Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oblivious Query Processing., and . CoRR, (2013)Engineering Security and Performance with Cipherbase., , , , , , , , and . IEEE Data Eng. Bull., 35 (4): 65-72 (2012)Synopses for Query Optimization: A Space-Complexity Perspective., , and . PODS, page 201-209. ACM, (2004)Raising Authorization Awareness in a DBMS., , and . CIDR, www.cidrdb.org, (2015)SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database., , , , , , and . SIGMOD Conference, page 2437-2449. ACM, (2021)A grammar-based entity representation framework for data cleaning., and . SIGMOD Conference, page 233-244. ACM, (2009)Azure SQL Database Always Encrypted., , , , , , , , , and 6 other author(s). SIGMOD Conference, page 1511-1525. ACM, (2020)Data generation using declarative constraints., , and . SIGMOD Conference, page 685-696. ACM, (2011)Recursive XML Schemas, Recursive XML Queries, and Relational Storage: XML-to-SQL Query Translation., , , and . ICDE, page 42-53. IEEE Computer Society, (2004)Querying encrypted data., , , and . ICDE, page 1262-1263. IEEE Computer Society, (2013)