Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Homomorphic Encryption from Ring-Learning-with-Errors., , , and . Proc. Priv. Enhancing Technol., 2021 (4): 291-311 (2021)CryptoDSPs for Cloud Privacy., and . WISE Workshops, volume 6724 of Lecture Notes in Computer Science, page 428-439. Springer, (2010)Orchestrating Collaborative Cybersecurity: A Secure Framework for Distributed Privacy-Preserving Threat Intelligence Sharing., , , , , , and . CoRR, (2022)Co-creating Security-and-Privacy-by-Design Systems., , , , , and . ARES, page 768-775. IEEE Computer Society, (2016)Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 521-541. Springer, (2022)Number Theoretic Transforms for Secure Signal Processing., , and . CoRR, (2016)Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption., , , and . IACR Cryptology ePrint Archive, (2019)Image denoising in the encrypted domain., , and . WIFS, page 1-6. IEEE, (2016)Multivariate lattices for encrypted image processing., , and . ICASSP, page 1707-1711. IEEE, (2015)Secure Adaptive Filtering., and . IEEE Trans. Inf. Forensics Secur., 6 (2): 469-485 (2011)