Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)Oblivious Query Processing., and . CoRR, (2013)Raising Authorization Awareness in a DBMS., , and . CIDR, www.cidrdb.org, (2015)SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database., , , , , , and . SIGMOD Conference, page 2437-2449. ACM, (2021)Data generation using declarative constraints., , and . SIGMOD Conference, page 685-696. ACM, (2011)Azure SQL Database Always Encrypted., , , , , , , , , and 6 other author(s). SIGMOD Conference, page 1511-1525. ACM, (2020)A grammar-based entity representation framework for data cleaning., and . SIGMOD Conference, page 233-244. ACM, (2009)Querying encrypted data., , , and . ICDE, page 1262-1263. IEEE Computer Society, (2013)Recursive XML Schemas, Recursive XML Queries, and Relational Storage: XML-to-SQL Query Translation., , , and . ICDE, page 42-53. IEEE Computer Society, (2004)Synopses for Query Optimization: A Space-Complexity Perspective., , and . PODS, page 201-209. ACM, (2004)