Author of the publication

The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms.

, , and . WOOT, USENIX Association, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial equation solving by lifting procedures for ramified fibers., , , and . Theor. Comput. Sci., 315 (2-3): 335-369 (2004)OpTERA - Optimization and Real Equation Solving., , , , , , and . German-Argentinian Workshop on Information Technology, page 69-72. (1999)The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms., , and . WOOT, USENIX Association, (2007)The impact of predicting attacker tools in security risk assessments., and . CSIIRW, page 75. ACM, (2010)Enforcing Privacy in Web Applications., and . PST, (2005)WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace., , , , and . CoRR, (2020)Inverting bijective polynomial maps over finite fields., , and . ITW, page 27-31. IEEE, (2006)Deformation Techniques for Efficient Polynomial Equation Solving., , , , and . J. Complex., 16 (1): 70-109 (2000)Fair and Decentralized Exchange of Digital Goods., , , , and . CoRR, (2020)Foundations and applications for secure triggers., , , and . ACM Trans. Inf. Syst. Secur., 9 (1): 94-112 (2006)