Author of the publication

PRISM - Privacy-Preserving Search in MapReduce.

, , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 180-200. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BaPu: Efficient and Practical Bunching of Access Point Uplinks., , , and . NETYS, volume 9466 of Lecture Notes in Computer Science, page 337-353. Springer, (2015)TRESOR-HUNT: attacking CPU-bound encryption., and . ACSAC, page 71-78. ACM, (2012)Secure logging with crash tolerance., and . CNS, page 1-10. IEEE, (2017)Practical Over-Threshold Multi-Party Private Set Intersection., , , , , , , , , and . ACSAC, page 772-783. ACM, (2020)EPiC: Efficient Privacy-Preserving Counting for MapReduce., , and . NETYS, volume 9466 of Lecture Notes in Computer Science, page 426-443. Springer, (2015)Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection., , and . NDSS, The Internet Society, (2023)Mixed-Technique Multi-Party Computations Composed of Two-Party Computations., and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 295-319. Springer, (2022)Multi-client Oblivious RAM Secure Against Malicious Servers., , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 686-707. Springer, (2017)Sichere Netzwerkkommunikation: Grundlagen, Protokolle und Architekturen, , , , , , and . X.systems.press Springer-Verlag Berlin Heidelberg, Berlin, Heidelberg, (2005)Verfasserangabe: by Roland Bless, Stefan Mink, Michael Conrad, Kendy Kutzner, Erik-Oliver Blaß, Hans-Joachim Hof, Marcus Schöller ; Online-Ressource Kann nicht per Fernleihe bestellt werden! ; Quelldatenbank: FHBK-x.New Directions in RFID Security., and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 76-84. Springer, (2009)