Author of the publication

Privacy-Preserving Weighted Federated Learning Within the Secret Sharing Framework.

, , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Price Negotiation Systems for M-commerce., , and . ICC, page 1521-1526. IEEE, (2007)Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems., and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 418-429. Springer, (2009)Round Optimal Universally Composable Oblivious Transfer Protocols.. ProvSec, volume 5324 of Lecture Notes in Computer Science, page 328-334. Springer, (2008)Universally Composable Oblivious Database in the Presence of Malicious Adversaries.. INTRUST, volume 9565 of Lecture Notes in Computer Science, page 49-61. Springer, (2015)Optimal Trust Mining and Computing on Keyed MapReduce., and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 143-150. Springer, (2012)An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries.. Sci. China Inf. Sci., 60 (5): 52109 (2017)An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks., , and . VTC Spring, page 831-835. IEEE, (2006)Highly Scalable Beaver Triple Generator from Additively Homomorphic Encryption., and . AINA (3), volume 451 of Lecture Notes in Networks and Systems, page 504-514. Springer, (2022)Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains., , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 207-219. Springer, (2005)Compact sequential aggregate signatures., , and . SAC, page 249-253. ACM, (2007)