TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 5.

Deiseroth, B. and Fehr, Victoria and Fischlin, Marc and Maasz, M. and Reimers, Nils and Stein, R. (2013):
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, pp. 53-68, 7954, [Article]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10), IEEE Press, [Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computation on Non-Integer Values.
In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010), IEEE Press, ISBN 978-1-4244-9078-3,
[Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011), [Conference or Workshop Item]

This list was generated on Sat Oct 19 00:36:42 2019 CEST.