TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 5.

Deiseroth, B. ; Fehr, Victoria ; Fischlin, Marc ; Maasz, M. ; Reimers, Nils ; Stein, R. (2013):
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, 7954, pp. 53-68. [Article]

Franz, M. ; Deiseroth, B. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, S. ; Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128. [Article]

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10),
IEEE Press, [Conference or Workshop Item]

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Secure Computation on Non-Integer Values.
In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010), pp. 1-6,
IEEE Press, ISBN 978-1-4244-9078-3,
[Conference or Workshop Item]

Deiseroth, B. ; Franz, M. ; Hamacher, Kay ; Jha, Somesh ; Katzenbeisser, Stefan ; Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011),
[Conference or Workshop Item]

This list was generated on Tue May 17 03:13:18 2022 CEST.