TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 6.

Octeau, Damien and McDaniel, Patrick and Jha, Somesh and Bartel, Alexandre and Bodden, Eric and Klein, Jacques and Le Traon, Yves (2013):
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
In: Proceedings of the 22nd USENIX Conference on Security, Berkeley, Calif, USENIX Association, pp. 543-558, [Book Section]

Franz, M. and Deiseroth, B. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, S. and Schröder, H. (2013):
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
In: Information Security Technical Report, pp. 117-128, 17, (3), [Article]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computations on Real-Valued Signals.
In: IEEE Workshop on Information Forensics and Security (WIFS'10), IEEE Press, [Conference or Workshop Item]

Jha, Somesh and Katzenbeisser, S. and Schallhart, C. and Veith, H. and Chenney, S. (2010):
Semantic Integrity in Large-Scale Online Simulations.
In: ACM Transactions on Internet Technology, 10, (1), [Article]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Secure Computation on Non-Integer Values.
In: 2010 IEEE International Workshop on Information Forensics and Security (WIFS-2010), IEEE Press, ISBN 978-1-4244-9078-3,
[Conference or Workshop Item]

Deiseroth, B. and Franz, M. and Hamacher, Kay and Jha, Somesh and Katzenbeisser, Stefan and Schröder, Heike (2010):
Towards Secure Bioinformatics Services.
In: Financial Cryptography and Data Security (FC2011), [Conference or Workshop Item]

This list was generated on Tue Jun 18 01:20:11 2019 CEST.