![]() | Ebene hoch |
Deiseroth, B. ; Fehr, Victoria ; Fischlin, Marc ; Maasz, M. ; Reimers, Nils ; Stein, R.
:
Computing on Authenticated Data for Adjustable Predicates.
In:
Lecture Notes in Computer Science, 7954
S. 53-68.
[Artikel]
, (2013)
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H.
:
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In:
Information Security Technical Report, 17
(3)
S. 117-128.
[Artikel]
, (2013)
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike
:
Secure Computations on Real-Valued Signals.
IEEE Workshop on Information Forensics and Security (WIFS'10)
IEEE Press
[
Konferenzveröffentlichung]
, (2010)
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike
:
Secure Computation on Non-Integer Values.
2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010)
IEEE Press
[
Konferenzveröffentlichung]
, (2010)
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike
:
Towards Secure Bioinformatics Services.
Financial Cryptography and Data Security (FC2011)
[
Konferenzveröffentlichung]
, (2010)