Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-Round Oblivious Linear Evaluation from Learning with Errors., , and . IACR Cryptol. ePrint Arch., (2020)UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions., , and . IACR Cryptology ePrint Archive, (2019)Challenges for multimodal interfaces towards anyone anywhere accessibility: a position paper.. Workshop on Universal Accessibility of Ubiquitous Computing, page 26-27. ACM, (2001)Play Platforms for Children's Creativity., , and . Creativity in the Digital Age, Springer, (2015)Studydesk: semi-immersive volumetric data analysis., , , , and . GRAPHITE, page 251-252. ACM, (2003)A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions.. IACR Cryptology ePrint Archive, (2019)Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption., , , and . IACR Cryptology ePrint Archive, (2018)Laconic Private Set Intersection and Applications., , , , , and . TCC (3), volume 13044 of Lecture Notes in Computer Science, page 94-125. Springer, (2021)Emotional interaction.. CHI Extended Abstracts, page 676-677. ACM, (2003)Blink: observing thin slices of behavior to determine users' expectation towards task difficulty., , , , , , and . CHI Extended Abstracts, page 2299-2304. ACM, (2011)