Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution., and . CBMS, page 799-804. IEEE Computer Society, (2017)Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution with SGX, and . (2017)Secure database outsourcing to the cloud. Karlsruhe University, Germany, (2018)base-search.net (ftubkarlsruhe:oai:EVASTAR-Karlsruhe.de:1000084472).Security in a Distributed Key Management Approach., , , , and . CBMS, page 816-821. IEEE Computer Society, (2017)A Distributed Key Management Approach, , , , and . Proceedings of the 2nd International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'16), (December 2016)A Database Adapter for Secure Outsourcing., , , and . CloudCom, page 503-508. IEEE Computer Society, (2016)Security in a Distributed Key Management Approach, , , , and . (2017)