Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages., , , and . CoRR, (2021)Valiant's Universal Circuit is Practical., and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 699-728. Springer, (2016)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , and 18 other author(s). CoRR, (2020)Private Set Intersection for Unequal Set Sizes with Mobile Applications., , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 177-197 (2017)SoK: Modular and Efficient Private Decision Tree Evaluation., , , , and . IACR Cryptology ePrint Archive, (2018)Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation., , , and . ACM Conference on Computer and Communications Security, page 2541-2543. ACM, (2019)Faster Privacy-Preserving Location Proximity Schemes., , , , and . IACR Cryptology ePrint Archive, (2018)Efficient and Scalable Universal Circuits., , , and . J. Cryptol., 33 (3): 1216-1271 (2020)Efficient Private Function Evaluation.. Technical University of Darmstadt, Germany, (2021)Web Application for Privacy-preserving Scheduling using Secure Computation., , and . ICETE (2), page 456-463. SciTePress, (2019)