h1

h2

h3

h4

h5
h6
000997007 001__ 997007
000997007 005__ 20250930183304.0
000997007 0247_ $$2ISBN$$a979-8-4007-1239-5
000997007 0247_ $$2ISBN$$a9798400712395
000997007 0247_ $$2SCOPUS$$aSCOPUS:2-s2.0-85214243881
000997007 0247_ $$2WOS$$aWOS:001434853500007
000997007 0247_ $$2doi$$a10.1145/3689943.3695041
000997007 037__ $$aRWTH-2024-10982
000997007 041__ $$aEnglish
000997007 1001_ $$0P:(DE-82)IDM06514$$aEhrmanntraut, Vincent Cosme$$b0$$eCorresponding author$$urwth
000997007 1112_ $$a23. Workshop on Privacy in the Electronic Society$$cSalt Lake City$$d2024-10-14 - 2024-10-18$$gWPES$$wUSA
000997007 245__ $$aPrivacy-Preserving Breadth-First-Search and Maximal Flow$$honline
000997007 260__ $$a[Erscheinungsort nicht ermittelbar]$$bAssociation for Computing Machinery$$c2024
000997007 29510 $$aProceedings of the 23rd Workshop on Privacy in the Electronic Society
000997007 300__ $$a73-97
000997007 3367_ $$033$$2EndNote$$aConference Paper
000997007 3367_ $$0PUB:(DE-HGF)7$$2PUB:(DE-HGF)$$aContribution to a book
000997007 3367_ $$0PUB:(DE-HGF)8$$2PUB:(DE-HGF)$$aContribution to a conference proceedings$$bcontrib$$mcontrib
000997007 3367_ $$2BibTeX$$aINPROCEEDINGS
000997007 3367_ $$2DRIVER$$aconferenceObject
000997007 3367_ $$2DataCite$$aOutput Types/Conference Paper
000997007 3367_ $$2ORCID$$aCONFERENCE_PAPER
000997007 4900_ $$aACM Conferences
000997007 588__ $$aDataset connected to CrossRef Conference
000997007 591__ $$aGermany
000997007 653_7 $$abreadth first search
000997007 653_7 $$amax flow
000997007 653_7 $$asecure multi-party computation
000997007 7001_ $$0P:(DE-82)IDM05900$$aMeyer, Ulrike Michaela$$b1$$eCorresponding author$$urwth
000997007 8564_ $$uhttps://publications.rwth-aachen.de/record/997007/files/997007.pdf$$yRestricted
000997007 909CO $$ooai:publications.rwth-aachen.de:997007$$pVDB
000997007 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM06514$$aRWTH Aachen$$b0$$kRWTH
000997007 9101_ $$0I:(DE-588b)36225-6$$6P:(DE-82)IDM05900$$aRWTH Aachen$$b1$$kRWTH
000997007 9141_ $$y2024
000997007 9151_ $$0StatID:(DE-HGF)0031$$2StatID$$aPeer reviewed article$$x0
000997007 9201_ $$0I:(DE-82)123520_20140620$$k123520$$lLehr- und Forschungsgebiet IT-Sicherheit$$x0
000997007 9201_ $$0I:(DE-82)120000_20140620$$k120000$$lFachgruppe Informatik$$x1
000997007 961__ $$c2024-11-22T09:30:44.512303$$x2024-11-22T09:30:44.512303$$z2024-11-25
000997007 980__ $$aI:(DE-82)120000_20140620
000997007 980__ $$aI:(DE-82)123520_20140620
000997007 980__ $$aUNRESTRICTED
000997007 980__ $$aVDB
000997007 980__ $$acontb
000997007 980__ $$acontrib