Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shield: Secure Allegation Escrow System with Stronger Guarantees., , , and . WWW, page 2252-2262. ACM, (2023)Graphiti: Secure Graph Computation Made More Scalable., , , and . IACR Cryptol. ePrint Arch., (2024)Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach., and . CANS, volume 11124 of Lecture Notes in Computer Science, page 23-42. Springer, (2018)PentaGOD: Stepping beyond Traditional GOD with Five Parties., , , and . CCS, page 1843-1856. ACM, (2022)Privacy Preserving Network Analysis of Distributed Social Networks., , and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 336-355. Springer, (2016)Attaining GOD Beyond Honest Majority with Friends and Foes., , , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 556-587. Springer, (2022)Privacy Preserving Distributed Analysis of Social Networks.. WWW (Companion Volume), page 873-877. ACM, (2018)Secure multiparty graph computation., , and . COMSNETS, page 1-2. IEEE, (2016)Poster: Vogue: Faster Computation of Private Heavy Hitters., , , , , and . CCS, page 3371-3373. ACM, (2022)Identifying Influential Spreaders in a Social Network (While Preserving Privacy)., and . Proc. Priv. Enhancing Technol., 2020 (2): 537-557 (2020)