The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Thomas Schneider 0003" ( http://dblp.L3S.de/Authors/Thomas_Schneider_0003 )

URL (Homepage):  https://www.thomaschneider.de/  Author page on DBLP  Author page in RDF  Community of Thomas Schneider 0003 in ASPL-2

Publication years (Num. hits)
2008-2009 (21) 2010-2011 (16) 2012-2014 (18) 2015-2016 (17) 2017-2018 (28) 2019 (10)
Publication types (Num. hits)
article(45) book(1) incollection(1) inproceedings(63)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10 occurrences of 8 keywords

Results
Found 111 publication records. Showing 110 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ágnes Kiss, Masoud Naderpour, Jian Liu 0012, N. Asokan, Thomas Schneider 0003 SoK: Modular and Efficient Private Decision Tree Evaluation. Search on Bibsonomy PoPETs The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Oleksandr Tkachenko, Avishay Yanai Efficient Circuit-based PSI with Linear Communication. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Masaud Y. Alhassan, Daniel Günther 0004, Ágnes Kiss, Thomas Schneider 0003 Efficient and Scalable Universal Circuits. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Daniel Kales, Christian Rechberger, Thomas Schneider 0003, Matthias Senker, Christian Weinert Mobile Private Contact Discovery at Scale. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Daniel Günther 0004, Ágnes Kiss, Lukas Scheidel, Thomas Schneider 0003 Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Schneider 0003, Oleksandr Tkachenko EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. Search on Bibsonomy AsiaCCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Kales, Christian Rechberger, Thomas Schneider 0003, Matthias Senker, Christian Weinert Mobile Private Contact Discovery at Scale. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2019 DBLP  BibTeX  RDF
1Kimmo Järvinen 0001, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing. Search on Bibsonomy EuroS&P The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Oleksandr Tkachenko, Avishay Yanai Efficient Circuit-Based PSI with Linear Communication. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ágnes Kiss, Oliver Schick, Thomas Schneider 0003 Web Application for Privacy-preserving Scheduling using Secure Computation. Search on Bibsonomy ICETE (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Michael Zohner Scalable Private Set Intersection Based on OT Extension. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider 0003, Farinaz Koushanfar Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Christian Weinert, Udi Wieder Efficient Circuit-based PSI via Cuckoo Hashing. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Ágnes Kiss, Masoud Naderpour, Jian Liu 0012, N. Asokan, Thomas Schneider 0003 SoK: Modular and Efficient Private Decision Tree Evaluation. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Kimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang Faster Privacy-Preserving Location Proximity Schemes. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Shaza Zeitouni, Michael Zohner Pushing the Communication Barrier in Secure Computation using Lookup Tables. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider 0003, Farinaz Koushanfar Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oleksandr Tkachenko, Christian Weinert, Thomas Schneider 0003, Kay Hamacher Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. Search on Bibsonomy AsiaCCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser 0001, David Kretzmer, Thomas Schneider 0003 HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ferdinand Brasser, Tommaso Frassetto, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Christian Weinert VoiceGuard: Secure and Private Speech Processing. Search on Bibsonomy INTERSPEECH The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Philipp Richter, Helena Leppäkoski, Elena Simona Lohan, Zheng Yang, Kimmo Järvinen 0001, Oleksandr Tkachenko, Thomas Schneider 0003 Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting. Search on Bibsonomy ICL-GNSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Schneider 0003, Oleksandr Tkachenko Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases. Search on Bibsonomy WPES@CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Christian Weinert, Udi Wieder Efficient Circuit-Based PSI via Cuckoo Hashing. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang 0001 Faster Privacy-Preserving Location Proximity Schemes. Search on Bibsonomy CANS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider 0003, Gil Segev 0001, Scott Shenker, Michael Zohner Privacy-Preserving Interdomain Routing at Internet Scale. Search on Bibsonomy PoPETs The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ágnes Kiss, Jian Liu 0012, Thomas Schneider 0003, N. Asokan, Benny Pinkas Private Set Intersection for Unequal Set Sizes with Mobile Applications. Search on Bibsonomy PoPETs The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Farinaz Koushanfar Toward Practical Secure Stable Matching. Search on Bibsonomy PoPETs The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer Extensions. Search on Bibsonomy J. Cryptology The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider 0003, Farinaz Koushanfar Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Ágnes Kiss, Jian Liu 0012, Thomas Schneider 0003, N. Asokan, Benny Pinkas Private Set Intersection for Unequal Set Sizes with Mobile Applications. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Daniel Günther 0004, Ágnes Kiss, Thomas Schneider 0003 More Efficient Universal Circuit Constructions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider 0003, Gil Segev 0001, Scott Shenker, Michael Zohner Privacy-Preserving Interdomain Routing at Internet Scale. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Daniel Demmler, Marco Holz, Thomas Schneider 0003 OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. Search on Bibsonomy ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Shaza Zeitouni, Michael Zohner Pushing the Communication Barrier in Secure Computation using Lookup Tables. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Jesper Buus Nielsen, Thomas Schneider 0003, Roberto Trifiletti Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
1Daniel Günther 0004, Ágnes Kiss, Thomas Schneider 0003 More Efficient Universal Circuit Constructions. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, Thomas Schneider 0003 SIXPACK: Securing Internet eXchange Points Against Curious onlooKers. Search on Bibsonomy CoNEXT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Demmler, Kay Hamacher, Thomas Schneider 0003, Sebastian Stammler Privacy-Preserving Whole-Genome Variant Queries. Search on Bibsonomy CANS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer Extensions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Michael Zohner Scalable Private Set Intersection Based on OT Extension. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Jesper Buus Nielsen, Thomas Schneider 0003, Roberto Trifiletti Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Martin R. Albrecht, Christian Rechberger, Thomas Schneider 0003, Tyge Tiessen, Michael Zohner Ciphers for MPC and FHE. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Ágnes Kiss, Thomas Schneider 0003 Valiant's Universal Circuit is Practical. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Ágnes Kiss, Thomas Schneider 0003 Valiant's Universal Circuit is Practical. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, Thomas Schneider 0003 Towards Securing Internet eXchange Points Against Curious onlooKers. Search on Bibsonomy ANRW The full citation details ... 2016 DBLP  BibTeX  RDF
1Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider 0003, Ahmad-Reza Sadeghi, Farinaz Koushanfar GarbledCPU: a MIPS processor for secure computation in hardware. Search on Bibsonomy DAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Gil Segev 0001, Michael Zohner Phasing: Private Set Intersection using Permutation-based Hashing. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Shaza Zeitouni Automated Synthesis of Optimized Circuits for Secure Computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Gil Segev 0001, Michael Zohner Phasing: Private Set Intersection Using Permutation-based Hashing. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
1Daniel Demmler, Thomas Schneider 0003, Michael Zohner ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. Search on Bibsonomy NDSS The full citation details ... 2015 DBLP  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Christian Rechberger, Thomas Schneider 0003, Tyge Tiessen, Michael Zohner Ciphers for MPC and FHE. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider 0003, Steffen Schulz 0001, Maria Zhdanova Time to Rethink: Trust Brokerage Using Trusted Execution Environments. Search on Bibsonomy TRUST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Farinaz Koushanfar TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Michael Zohner Faster Private Set Intersection based on OT Extension. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Daniel Demmler, Thomas Schneider 0003, Michael Zohner Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer Automatic Protocol Selection in Secure Two-Party Computations. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Daniel Demmler, Amir Herzberg, Thomas Schneider 0003 RAID-PIR: Practical Multi-Server PIR. Search on Bibsonomy CCSW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer Automatic Protocol Selection in Secure Two-Party Computations. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Michael Zohner Faster Private Set Intersection Based on OT Extension. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
1Daniel Demmler, Thomas Schneider 0003, Michael Zohner Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2014 DBLP  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider 0003, Michael Zohner GSHADE: faster privacy-preserving distance computation and biometric identification. Search on Bibsonomy IH&MMSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Matthias Schneider 0002, Thomas Schneider 0003 Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT". Search on Bibsonomy IH&MMSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More Efficient Oblivious Transfer and Extensions for Faster Secure Computation. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Search on Bibsonomy Journal of Computer Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Thomas Schneider 0003 Faster secure two-party computation with less memory. Search on Bibsonomy AsiaCCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner More efficient oblivious transfer and extensions for faster secure computation. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thomas Schneider 0003, Michael Zohner GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. Search on Bibsonomy Financial Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Stanislaus Stelle CrowdShare: Secure Mobile Resource Sharing. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer Automatic Protocol Selection in Secure Two-Party Computations. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
1Thomas Schneider 0003 Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation. Search on Bibsonomy 2012   DOI  RDF
1Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider 0003 CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Search on Bibsonomy Financial Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Privacy-Preserving ECG Classification With Branching Programs and Neural Networks. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider 0003 CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2011 DBLP  BibTeX  RDF
1Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider 0003 AmazonIA: when elasticity snaps back. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version). Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Ivan Visconti Secure Set Intersection with Untrusted Hardware Tokens. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg TASTY: Tool for Automating Secure Two-partY computations. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003 A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). Search on Bibsonomy Towards Hardware-Intrinsic Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg TASTY: tool for automating secure two-party computations. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Embedded SFE: Offloading Server and Network Using Hardware Tokens. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel Winandy Token-Based Cloud Computing. Search on Bibsonomy TRUST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Thomas Schneider 0003 Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten. Search on Bibsonomy perspeGKtive The full citation details ... 2010 DBLP  BibTeX  RDF
1José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003 A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. Search on Bibsonomy ESORICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). Search on Bibsonomy CHES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg Efficient Privacy-Preserving Face Recognition. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Secure Evaluation of Private Linear Branching Programs with Medical Applications. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Benny Pinkas, Thomas Schneider 0003, Nigel P. Smart, Stephen C. Williams Secure Two-Party Computation is Practical. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Practical Secure Evaluation of Semi-Private Functions. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Kimmo Järvinen 0001, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Embedded SFE: Offloading Server and Network using Hardware Tokens. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Joe-Kai Tsay Bringing Zero-Knowledge Proofs of Knowledge to Practice. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Automatic Generation of Sigma-Protocols. Search on Bibsonomy EuroPKI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Vladimir Kolesnikov Efficient privacy-preserving classification of ECG signals. Search on Bibsonomy WIFS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Joe-Kai Tsay Bringing Zero-Knowledge Proofs of Knowledge to Practice. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Practical Secure Evaluation of Semi-private Functions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology
Displaying result #1 - #100 of 110 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license