Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial equation solving by lifting procedures for ramified fibers., , , and . Theor. Comput. Sci., 315 (2-3): 335-369 (2004)OpTERA - Optimization and Real Equation Solving., , , , , , and . German-Argentinian Workshop on Information Technology, page 69-72. (1999)The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms., , and . WOOT, USENIX Association, (2007)The impact of predicting attacker tools in security risk assessments., and . CSIIRW, page 75. ACM, (2010)Enforcing Privacy in Web Applications., and . PST, (2005)WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace., , , , and . CoRR, (2020)Foundations and applications for secure triggers., , , and . ACM Trans. Inf. Syst. Secur., 9 (1): 94-112 (2006)Fair and Decentralized Exchange of Digital Goods., , , , and . CoRR, (2020)Deformation Techniques for Efficient Polynomial Equation Solving., , , , and . J. Complex., 16 (1): 70-109 (2000)Inverting bijective polynomial maps over finite fields., , and . ITW, page 27-31. IEEE, (2006)