From post

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).

, , , , и . ACNS, том 7954 из Lecture Notes in Computer Science, стр. 69-83. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed flow detection over multi path sessions., , , и . SecureComm, стр. 3. ACM, (2008)Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation., , и . EUROCRYPT (2), том 10211 из Lecture Notes in Computer Science, стр. 163-193. (2017)Schemes for Privately Computing Trust and Reputation., , и . IFIPTM, том 321 из IFIP Advances in Information and Communication Technology, стр. 1-16. Springer, (2010)Lightweight Techniques for Private Heavy Hitters., , , , и . CoRR, (2020)Efficient Pseudorandom Correlation Generators from Ring-LPN., , , , , и . CRYPTO (2), том 12171 из Lecture Notes in Computer Science, стр. 387-416. Springer, (2020)Poster: arbitrators in the security infrastructure, supporting positive anonymity., , и . ACM Conference on Computer and Communications Security, стр. 753-756. ACM, (2011)Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs., , , и . ACM Conference on Computer and Communications Security, стр. 869-886. ACM, (2019)Topics in private information retrieval.. Technion - Israel Institute of Technology, Israel, (2001)Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation., , и . IACR Cryptol. ePrint Arch., (2014)Correlated Pseudorandom Functions from Variable-Density LPN., , , , , и . FOCS, стр. 1069-1080. IEEE, (2020)