Author of the publication

Clause-iteration with MapReduce to scalably query datagraphs in the SHARD graph-store.

, and . DICT@HPDC, page 35-44. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An FPGA co-processor implementation of Homomorphic Encryption., , , and . HPEC, page 1-6. IEEE, (2014)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IACR Cryptology ePrint Archive, (2018)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)Securely Sharing Encrypted Medical Information., , , and . CHASE, page 330-331. IEEE Computer Society, (2016)Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (2): 941-956 (2021)A Survey of Security Concepts for Common Operating Environments., , , and . ISORC Workshops, page 244-253. IEEE Computer Society, (2011)SHARD. (2010)Homomorphic Encryption for Privacy-Preserving Genome Sequences Search., , and . SMARTCOMP, page 7-12. IEEE, (2019)The detection of RCS worm epidemics., and . WORM, page 81-86. ACM Press, (2005)