Martin Beck

According to our database1, Martin Beck authored at least 25 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

2018
Secure and efficient comparisons between untrusted parties.
PhD thesis, 2018

2017
Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken.
AStA Wirtschafts- und Sozialstatistisches Archiv, 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

2016
Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Privacy-Preserving Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

GeneCloud: Secure Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

2013
Building simulation approaches for the training of automated data analysis tools in building energy management.
Advanced Engineering Informatics, 2013

Forensic identification of GSM mobile phones.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
A Visual Analysis Approach to Support Perfective Software Maintenance.
Proceedings of the 16th International Conference on Information Visualisation, 2012

Privacy-preserving data mining demonstrator.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012

2011
Template-free detection of macromolecular complexes in cryo electron tomograms.
Bioinformatics [ISMB/ECCB], 2011

A visual analysis and design tool for planning software reengineerings.
Proceedings of the 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2011

Do-Not-Track Techniques for Browsers and Their Implications for Consumers.
Proceedings of the Privacy and Identity Management for Life, 2011

EWMA based approaches for automated building energy analysis.
Proceedings of the 2011 IEEE International Symposium on Signal Processing and Information Technology, 2011

2010
Towards automated analysis and visualization of distributed software systems.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

2009
Practical attacks against WEP and WPA.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Debugging into Examples.
Proceedings of the Testing of Software and Communication Systems, 2009

NXTalk: dynamic object-oriented programming in a constrained environment.
Proceedings of the International Workshop on Smalltalk Technologies, 2009

2008
Practical attacks against WEP and WPA.
IACR Cryptology ePrint Archive, 2008

2006
An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

1998
Architecture-dependent partitioning of dependence graphs.
PDP, 1998


  Loading...