| Publication | Date of Publication | Type |
|---|
| Distributed protocols for oblivious transfer and polynomial evaluation | 2024-10-23 | Paper |
| Privacy preserving solution of DCOPs by mediation | 2023-06-27 | Paper |
| PC-SyncBB: a privacy preserving collusion secure DCOP algorithm | 2021-11-02 | Paper |
| Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs | 2019-08-28 | Paper |
| Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants | 2017-10-24 | Paper |
| Privacy by diversity in sequential releases of databases | 2017-05-16 | Paper |
| Constrained obfuscation of relational databases | 2017-02-07 | Paper |
| P-SyncBB: A Privacy Preserving Branch and Bound DCOP Algorithm | 2017-01-11 | Paper |
| Addendum to ``Finding all maximally-matchable edges in a bipartite graph | 2013-12-17 | Paper |
| Oblivious evaluation of multivariate polynomials | 2013-09-04 | Paper |
| A practical approximation algorithm for optimal \(k\)-anonymity | 2013-03-28 | Paper |
| Limiting disclosure of sensitive data in sequential releases of databases | 2012-10-17 | Paper |
| Finding all maximally-matchable edges in a bipartite graph | 2012-05-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3003675 | 2011-05-30 | Paper |
| Generalized oblivious transfer by secret sharing | 2011-03-10 | Paper |
| On proper secrets, \((t,k)\)-bases and linear codes | 2009-10-14 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Multipartite secret sharing by bivariate interpolation | 2009-05-08 | Paper |
| Improved versions of Tardos' fingerprinting scheme | 2009-03-31 | Paper |
| Characterizing Ideal Weighted Threshold Secret Sharing | 2009-03-16 | Paper |
| k-Anonymization with Minimal Loss of Information | 2008-09-25 | Paper |
| Mathematical Foundations of Computer Science 2003 | 2007-12-07 | Paper |
| Multipartite Secret Sharing by Bivariate Interpolation | 2007-09-11 | Paper |
| Hierarchical threshold secret sharing | 2007-05-03 | Paper |
| Vector assignment schemes for asymmetric settings | 2006-05-26 | Paper |
| Low bandwidth dynamic traitor tracing schemes | 2006-02-08 | Paper |
| Optimal preemptive scheduling for general target functions | 2006-01-10 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Mathematical Foundations of Computer Science 2004 | 2005-08-22 | Paper |
| Approximation schemes for the min-max starting time problem | 2005-02-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4462498 | 2004-05-18 | Paper |
| Vector assignment problems: a general framework | 2004-03-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4411383 | 2003-07-08 | Paper |
| Dynamic traitor tracing | 2001-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941865 | 2000-08-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3836300 | 2000-01-04 | Paper |
| Homogenization of Two-Dimensional Linear Flows with Integral Invariance | 1998-02-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4370103 | 1998-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4344318 | 1997-11-25 | Paper |
| Uniqueness of piecewise smooth weak solutions of multidimensional degenerate parabolic equations | 1997-10-22 | Paper |
| Regularity of weak solutions of the nonlinear Fokker-Planck equation | 1997-04-29 | Paper |
| Convergence Rate of Approximate Solutions to Conservation Laws with Initial Rarefactions | 1995-05-29 | Paper |
| On the piecewise smoothness of entropy solutions to scalar conservation laws | 1995-03-01 | Paper |
| The Convergence Rate of Godunov Type Schemes | 1994-11-17 | Paper |