Martin Beck

According to our database1, Martin Beck authored at least 26 papers between 1998 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

On Privacy Notions in Anonymous Communication.
PoPETs, 2019

Secure and efficient comparisons between untrusted parties.
PhD thesis, 2018

Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken.
AStA Wirtschafts- und Sozialstatistisches Archiv, 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Privacy-Preserving Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

GeneCloud: Secure Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

Building simulation approaches for the training of automated data analysis tools in building energy management.
Advanced Engineering Informatics, 2013

Forensic identification of GSM mobile phones.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

A Visual Analysis Approach to Support Perfective Software Maintenance.
Proceedings of the 16th International Conference on Information Visualisation, 2012

Privacy-preserving data mining demonstrator.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012

Template-free detection of macromolecular complexes in cryo electron tomograms.
Bioinformatics [ISMB/ECCB], 2011

A visual analysis and design tool for planning software reengineerings.
Proceedings of the 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2011

Do-Not-Track Techniques for Browsers and Their Implications for Consumers.
Proceedings of the Privacy and Identity Management for Life, 2011

EWMA based approaches for automated building energy analysis.
Proceedings of the 2011 IEEE International Symposium on Signal Processing and Information Technology, 2011

Towards automated analysis and visualization of distributed software systems.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

Practical attacks against WEP and WPA.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Debugging into Examples.
Proceedings of the Testing of Software and Communication Systems, 2009

NXTalk: dynamic object-oriented programming in a constrained environment.
Proceedings of the International Workshop on Smalltalk Technologies, 2009

Practical attacks against WEP and WPA.
IACR Cryptology ePrint Archive, 2008

An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

Architecture-dependent partitioning of dependence graphs.
Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing, 1998