Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization., , , , and . IEEE Symposium on Security and Privacy Workshops, page 211-216. IEEE Computer Society, (2017)Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure., , and . HotWeb, page 60-66. IEEE Computer Society, (2015)A Systematic Approach to Analyzing Voting Terminal Event Logs., , and . EVT/WOTE, USENIX Association, (2014)New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning., , , , , and . IEEE Symposium on Security and Privacy, page 1102-1120. IEEE, (2019)Secure training of decision trees with continuous attributes., , and . IACR Cryptol. ePrint Arch., (2020)Conclave: secure multi-party computation on big data., , , , , and . EuroSys, page 3:1-3:18. ACM, (2019)Conclave: secure multi-party computation on big data (extended TR)., , , , , and . CoRR, (2019)Secure MPC for Analytics as a Web Application., , , , and . SecDev, page 73-74. IEEE Computer Society, (2016)DEMO: Integrating MPC in Big Data Workflows., , , , and . ACM Conference on Computer and Communications Security, page 1844-1846. ACM, (2016)Secure training of decision trees with continuous attributes., , and . Proc. Priv. Enhancing Technol., 2021 (1): 167-187 (2021)