GB(1)                         (GB) BRAMM.XYZ                           GB(1)



NAME

       GB - Georg Bramm

SYNOPSIS

       $ bramm.xyz --contact
         >   georg.bramm 'at' aisec.fraunhofer.de
         >  github, linkedin  48.267354, 11.665017

       $ bramm.xyz --about
         > PhD candidate at Fraunhofer AISEC
         > cryptocurrencies, applied cryptography,
           decentralized protocols, hacking, coding, privacy,
           bitcoin, anonymity, it-security 
> $ bramm.xyz --quote > 'Welcome to the desert of the real.' (The Matrix, 1999) WORK > now - researcher @ Fraunhofer AISEC > 2014 - coauthor of the Emu-webApp @ LMU IPS TEACHING ¬ Courses at TUM · Applied Cryptography (Seminar) · Privacy Matters - Ensuring Confidentiality (Seminar) · Data Privacy Technologies (Seminar) · Privacy for NoSQL/Graph Databases (Lecture) ¬ Guided Research · Evaluation of PQC lattice-based approaches to ABE ¬ Supervised Thesis · A Threat-Driven Empirical Analysis of Proof-of-Intelligence · Privacy Meets Performance: Rethinking HE in FL · Limitations of Functional Encryption in FL · Building and Evaluating Geospatial cryp. schemes · RkNN query on encrypted multi-dimensional data · KNN on Encrypted Geospatial Data · Range Query over Encrypted Geospatial Data · A searchable encrypted Doc. Collection using ABE · Evaluation of Outsourced Private Set Intersection · Forward and Backward Privacy in Dynamic SE PUBLICATIONS [bib] G. Bramm et al., "UPCARE: User Privacy-preserving Cancer Research Platform", 2024. [bib] G. Bramm, "cipherPath: Efficient Traversals over Homomorphically Encrypted Paths", 2020. [bib] M. Schanzenbach, G. Bramm, and J. Schütte, “reclaimid: Secure, self-sovereign identities using name systems and attribute-based encryption”, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 946–957, IEEE, 2018. [bib] G. Bramm, M. Gall, and J. Schütte, “Blockchain-based distributed attribute based encryption”, 2018. [bib] R. Winkelmann and G. Raess, “Introducing a web application for labeling, visualizing speech and correcting derived speech signals.,” in LREC, pp. 4129–4133, 2014.
Manual page bramm(1) line 1 (press h for help or q to quit)