Author of the publication

Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism.

, , and . BCCA, page 266-273. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Statistical Detection of Adversarial Instances over Encrypted Data., , , , and . STM, volume 11738 of Lecture Notes in Computer Science, page 71-88. Springer, (2019)Decentralized Incentive-Compatible and Sybil-Proof Transaction Advertisement., , and . MARBLE, page 151-165. Springer, (2019)Image Watermarking for Machine Learning Datasets., , , and . DEC@SIGMOD, page 7-13. ACM, (2023)Practical Verifiable & Privacy-Preserving Double Auctions., , and . ARES, page 25:1-25:9. ACM, (2023)VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design., and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 487-507. Springer, (2019)ECONoMy: Ensemble Collaborative Learning Using Masking., , and . PIMRC Workshops, page 1-6. IEEE, (2019)Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning., , , , and . CoRR, (2023)A Scale-Out Blockchain for Value Transfer with Spontaneous Sharding., , , , , and . CVCBT, page 1-10. IEEE, (2018)Verifiable Credentials with Privacy-Preserving Tamper-Evident Revocation Mechanism., , and . BCCA, page 266-273. IEEE, (2023)Privacy-Preserving Multi-Party Access Control., , , and . WPES@CCS, page 1-13. ACM, (2019)