Volgen
Martin Härterich
Martin Härterich
Research Expert, SAP Security Research
Geverifieerd e-mailadres voor sap.com
Titel
Geciteerd door
Geciteerd door
Jaar
Monte carlo and reconstruction membership inference attacks against generative models
B Hilprecht, M Härterich, D Bernau
Proceedings on Privacy Enhancing Technologies, 2019
1562019
Murphy bases of generalized Temperley-Lieb algebras
M Härterich
Archiv der Mathematik 72, 337-345, 1999
451999
Encrypted in-memory column-store
F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ...
US Patent 9,213,764, 2015
432015
Providing Foundation Application as Enterprise Services
T Biesemann, D Krisch, V Schott, M Meyringer, O von Geisau, ...
US Patent App. 12/233,530, 2010
412010
Local versus remote optimization in encrypted query processing
F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 10,162,858, 2018
392018
Searchable encryption for infrequent queries in adjustable encrypted databases
F Kerschbaum, M Haerterich, I Hang, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,342,707, 2016
322016
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
P Grofig, M Haerterich, I Hang, F Kerschbaum, M Kohler, A Schaad, ...
Sicherheit 228, 115-125, 2014
312014
Kazhdan-Lusztig-Basen, unzerlegbare Bimoduln und die Topologie der Fahnenmannigfaltigkeit einer Kac-Moody-Gruppe
M Härterich
Freiburg (Breisgau), Univ., Diss., 1999, 1999
241999
Average-complexity ideal-security order-preserving encryption
F Kerschbaum, A Schroepfer, P Grofig, I Hang, M Haerterich, M Kohler, ...
US Patent 9,037,860, 2015
232015
Explaining graph neural networks for vulnerability discovery
T Ganz, M Härterich, A Warnecke, K Rieck
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
222021
Optimal re-encryption strategy for joins in encrypted databases
F Kerschbaum, M Härterich, P Grofig, M Kohler, A Schaad, A Schröpfer, ...
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
222013
Adjustable proxy re-encryption
I Hang, F Kerschbaum, M Kohler, M Haerterich, F Hahn, A Schroepfer, ...
US Patent 9,537,838, 2017
172017
Access control for encrypted query processing
I Hang, F Kerschbaum, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,547,720, 2017
162017
Providing foundation application as enterprise services
T Biesemann, D Krisch, V Schott, M Meyringer, O Von Geisau, ...
US Patent App. 13/284,655, 2012
162012
The T-equivariant cohomology of Bott-Samelson varieties
M Haerterich
arXiv preprint math/0412337, 2004
162004
Automatic generation of low-interaction honeypots
M Haerterich, M Johns, M Musch
US Patent 10,454,969, 2019
152019
Analysis: Integral-und Differentialrechnung, gewöhnliche Differentialgleichungen, komplexe Funktionentheorie
WL Wendland, O Steinbach
Springer-Verlag, 2015
152015
Optimal re-encryption strategy for joins in encrypted databases
M Haerterich, F Kerschbaum, P Grofig, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,003,204, 2015
142015
Privacy by encrypted databases
P Grofig, I Hang, M Härterich, F Kerschbaum, M Kohler, A Schaad, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
142014
Adjustably encrypted in-memory column-store
F Kerschbaum, P Grofig, I Hang, M Härterich, M Kohler, A Schaad, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
122013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20