Author of the publication

Web Application for Privacy-preserving Scheduling using Secure Computation.

, , and . ICETE (2), page 456-463. SciTePress, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ein Wort ist kein Wort ist kein Wort: natürlich-sprachliche Systeme. Künstliche Intelligenz, page 117--129. Stuttgart, Hirzel, Wiss. Verl.-Ges., (1990)Ontologies and Data Management: A Brief Survey., and . Künstliche Intell., 34 (3): 329-353 (2020)Special Issue on Ontologies and Data Management: Part I., and . Künstliche Intell., 34 (3): 287-289 (2020)Target-based calibration of underwater camera housing parameters., , , , and . SSRR, page 201-206. IEEE, (2016)Faster Privacy-Preserving Location Proximity Schemes., , , , and . CANS, volume 11124 of Lecture Notes in Computer Science, page 3-22. Springer, (2018)Analysis of Non-Idealities in the Generation of Reconfigurable Sinc-Shaped Optical Nyquist Pulses., , , , and . IEEE Access, (2021)CryptoSPN: Expanding PPML beyond Neural Networks., , , , and . PPMLP@CCS, page 9-14. ACM, (2020)Secure and Private Function Evaluation with Intel SGX., , , and . CCSW, page 165-181. ACM, (2019)Experimental Comparison of Visual-Aided Odometry Methods for Rail Vehicles., , , , , , and . CoRR, (2019)Conservative Extensions in Horn Description Logics with Inverse Roles., , , and . J. Artif. Intell. Res., (2020)