Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization., , , , , , and . DSN, page 549-554. IEEE Computer Society, (2004)AMORES: an architecture for mobiquitous resilient systems., , , , , , , , , and 4 other author(s). ARMOR, page 7:1-7:6. ACM, (2012)PROBONITE: PRivate One-Branch-Only Non-Interactive decision Tree Evaluation., , , and . WAHC@CCS, page 23-33. ACM, (2022)Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning., , , and . CODASPY, page 199-210. ACM, (2024)A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib., , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 425-442. Springer, (2018)Next place prediction using mobility Markov chains., , and . MPM@EuroSys, page 3:1-3:6. ACM, (2012)Locanyms: towards privacy-preserving location-based services., , , and . ARMOR, page 1:1-1:6. ACM, (2012)SRide: A Privacy-Preserving Ridesharing System., , , and . WISEC, page 40-50. ACM, (2018)PROPS: A PRivacy-Preserving Location Proof System., , , and . SRDS, page 1-10. IEEE Computer Society, (2014)Oblivious Turing Machine., , and . EDCC, page 17-24. IEEE, (2024)