Browse by Person
![]() | Up a level |
Deiseroth, B. ; Fehr, Victoria ; Fischlin, Marc ; Maasz, M. ; Reimers, Nils ; Stein, R. (2013):
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, 7954, pp. 53-68. [Article]
Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10),
IEEE Press, [Conference or Workshop Item]
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computation on Non-Integer Values.
In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010), pp. 1-6,
IEEE Press, ISBN 978-1-4244-9078-3,
[Conference or Workshop Item]
Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011),
[Conference or Workshop Item]