , and . SRDS Workshop, page 31-36. IEEE Computer Society, (2016)General-Purpose Secure Conflict-free Replicated Data Types., , , and . CSF, page 521-536. IEEE, (2023)Trade-offs between privacy and efficiency on databases. University of Porto, Portugal, (2021)SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all., , , , , , , and . SYSTOR, page 9:1-9:12. ACM, (2017)Performance trade-offs on a secure multi-party relational database., , , , , and . SAC, page 456-461. ACM, (2017)A Practical Framework for Privacy-Preserving NoSQL Databases., , , , , , and . SRDS, page 11-20. IEEE Computer Society, (2017)CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes., , , and . SRDS, page 176-186. IEEE, (2021)On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics., , , , and . DAIS, volume 12135 of Lecture Notes in Computer Science, page 3-20. Springer, (2020)Implementing a Linear Algebra Approach to Data Processing., , , and . GTTSE, volume 10223 of Lecture Notes in Computer Science, page 215-222. Springer, (2015)