Martin Beck
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [r1]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy-Preserving Data Analytics. Encyclopedia of Big Data Technologies 2019 - 2018
- [b1]Martin Beck:
Secure and efficient comparisons between untrusted parties. Dresden University of Technology, Germany 2018, pp. 1-213 - [i10]Kilian Becher, Martin Beck, Thorsten Strufe:
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version). CoRR abs/1810.04971 (2018) - [i9]Christiane Kuhn, Martin Beck, Stefan Schiffner, Eduard A. Jorswieck, Thorsten Strufe:
On Privacy Notion in Anonymous Communication. CoRR abs/1812.05638 (2018) - [i8]Martin Beck, Florian Dumpert, Jörg Feuerhake:
Machine Learning in Official Statistics. CoRR abs/1812.10422 (2018) - 2017
- [j3]Florian Dumpert, Martin Beck:
Einsatz von Machine-Learning-Verfahren in amtlichen Unternehmensstatistiken. AStA Wirtschafts- und Sozialstatistisches Archiv 11(2): 83-106 (2017) - [c17]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
PrivApprox: Privacy-Preserving Stream Analytics. USENIX Annual Technical Conference 2017: 659-672 - [i7]Do Le Quoc, Martin Beck, Pramod Bhatotia, Ruichuan Chen, Christof Fetzer, Thorsten Strufe:
Privacy Preserving Stream Analytics: The Marriage of Randomized Response and Approximate Computing. CoRR abs/1701.05403 (2017) - [i6]Alexander Senier, Martin Beck, Thorsten Strufe:
PrettyCat: Adaptive guarantee-controlled software partitioning of security protocols. CoRR abs/1706.04759 (2017) - 2016
- [c16]Stefanie Roos, Martin Beck, Thorsten Strufe:
Anonymous addresses for efficient and resilient routing in F2F overlays. INFOCOM 2016: 1-9 - [i5]Stefanie Roos, Martin Beck, Thorsten Strufe:
VOUTE-Virtual Overlays Using Tree Embeddings. CoRR abs/1601.06119 (2016) - 2015
- [c15]Martin Beck:
Randomized decryption (RD) mode of operation for homomorphic cryptography - increasing encryption, communication and storage efficiency. INFOCOM Workshops 2015: 220-226 - [c14]Josef Spillner, Martin Beck, Alexander Schill, Thomas Michael Bohnert:
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments. UCC 2015: 261-270 - 2014
- [p2]Martin Beck, V. Joachim Haupt, Janine Roy, Jan Mönnich, René Jäkel, Michael Schroeder, Zerrin Isik:
GeneCloud: Secure Cloud Computing for Biomedical Research. Trusted Cloud Computing 2014: 3-14 - [p1]Martin Beck, V. Joachim Haupt, Janine Roy, Jan Mönnich, René Jäkel, Michael Schroeder, Zerrin Isik:
Privacy-Preserving Cloud Computing for Biomedical Research. Trusted Cloud Computing 2014: 259-282 - [i4]Florian Kerschbaum, Martin Beck, Dagmar Schönfeld:
Inference Control for Privacy-Preserving Genome Matching. CoRR abs/1405.0205 (2014) - [i3]
- 2013
- [j2]Pieter J. C. J. de Wilde, Carlos Martinez-Ortiz, Darren Pearson, Ian Beynon, Martin Beck, Nigel Barlow:
Building simulation approaches for the training of automated data analysis tools in building energy management. Advanced Engineering Informatics 27(4): 457-465 (2013) - [c13]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. BigData Congress 2013: 31-37 - [c12]Jakob Hasse, Thomas Gloe, Martin Beck:
Forensic identification of GSM mobile phones. IH&MMSec 2013: 131-140 - 2012
- [c11]
- [c10]Jonas Trümper, Martin Beck, Jürgen Döllner:
A Visual Analysis Approach to Support Perfective Software Maintenance. IV 2012: 308-315 - [i2]Martin Beck, Florian Kerschbaum:
Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity. CoRR abs/1209.5208 (2012) - 2011
- [j1]Min Xu, Martin Beck, Frank Alber:
Template-free detection of macromolecular complexes in cryo electron tomograms. Bioinformatics [ISMB/ECCB] 27(13): 69-76 (2011) - [c9]Carlos Martinez-Ortiz, Martin Beck, Pieter J. C. J. de Wilde:
EWMA based approaches for automated building energy analysis. ISSPIT 2011: 562-566 - [c8]Martin Beck, Michael Marhöfer:
Do-Not-Track Techniques for Browsers and Their Implications for Consumers. PrimeLife 2011: 187-196 - [c7]Martin Beck, Jonas Trümper, Jürgen Döllner:
A visual analysis and design tool for planning software reengineerings. VISSOFT 2011: 1-8 - 2010
- [c6]Martin Beck, Jürgen Döllner:
Towards automated analysis and visualization of distributed software systems. SOFTVIS 2010: 213-214
2000 – 2009
- 2009
- [c5]Martin Beck, Michael Haupt, Robert Hirschfeld:
NXTalk: dynamic object-oriented programming in a constrained environment. IWST 2009: 38-49 - [c4]Bastian Steinert, Michael Perscheid, Martin Beck, Jens Lincke, Robert Hirschfeld:
Debugging into Examples. TestCom/FATES 2009: 235-240 - [c3]
- 2008
- [i1]Martin Beck, Erik Tews:
Practical attacks against WEP and WPA. IACR Cryptology ePrint Archive 2008: 472 (2008) - 2006
- [c2]Valerij Tchernykh, Martin Beck, Klaus Janschek:
An Embedded Optical Flow Processor for Visual Navigation using Optical Correlator Technology. IROS 2006: 67-72
1990 – 1999
- 1998
- [c1]Martin Beck, Eberhard Zehendner, Theo Ungerer:
Architecture-dependent partitioning of dependence graphs. PDP 1998: 70-76
Coauthor Index
last updated on 2019-02-16 23:25 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint