Author of the publication

SAFETY: Secure gwAs in Federated Environment Through a hYbrid solution with Intel SGX and Homomorphic Encryption.

, , , , , and . CoRR, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Efficient Multiparty Computation on Genomic Data., , , and . IDEAS, page 278-283. ACM, (2016)Private Genome Data Dissemination., , , and . Medical Data Privacy Handbook, Springer, (2015)Secure large-scale genome data storage and query., , , and . Comput. Methods Programs Biomed., (2018)Privacy-Preserving Learning via Data and Knowledge Distillation., , , and . DSAA, page 1-10. IEEE, (2023)Privacy preserving neural networks for electronic health records de-identification., , , and . BCB, page 8:1-8:6. ACM, (2021)Efficient Privacy-Preserving Approaches for Trajectory Datasets., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 612-619. IEEE, (2020)A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks., , , , and . WiMob, page 417-422. IEEE Computer Society, (2008)A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs., , , , and . WiMob, page 608-612. IEEE Computer Society, (2008)A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET., , , , and . WCNC, page 2816-2821. IEEE, (2008)Differentially private data release for data mining., , , and . KDD, page 493-501. ACM, (2011)