Author of the publication

Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.

, , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 185-201. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast submatch extraction using OBDDs., , , , and . ANCS, page 163-174. ACM, (2012)Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases., , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 185-201. Springer, (2009)Fast exact and heuristic methods for role minimization problems., , , , , and . SACMAT, page 1-10. ACM, (2008)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)Situational awareness through reasoning on network incidents., , , and . CODASPY, page 111-122. ACM, (2014)ReasONets: a fuzzy-based approach for reasoning on network incidents., , , and . CCS, page 1010-1012. ACM, (2012)On Computing Enterprise IT Risk Metrics., , and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 271-280. Springer, (2011)Efficient Transparent Redactable Signatures with a Single Signature Invocation., , and . IACR Cryptol. ePrint Arch., (2016)Collecting, Analyzing and Responding to Enterprise Scale DNS Events.. CODASPY, page 73. ACM, (2015)Efficient Submatch Extraction for Practical Regular Expressions., , , , and . LATA, volume 7810 of Lecture Notes in Computer Science, page 323-334. Springer, (2013)