Personensuche
X
?
Proceedings of the 37th Annual Computer Security Applications Conference ,
6
TEEKAP: Self-Expiring Data Capsule using Trusted Execution ..:
, In:
?
Lecture Notes in Computer Science; Computer Security – ESORICS 2019 ,
7
Towards a Marketplace for Secure Outsourced Computations:
, In:
?
Proceedings of the 2019 International Conference on Management of Data ,
8
Towards Scaling Blockchain Systems via Sharding:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
9
Proofs of Data Residency : Checking whether Your Cloud F..:
, In:
?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ,
11
Evading Classifiers by Morphing in the Dark:
, In:
?
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security ,
12
Practical and Scalable Sharing of Encrypted Data in Cloud S..:
, In:
?
Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis ,
13