Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PRISM - Privacy-Preserving Search in MapReduce., , , and . Privacy Enhancing Technologies, volume 7384 of Lecture Notes in Computer Science, page 180-200. Springer, (2012)Reconciling Security and Functional Requirements in Multi-tenant Clouds., , , and . SCC@AsiaCCS, page 11-18. ACM, (2017)Catch the Jammer in Wireless Sensor Network., , , , and . PIMRC, page 1156-1160. IEEE, (2011)Information-Theoretic Approaches to Differential Privacy., and . CoRR, (2022)PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks., , , and . FPS, volume 12056 of Lecture Notes in Computer Science, page 3-19. Springer, (2019)SoK: Cryptography for Neural Networks., , , , , , , , , and 3 other author(s). Privacy and Identity Management, volume 576 of IFIP Advances in Information and Communication Technology, page 63-81. Springer, (2019)Preventing Watermark Forging Attacks in a MLaaS Environment., , , , and . SECRYPT, page 295-306. SCITEPRESS, (2021)Privacy-preserving Density-based Clustering., , , , , and . AsiaCCS, page 658-671. ACM, (2021)Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption., , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 63-71. Springer, (2021)Optimistic fair exchange for secure forwarding., , and . MobiQuitous, page 1-5. IEEE Computer Society, (2007)