Seguir
Martin Härterich
Martin Härterich
Research Expert, SAP Security Research
Dirección de correo verificada de sap.com
Título
Citado por
Citado por
Año
Monte carlo and reconstruction membership inference attacks against generative models
B Hilprecht, M Härterich, D Bernau
Proceedings on Privacy Enhancing Technologies, 2019
1662019
Murphy bases of generalized Temperley-Lieb algebras
M Härterich
Archiv der Mathematik 72, 337-345, 1999
451999
Encrypted in-memory column-store
F Kerschbaum, M Haerterich, M Kohler, I Hang, A Schaad, A Schroepfer, ...
US Patent 9,213,764, 2015
442015
Providing Foundation Application as Enterprise Services
T Biesemann, D Krisch, V Schott, M Meyringer, O von Geisau, ...
US Patent App. 12/233,530, 2010
412010
Local versus remote optimization in encrypted query processing
F Kerschbaum, P Grofig, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 10,162,858, 2018
402018
Searchable encryption for infrequent queries in adjustable encrypted databases
F Kerschbaum, M Haerterich, I Hang, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,342,707, 2016
322016
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data.
P Grofig, M Haerterich, I Hang, F Kerschbaum, M Kohler, A Schaad, ...
Sicherheit 228, 115-125, 2014
322014
Average-complexity ideal-security order-preserving encryption
F Kerschbaum, A Schroepfer, P Grofig, I Hang, M Haerterich, M Kohler, ...
US Patent 9,037,860, 2015
242015
Kazhdan-Lusztig-Basen, unzerlegbare Bimoduln und die Topologie der Fahnenmannigfaltigkeit einer Kac-Moody-Gruppe
M Härterich
Freiburg (Breisgau), Univ., Diss., 1999, 1999
241999
Explaining graph neural networks for vulnerability discovery
T Ganz, M Härterich, A Warnecke, K Rieck
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
232021
Optimal re-encryption strategy for joins in encrypted databases
F Kerschbaum, M Härterich, P Grofig, M Kohler, A Schaad, A Schröpfer, ...
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
222013
Adjustable proxy re-encryption
I Hang, F Kerschbaum, M Kohler, M Haerterich, F Hahn, A Schroepfer, ...
US Patent 9,537,838, 2017
172017
Analysis: Integral-und Differentialrechnung, gewöhnliche Differentialgleichungen, komplexe Funktionentheorie
WL Wendland, O Steinbach
Springer-Verlag, 2015
172015
Access control for encrypted query processing
I Hang, F Kerschbaum, M Haerterich, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,547,720, 2017
162017
Providing foundation application as enterprise services
T Biesemann, D Krisch, V Schott, M Meyringer, O Von Geisau, ...
US Patent App. 13/284,655, 2012
162012
The T-equivariant cohomology of Bott-Samelson varieties
M Haerterich
arXiv preprint math/0412337, 2004
162004
Automatic generation of low-interaction honeypots
M Haerterich, M Johns, M Musch
US Patent 10,454,969, 2019
152019
Optimal re-encryption strategy for joins in encrypted databases
M Haerterich, F Kerschbaum, P Grofig, M Kohler, A Schaad, A Schroepfer, ...
US Patent 9,003,204, 2015
142015
Privacy by encrypted databases
P Grofig, I Hang, M Härterich, F Kerschbaum, M Kohler, A Schaad, ...
Privacy Technologies and Policy: Second Annual Privacy Forum, APF 2014 …, 2014
142014
Towards an automatic generation of low-interaction web application honeypots
M Musch, M Härterich, M Johns
Proceedings of the 13th international conference on availability …, 2018
122018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20