TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 5.

Deiseroth, B. and Fehr, Victoria and Fischlin, Marc and Maasz, M. and Reimers, Nils and Stein, R. (2013):
Computing on Authenticated Data for Adjustable Predicates.
In: Lecture Notes in Computer Science, 7954pp. 53-68, [Article]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, 17 (3), pp. 117-128, [Article]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10), IEEE Press, [Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computation on Non-Integer Values.
In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010), IEEE Press, pp. 1-6, ISBN 978-1-4244-9078-3,
[Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011), [Conference or Workshop Item]

This list was generated on Sat May 30 02:27:47 2020 CEST.