Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages., , , and . CoRR, (2021)Trustworthy AI Inference Systems: An Industry Research View., , , , , , , , , and 18 other author(s). CoRR, (2020)Private Set Intersection for Unequal Set Sizes with Mobile Applications., , , , and . Proc. Priv. Enhancing Technol., 2017 (4): 177-197 (2017)Valiant's Universal Circuit is Practical., and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 699-728. Springer, (2016)Efficient and Scalable Universal Circuits., , , and . J. Cryptol., 33 (3): 1216-1271 (2020)Efficient Private Function Evaluation.. Technical University of Darmstadt, Germany, (2021)Secure and Private Function Evaluation with Intel SGX., , , and . CCSW, page 165-181. ACM, (2019)Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages., , , and . USENIX Security Symposium, page 6133-6150. USENIX Association, (2023)Faster Privacy-Preserving Location Proximity Schemes., , , , and . IACR Cryptology ePrint Archive, (2018)Web Application for Privacy-preserving Scheduling using Secure Computation., , and . ICETE (2), page 456-463. SciTePress, (2019)