Axel Schröpfer

According to our database1, Axel Schröpfer authored at least 18 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient Public Verification of Confidential Supply-Chain Transactions.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2014
Automatic Protocol Selection in Secure Two-Party Computations.
IACR Cryptol. ePrint Arch., 2014

Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Privacy by Encrypted Databases.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Secure benchmarking in the cloud.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

An Encrypted In-Memory Column-Store: The Onion Selection Problem.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Optimal Re-encryption Strategy for Joins in Encrypted Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Adjustably encrypted in-memory column-store.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Laufzeitmodell und Protokollsprache zur Erhöhung der Einsatzfähigkeit Sicherer Zwei-Parteien-Berechnung.
PhD thesis, 2012

2011
Secure collaborative supply chain planning and inverse optimization - The JELS model.
Eur. J. Oper. Res., 2011

Secure Collaborative Supply-Chain Management.
Computer, 2011

Forecasting Run-Times of Secure Two-Party Computation.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Demo: secure computation in JavaScript.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
L1 - An Intermediate Language for Mixed-Protocol Secure Computation.
IACR Cryptol. ePrint Arch., 2010

2009
Optimizations for Risk-Aware Secure Supply Chain Master Planning.
J. Univers. Comput. Sci., 2009

Risk-Aware Secure Supply Chain Master Planning.
Proceedings of the Security in Information Systems, 2009

On the practical importance of communication complexity for secure multi-party computation protocols.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009


  Loading...