Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database using Enclaves., , and . CoRR, (2020)Efficient Oblivious Database Joins., , and . CoRR, (2020)SFour: A Protocol for Cryptographically Secure Record Linkage at Scale., and . ICDE, page 277-288. IEEE, (2020)Secure Sublinear Time Differentially Private Median Computation., and . NDSS, The Internet Society, (2020)Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection., , and . NDSS, The Internet Society, (2023)Investigating Membership Inference Attacks under Data Dependencies., , , , , , and . CSF, page 473-488. IEEE, (2023)The Limits of Word Level Differential Privacy., , and . NAACL-HLT (Findings), page 867-881. Association for Computational Linguistics, (2022)SAGMA: Secure Aggregation Grouped by Multiple Attributes., , and . SIGMOD Conference, page 587-601. ACM, (2020)PCOR: Private Contextual Outlier Release via Differentially Private Search., , and . SIGMOD Conference, page 1571-1583. ACM, (2021)Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data., , , , , , , and . Sicherheit, volume P-228 of LNI, page 115-125. GI, (2014)