Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information-Theoretically Secure and Highly Efficient Search and Row Retrieval., , , , , and . Proc. VLDB Endow., 16 (10): 2391-2403 (2023)Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems., , , and . Proc. VLDB Endow., 13 (11): 2424-2437 (2020)Veil: A Storage and Communication Efficient Volume-Hiding Algorithm., , , , and . Proc. ACM Manag. Data, 1 (4): 265:1-265:27 (December 2023)SCARF: a scalable data management framework for context-aware applications in smart environments., , , and . MobiQuitous, page 358-367. ACM, (2019)A privacy-enabled platform for COVID-19 applications: poster abstract., , , , , , , , , and 5 other author(s). SenSys, page 745-746. ACM, (2020)Query-Driven Approach to Face Clustering and Tagging., , , , and . IEEE Trans. Image Process., 25 (10): 4504-4513 (2016)Building a Mobile Applications Knowledge Base for the Linked Data Cloud., , , , , and . MoDeST@ISWC, volume 1506 of CEUR Workshop Proceedings, page 14-25. CEUR-WS.org, (2015)SURCH: Distributed Aggregation over Wireless Sensor Networks., , and . IDEAS, page 158-165. IEEE Computer Society, (2006)Mobipedia: Mobile Applications Linked Data., , , , , and . ISWC (Posters & Demos), volume 1486 of CEUR Workshop Proceedings, CEUR-WS.org, (2015)Search over Encrypted Data., , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)