Follow
Martin Härterich
Martin Härterich
Research Expert, SAP Security Research
Verified email at sap.com
Title
Cited by
Cited by
Year
Monte carlo and reconstruction membership inference attacks against generative models
B Hilprecht, M Härterich, D Bernau
Proceedings on Privacy Enhancing Technologies, 2019
1902019
Murphy bases of generalized Temperley-Lieb algebras
M Härterich
Archiv der Mathematik 72, 337-345, 1999
481999
Encrypted in-memory column-store
F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ...
US Patent 9,213,764, 2015
442015
Providing Foundation Application as Enterprise Services
T Biesemann, D Krisch, V Schott, M Meyringer, O von Geisau, ...
US Patent App. 12/233,530, 2010
432010
Local versus remote optimization in encrypted query processing
F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 10,162,858, 2018
412018
Searchable encryption for infrequent queries in adjustable encrypted databases
F Kerschbaum, M Haerterich, I Hang, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,342,707, 2016
342016
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
P Grofig, M Haerterich, I Hang, F Kerschbaum, M Kohler, A Schaad, ...
Sicherheit 228, 115-125, 2014
322014
Explaining graph neural networks for vulnerability discovery
T Ganz, M Härterich, A Warnecke, K Rieck
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
262021
Average-complexity ideal-security order-preserving encryption
F Kerschbaum, A Schroepfer, P Grofig, I Hang, M Haerterich, M Kohler, ...
US Patent 9,037,860, 2015
252015
Kazhdan-Lusztig-Basen, unzerlegbare Bimoduln und die Topologie der Fahnenmannigfaltigkeit einer Kac-Moody-Gruppe
M Härterich
Freiburg (Breisgau), Univ., Diss., 1999, 1999
241999
Optimal re-encryption strategy for joins in encrypted databases
F Kerschbaum, M Härterich, P Grofig, M Kohler, A Schaad, A Schröpfer, ...
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
222013
Access control for encrypted query processing
I Hang, F Kerschbaum, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,547,720, 2017
182017
Automatic generation of low-interaction honeypots
M Haerterich, M Johns, M Musch
US Patent 10,454,969, 2019
172019
Adjustable proxy re-encryption
I Hang, F Kerschbaum, M Kohler, M Haerterich, F Hahn, A Schroepfer, ...
US Patent 9,537,838, 2017
172017
Analysis: Integral-und Differentialrechnung, gewöhnliche Differentialgleichungen, komplexe Funktionentheorie
WL Wendland, O Steinbach
Springer-Verlag, 2015
172015
Providing foundation application as enterprise services
T Biesemann, D Krisch, V Schott, M Meyringer, O Von Geisau, ...
US Patent App. 13/284,655, 2012
172012
The T-equivariant cohomology of Bott-Samelson varieties
M Haerterich
arXiv preprint math/0412337, 2004
172004
Optimal re-encryption strategy for joins in encrypted databases
M Haerterich, F Kerschbaum, P Grofig, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,003,204, 2015
142015
Privacy by encrypted databases
P Grofig, I Hang, M Härterich, F Kerschbaum, M Kohler, A Schaad, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
142014
Client-side attack detection in web applications
M Johns, M Haerterich, C Haefner
US Patent 10,834,102, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20