Author of the publication

TASTY: tool for automating secure two-party computations.

, , , , and . ACM Conference on Computer and Communications Security, page 451-462. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit., , , and . Datenschutz und Datensicherheit, 31 (5): 338-342 (2007)Mobile Platform Security, , , , , , and . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2013)Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions., , , , and . Towards Hardware-Intrinsic Security, Springer, (2010)Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization., , , , , and . IEEE Symposium on Security and Privacy, page 574-588. IEEE Computer Society, (2013)Private Auctions with Multiple Rounds and Multiple Items., , and . DEXA Workshops, page 423-427. IEEE Computer Society, (2002)A Security Architecture for Accessing Health Records on Mobile Phones., , , , and . HEALTHINF, page 87-96. SciTePress, (2011)Guest Editorial Special Section on Hardware Security and Trust., , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 873-874 (2015)Readactor: Practical Code Randomization Resilient to Memory Disclosure., , , , , , , and . IEEE Symposium on Security and Privacy, page 763-780. IEEE Computer Society, (2015)CryptoML: Secure outsourcing of big data machine learning applications., , and . HOST, page 149-154. IEEE Computer Society, (2016)The Cybersecurity Landscape in Industrial Control Systems., , , , , , and . Proceedings of the IEEE, 104 (5): 1039-1057 (2016)