Martin Beck

According to our database1, Martin Beck authored at least 34 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

2018
Secure and efficient comparisons between untrusted parties.
PhD thesis, 2018

Machine Learning in Official Statistics.
CoRR, 2018

On Privacy Notion in Anonymous Communication.
CoRR, 2018

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version).
CoRR, 2018

2017
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017

Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017

Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken.
AStA Wirtschafts- und Sozialstatistisches Archiv, 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

2016
VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Inference Control for Privacy-Preserving Genome Matching.
CoRR, 2014

Enhanced TKIP Michael Attacks.
CoRR, 2014

Privacy-Preserving Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

GeneCloud: Secure Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

2013
Building simulation approaches for the training of automated data analysis tools in building energy management.
Advanced Engineering Informatics, 2013

Forensic identification of GSM mobile phones.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity
CoRR, 2012

A Visual Analysis Approach to Support Perfective Software Maintenance.
Proceedings of the 16th International Conference on Information Visualisation, 2012

Privacy-preserving data mining demonstrator.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012

2011
Template-free detection of macromolecular complexes in cryo electron tomograms.
Bioinformatics [ISMB/ECCB], 2011

A visual analysis and design tool for planning software reengineerings.
Proceedings of the 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2011

Do-Not-Track Techniques for Browsers and Their Implications for Consumers.
Proceedings of the Privacy and Identity Management for Life, 2011

EWMA based approaches for automated building energy analysis.
Proceedings of the 2011 IEEE International Symposium on Signal Processing and Information Technology, 2011

2010
Towards automated analysis and visualization of distributed software systems.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

2009
Practical attacks against WEP and WPA.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Debugging into Examples.
Proceedings of the Testing of Software and Communication Systems, 2009

NXTalk: dynamic object-oriented programming in a constrained environment.
Proceedings of the International Workshop on Smalltalk Technologies, 2009

2008
Practical attacks against WEP and WPA.
IACR Cryptology ePrint Archive, 2008

2006
An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

1998
Architecture-dependent partitioning of dependence graphs.
PDP, 1998


  Loading...