Tomas Sander

According to our database1, Tomas Sander authored at least 32 papers between 1997 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Private Set Projections & Variants.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
Private Projections & Variants.
IACR Cryptol. ePrint Arch., 2016

WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

UX Aspects of Threat Information Sharing Platforms: An Examination & Lessons Learned Using Personas.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative Security.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2011
Ontology Enrichment Based on the Mapping of Knowledge Resources for Data Privacy Management.
Proceedings of Joint IV Seminar on Ontology Research in Brazil and VI International Workshop on Metamodels, 2011

2010
A Mechanism for Policy-Driven Selection of Service Providers in SOA and Cloud Environments.
Proceedings of the NOTERE 2010, Annual International Conference on New Technologies of Distributed Systems, Touzeur, Tunisia, May 31, 2010

Representation and Inference of Privacy Risks Using Semantic Web Technologies.
Proceedings of the EKAW2010 Poster and Demo Track, Lisbon, Portugal, October 11 - 15, 2010, 2010

2009
Semantic Web and Knowledge Management in User Data Privacy.
RITA, 2009

Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Privacy Management for Global Organizations.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Scalable, accountable privacy management for large organizations.
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

2008
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2003
If Piracy Is the Problem, Is DRM the Answer?
Proceedings of the Digital Rights Management, 2003

2002
Securing passwords against dictionary attacks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Escrow services and incentives in peer-to-peer networks.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Golden Times for Digital Rights Management?
Proceedings of the Financial Cryptography, 2001

Privacy Engineering for Digital Rights Management Systems.
Proceedings of the Security and Privacy in Digital Rights Management, 2001

2000
Blind, Auditable Membership Proofs.
Proceedings of the Financial Cryptography, 2000

Deniable payments and electronic campaign finance.
Proceedings of the Tenth Conference on Computers, 2000

Commital Deniable Proofs and Electronic Campaign Finance.
Proceedings of the Advances in Cryptology, 2000

1999
On Anonymous Electronic Cash and Crime.
Proceedings of the Information Security, Second International Workshop, 1999

Efficient Accumulators without Trapdoor Extended Abstracts.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Non-Interactive CryptoComputing For NC<sup>1</sup>.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems.
Proceedings of the Financial Cryptography, 1999

Auditable, Anonymous Electronic Cash Extended Abstract.
Proceedings of the Advances in Cryptology, 1999

1998
Towards Mobile Cryptography.
Proceedings of the Security and Privacy, 1998

Protecting Mobile Agents Against Malicious Hosts.
Proceedings of the Mobile Agents and Security, 1998

Protecting mobile code.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

On Software Protection via Function Hiding.
Proceedings of the Information Hiding, 1998

1997
Deciding Properties of Polynomials Without Factoring.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997


  Loading...