Author of the publication

SoK: Cryptographically Protected Database Search.

, , , , , , , , and . IEEE Symposium on Security and Privacy, page 172-191. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural processing of targets in visible, multispectral IR and SAR imagery., , , , , , , and . Neural Networks, 8 (7-8): 1029-1051 (1995)CoCoT: Collaborative Contact Tracing., , and . CODASPY, page 175-186. ACM, (2024)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , and . CSF, page 412-427. IEEE, (2022)The Real Cost of Software Errors., and . IEEE Secur. Priv., 7 (2): 87-90 (2009)Robust keys from physical unclonable functions., , , and . HOST, page 88-92. IEEE Computer Society, (2014)Detection of injected, dynamically generated, and obfuscated malicious code., , , and . WORM, page 76-82. ACM Press, (2003)Catching MPC Cheaters: Identification and Openability., , and . IACR Cryptol. ePrint Arch., (2016)IEEE SecDev 2016: Prioritizing Secure Development., , , , and . IEEE Secur. Priv., 14 (4): 82-84 (2016)Computing on masked data: a high performance method for improving big data veracity., , , , , , and . HPEC, page 1-6. IEEE, (2014)Improving Intrusion Detection Performance using Keyword Selection and Neural Networks., and . Recent Advances in Intrusion Detection, (1999)