Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PriFi: Low-Latency Anonymity for Organizational Networks., , , , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 24-47 (2020)Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices., , , and . CoRR, (2021)Poster: Verifiable Encodings for Maliciously-Secure Homomorphic Encryption Evaluation., , , , and . CCS, page 3525-3527. ACM, (2023)PELTA - Shielding Multiparty-FHE against Malicious Adversaries., , , , , and . CCS, page 711-725. ACM, (2023)slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference., , , , , and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 359-377. Springer, (2023)Privacy-friendly mobility analytics using aggregate location data., , and . SIGSPATIAL/GIS, page 34:1-34:10. ACM, (2016)Scalable and Privacy-Preserving Federated Principal Component Analysis., , , , , , , , and . SP, page 1908-1925. IEEE, (2023)Privacy and Integrity Preserving Computations with CRISP., , , and . USENIX Security Symposium, page 2111-2128. USENIX Association, (2021)Adaptive Hierarchical Network Structures for Wireless Sensor Networks., , , , , and . ADHOCNETS, volume 89 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 65-80. Springer, (2011)P3LI5: Practical and confidEntial Lawful Interception on the 5G core., , , , and . CNS, page 1-9. IEEE, (2023)