• Publications
  • Influence
Dialogues and Ontology, the Dialogical Approach to Free Logic
Being a pragmatic and not a referential approach to semantics, dialogi-cal logic does not understand semantics as mapping names, propositions and relationships into the real world to obtain anExpand
Bernstein-Sato identities and conformal symmetry breaking operators
We present Bernstein-Sato identities for scalar-, spinor- and differential form-valued distribution kernels on Euclidean space associated to conformal symmetry breaking operators. The associatedExpand
Provable Security for Outsourcing Database Operations
TLDR
This paper assesses cryptographic solutions to the problem that some client party wants to outsource database operations on sensitive data sets to a service provider (Eve) without having to trust her. Expand
Location Services
TLDR
There is a lot of confusion around iPads and their location services, so this document will attempt to bring some clarity on this matter. Expand
Emerging Markets for RFID Traces
TLDR
The value and the production cost of information that can be gathered by observing these tags over time and different locations are addressed and it is argued that RFID technology will induce a thriving market for such information, resulting in easy data access for analysts to infer business intelligence and individual profiles of unusually high detail. Expand
Data confidentiality and reputation schemes in distributed information systems
TLDR
This thesis presents a special-purpose framework for simulation of P2P reputation systems that can be used to compare and fine-tune previous and upcoming work, and proposes relaxed, but still practically useful, notions of security for the DSP problem. Expand
Profiting from Untrusted Parties in Web-Based Applications
TLDR
This paper analyzes the theoretical foundations of privacy Homomorphisms and proposes the employment of PHs in two different usage environments, showing that PHs can be usefully employed in both situations although their firm theoretical limitations inhibit general-purpose use. Expand
Provable Security for Outsourcing Database Operations
TLDR
The authors present a new definition of security for homomorphic database encryption schemes that avoids these flaws and show that it is difficult to build a privacy homomorphism that complies with this definition. Expand
The smes client/server protocol (SMESPR/1.0)
SMESPR is a robust, efficient, flexible and platform/language independent protocol that allows the smes kernel to export its functionality over any sort of computer networks (in particular TCP/IP).Expand
The boundary value problem for Laplacian on differential forms and conformally Einstein infinity
We completely resolve the boundary value problem for differential forms and conformally Einstein infinity in terms of the dual Hahn polynomials. Consequently, we produce explicit formulas for theExpand
...
1
2
3
...