Martin Beck

Orcid: 0000-0002-7397-1321

According to our database1, Martin Beck authored at least 43 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Verbesserung der Datengrundlage der Mindestlohnforschung mittels maschineller Lernverfahren.
AStA Wirtschafts und Sozialstatistisches Arch., March, 2023

AtoMig: Automatically Migrating Millions Lines of Code from TSO to WMM.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2021
Covid notions: Towards formal definitions - and documented understanding - of privacy goals and claimed protection in proximity-tracing services.
Online Soc. Networks Media, 2021

DuMu<sup>x</sup> 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling.
Comput. Math. Appl., 2021

2020
Breaking and (Partially) Fixing Provably Secure Onion Routing.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Privacy-Preserving Data Analytics.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

On Privacy Notions in Anonymous Communication.
Proc. Priv. Enhancing Technol., 2019

PrivApprox: Privacy-Preserving Stream Analytics - (Extended Abstract).
Inform. Spektrum, 2019

DuMu<sup>x</sup> 3 - an open-source simulator for solving flow and transport problems in porous media with a focus on model coupling.
CoRR, 2019

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking.
Proceedings of the 2019 International Conference on Networked Systems, 2019

2018
Secure and efficient comparisons between untrusted parties.
PhD thesis, 2018

Machine Learning in Official Statistics.
CoRR, 2018

On Privacy Notion in Anonymous Communication.
CoRR, 2018

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version).
CoRR, 2018

2017
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols.
CoRR, 2017

Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing.
CoRR, 2017

Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken.
AStA Wirtschafts und Sozialstatistisches Arch., 2017

PrivApprox: Privacy-Preserving Stream Analytics.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

2016
VOUTE-Virtual Overlays Using Tree Embeddings.
CoRR, 2016

Anonymous addresses for efficient and resilient routing in F2F overlays.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Inference Control for Privacy-Preserving Genome Matching.
CoRR, 2014

Enhanced TKIP Michael Attacks.
CoRR, 2014

Privacy-Preserving Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

GeneCloud: Secure Cloud Computing for Biomedical Research.
Proceedings of the Trusted Cloud Computing, 2014

2013
Building simulation approaches for the training of automated data analysis tools in building energy management.
Adv. Eng. Informatics, 2013

Forensic identification of GSM mobile phones.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity.
Proceedings of the IEEE International Congress on Big Data, 2013

2012
A Visual Analysis Approach to Support Perfective Software Maintenance.
Proceedings of the 16th International Conference on Information Visualisation, 2012

Privacy-preserving data mining demonstrator.
Proceedings of the 16th International Conference on Intelligence in Next Generation Networks, 2012

2011
Template-free detection of macromolecular complexes in cryo electron tomograms.
Bioinform., 2011

A visual analysis and design tool for planning software reengineerings.
Proceedings of the 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2011

Do-Not-Track Techniques for Browsers and Their Implications for Consumers.
Proceedings of the Privacy and Identity Management for Life, 2011

EWMA based approaches for automated building energy analysis.
Proceedings of the 2011 IEEE International Symposium on Signal Processing and Information Technology, 2011

2010
Towards automated analysis and visualization of distributed software systems.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

2009
Debugging into Examples.
Proceedings of the Testing of Software and Communication Systems, 2009

NXTalk: dynamic object-oriented programming in a constrained environment.
Proceedings of the International Workshop on Smalltalk Technologies, 2009

2008
Practical attacks against WEP and WPA.
IACR Cryptol. ePrint Arch., 2008

2006
Cryo-electron tomography of biological specimens.
IEEE Signal Process. Mag., 2006

An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

1998
Architecture-dependent partitioning of dependence graphs.
Proceedings of the Sixth Euromicro Workshop on Parallel and Distributed Processing, 1998


  Loading...