Monte carlo and reconstruction membership inference attacks against generative models B Hilprecht, M Härterich, D Bernau Proceedings on Privacy Enhancing Technologies, 2019 | 190 | 2019 |
Murphy bases of generalized Temperley-Lieb algebras M Härterich Archiv der Mathematik 72, 337-345, 1999 | 48 | 1999 |
Encrypted in-memory column-store F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ... US Patent 9,213,764, 2015 | 44 | 2015 |
Providing Foundation Application as Enterprise Services T Biesemann, D Krisch, V Schott, M Meyringer, O von Geisau, ... US Patent App. 12/233,530, 2010 | 43 | 2010 |
Local versus remote optimization in encrypted query processing F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ... US Patent 10,162,858, 2018 | 41 | 2018 |
Searchable encryption for infrequent queries in adjustable encrypted databases F Kerschbaum, M Haerterich, I Hang, M Kohler, A Schaad, A Schroepfer, ... US Patent 9,342,707, 2016 | 34 | 2016 |
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. P Grofig, M Haerterich, I Hang, F Kerschbaum, M Kohler, A Schaad, ... Sicherheit 228, 115-125, 2014 | 32 | 2014 |
Explaining graph neural networks for vulnerability discovery T Ganz, M Härterich, A Warnecke, K Rieck Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021 | 26 | 2021 |
Average-complexity ideal-security order-preserving encryption F Kerschbaum, A Schroepfer, P Grofig, I Hang, M Haerterich, M Kohler, ... US Patent 9,037,860, 2015 | 25 | 2015 |
Kazhdan-Lusztig-Basen, unzerlegbare Bimoduln und die Topologie der Fahnenmannigfaltigkeit einer Kac-Moody-Gruppe M Härterich Freiburg (Breisgau), Univ., Diss., 1999, 1999 | 24 | 1999 |
Optimal re-encryption strategy for joins in encrypted databases F Kerschbaum, M Härterich, P Grofig, M Kohler, A Schaad, A Schröpfer, ... Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 22 | 2013 |
Access control for encrypted query processing I Hang, F Kerschbaum, M Haerterich, M Kohler, A Schaad, A Schroepfer, ... US Patent 9,547,720, 2017 | 18 | 2017 |
Automatic generation of low-interaction honeypots M Haerterich, M Johns, M Musch US Patent 10,454,969, 2019 | 17 | 2019 |
Adjustable proxy re-encryption I Hang, F Kerschbaum, M Kohler, M Haerterich, F Hahn, A Schroepfer, ... US Patent 9,537,838, 2017 | 17 | 2017 |
Analysis: Integral-und Differentialrechnung, gewöhnliche Differentialgleichungen, komplexe Funktionentheorie WL Wendland, O Steinbach Springer-Verlag, 2015 | 17 | 2015 |
Providing foundation application as enterprise services T Biesemann, D Krisch, V Schott, M Meyringer, O Von Geisau, ... US Patent App. 13/284,655, 2012 | 17 | 2012 |
The T-equivariant cohomology of Bott-Samelson varieties M Haerterich arXiv preprint math/0412337, 2004 | 17 | 2004 |
Optimal re-encryption strategy for joins in encrypted databases M Haerterich, F Kerschbaum, P Grofig, M Kohler, A Schaad, A Schroepfer, ... US Patent 9,003,204, 2015 | 14 | 2015 |
Privacy by encrypted databases P Grofig, I Hang, M Härterich, F Kerschbaum, M Kohler, A Schaad, ... Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014 | 14 | 2014 |
Client-side attack detection in web applications M Johns, M Haerterich, C Haefner US Patent 10,834,102, 2020 | 12 | 2020 |