Author of the publication

Geheimnisträger - Vertrauliche Datenverarbeitung mit homomorpher Kryptografie

. iX Magazin für professionelle Informationstechnik, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Die Agenturen im recht der Europäischen Union - Segen oder Fluch?. Europa im Wandel, Heymanns, Köln, (2008)B71-4 Mathematical Programming in Practice.. IEEE Trans. Computers, 20 (10): 1222 (1971)The Explorer System, , , , , , and . Cognitive Systems, Springer, (2010)Das Risiko im öffentlichen Recht, and . Zeitschrift für öffentliches Recht und Verwaltungswissenschaft, (2003)Continual planning for cross-modal situated clarification in human-robot interaction., , and . RO-MAN, page 592-597. IEEE, (2008)Situation-Aware Interpretation, Planning and Execution of User Commands by Autonomous Robots.. RO-MAN, page 540-545. IEEE, (2007)Multiagent Planning with Partially Ordered Temporal Plans.. IJCAI, page 1513-1514. Morgan Kaufmann, (2003)Secret Program Execution in the Cloud applying Homomorphic Encryption, , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography., and . ACM Conference on Computer and Communications Security, page 2183-2184. ACM, (2018)Poster: Caching Oblivious Memory Access - An Extension to the HCRYPT Virtual Machine, and . Proceedings of the 20th ACM Conference on Computer and Communications Security (ACM CCS 2013), ACM, Sheridan, (November 2013)