Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Architecture for Computational Grids, , , and . Proceedings of 5th ACM Conference Computer and Communications Security, page 83--92. (1998)Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?, , , and . Computer, 48 (2): 58-66 (2015)Chains and Whips - An approach to lighweight MACs., , , , and . Krypto-Tag, Gesellschaft für Informatik e.V. / FG KRYPTO, (2018)Balancing Security and Privacy in Genomic Range Queries., , and . ACM Trans. Priv. Secur., 26 (3): 23:1-23:28 (August 2023)Genomic Security (Lest We Forget)., , and . IEEE Secur. Priv., 15 (5): 38-46 (2017)(If) Size Matters: Size-Hiding Private Set Intersection., , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 156-173. Springer, (2011)On the TOCTOU Problem in Remote Attestation., , , and . CoRR, (2020)Fast and Private Computation of Set Intersection Cardinality., , and . IACR Cryptology ePrint Archive, (2011)Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes., , and . IACR Cryptology ePrint Archive, (2005)Loud and Clear: Human-Verifiable Authentication Based on Audio., , , , and . IACR Cryptology ePrint Archive, (2005)